Hardware anti-tamper, Security implications/privacy concerns, Enterprise Security Architecture