The Role of TPM in Enterprise Security