• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News, Physical Security

PCs Powered By Microsoft Pluton Will Become Available Later This Year

Microsoft Pluton is a security processor pioneered in Xbox and Azure Sphere designed to store sensitive data within the Pluton hardware.

January 5, 2022 Zachary Comeau Leave a Comment

Microsoft Pluton
Courtesy/Lenovo

The first Microsoft Pluton-powered PCs will become available later this year with Windows 11 as Lenovo and AMD announced during CES 2022 a new ThinkPad Z series laptops powered by AMD’s Ryzen-6000 Series processors which will integrate the Microsoft Pluton security processor.

The Microsoft Pluton is a security processor first pioneered in Xbox and Azure Sphere that is designed to store sensitive data securely within the Pluton hardware, which is integrated into the die of a device’s CPU, Microsoft said in a blog post.

In the same post, the company rattled off several alarming cybersecurity statistics, including:

  • A 150% increase in ransomware attacks over the last year
  • Nearly 580 password attacks every second
  • A 667% increase in phishing attacks since March 2020

“While cloud-delivered protections and significant advancements in the Windows OS have made things more difficult for attackers, they continue to evolve as well – targeting the seams that exist between hardware and software and sensitive information like encryption keys and credentials within a device’s firmware,” Microsoft said in the blog. “Security decision makers have taken note. The Microsoft Security Signals 2021 survey found that 80% believe that modern hardware, and not just software, is needed to protect against emerging threats.”

Read Next: Microsoft Introduces Pluton Security Processor

According to Microsoft, Pluton is designed to make it harder for attackers to access data like encryption keys even if they have physical possession of a device.

The new Lenovo device, Microsoft says, is among the first to use the Pluton processor, and features these capabilities:

  • Security updates from the chip to the cloud. The Pluton firmware will be updateable through Windows Update along with standard industry controls.
  • Physical attack resistance. Microsoft cited its Security Signals survey that suggested security decision makers were more concerned with risk of device theft due to hybrid work.
  • Trusted, proven security built alongside Microsoft’s partners, based on approaches and technologies used in Xbox and Azure Sphere.

The company says Pluton can be configured in three ways:  as the Trusted Platform Module; as a security processor used for non-TPM scenarios like platform resiliency; or OEMs can choose to ship with Pluton turned off.

“That means for devices like the Lenovo ThinkPad Z13 and Z16, when Pluton is configured as the TPM 2.0 for a Windows 11 system, Pluton helps protect Windows Hello credentials by keeping them further isolated from attackers” the company says. “Device encryption can use Pluton when it is configured as the TPM to securely protect encryption keys from physical attacks and help keep data safe from prying eyes. The flexibility of Pluton and the innovation supported by Microsoft’s ecosystem partners allow the hardware security capabilities supported by Pluton to be used for scenarios beyond the TPM.”

Microsoft says Windows will use Pluton to securely integrate with other hardware security components on the system to provide end users and eventually IT admins with greater visibility into the state of the platform. IT will also be able to use the technology for platform resiliency signals that can be used for zero-trust conditional access workflows.

“In the future these signals will also be reported to cloud services like Intune, through the Microsoft Azure Attestation service, so that they can be used by IT administrators to take a step further in the zero-trust security paradigm of verifying as much as possible before authorizing access to any privileged resources.”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Microsoft

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.