A new computing model has emerged in the past few years. It is based on the identity of the device, not just the user, and is independent of the type of connection. This paradigm is being driven by the proliferation of mobile devices that have created enormous security challenges.

Wave is well positioned to benefit from this transition as it gains momentum. We have a broad suite of software that leverage the enhanced capabilities of Trusted Computing Group (TCG) industry standard hardware, delivering robust security and manageability in a user friendly solution. Unlike other methods, Wave’s products work across PCs and tablets shipping in volume as well as smartphones entering the market later this year.

PDF icon Wave 2012 Annual Report

May 02, 2013

May 02, 2013

PDF icon Wave Proxy 2013

May 02, 2013

May 02, 2013