Mitigates exploitation Prevents brute force attacks Protects the boot process Keeps data safe from physical attacks