• October 15, 2012

    Forbes: "Creating Security from the Inside Out"

    Wave Systems, a pioneer in enabling Self Encrypted Drives (SEDs), is furthering network support of self-encrypted storage devices.  In August the company announced cloud-based management for SEDs with its Wave Cloud service.  This subscription service offers cloud-based management of enterprise-wide SEDs.  Thus encrypted drive key management can be offered as an on-line service, eliminated the cost and complexity of implementing key management for laptops and other storage devices.  A service like this makes enterprise class key management available even to small and medium size companies a

    Read More...

  • September 25, 2012

    Stuxnet Reveals the Magnitude of Threats Foreseen More than a Decade Ago

    The Stuxnet virus expired on June 24th – roughly two years after it was first discovered - and barely that long since it subverted centrifuges at Iran’s Bushehr nuclear reprocessing facility. Yet, this threat has been well understood for over a decade as evidenced by the Trusted Computing Group’s (TCG) Trusted Platform Module (TPM) now in over half a billion PCs and laptops. Had TPMs been turned on and managed at the Bushehr facility, it is likely that the Advanced Persistent Threat (APT) Stuxnet represented would have been blunted.

    Read More...

  • September 20, 2012

    Cybercriminals shift focus to bank employees

    The evolution of cybercrime continues: The preferred target in the financial industry is moving from the bank customer to the employee.

    Corporate cybercrime costs skyrocket

    Read More...

  • September 19, 2012

    New TDL4 Bootkit Malware Variant Hits Fortune 500

    Security vendor Damballa Labs has discovered a new variant of the TDSS/TDL4 malware that has apparently hit about 250,000 unique victims and at least 46 Fortune 500 companies, governmental agencies and ISP networks.

    The malware uses highly secure domain generation algorithm (DGA)-based command-and-control (C&C) for communication, providing the controllers with details on click-fraud activity while at the same time avoiding network layer domain blacklists and signature-based filters.

    Read More...

  • September 17, 2012

    NetworkWorld features Wave Endpoint Monitor in its 'roundup of intriguing new products'

    Product name • Wave Endpoint Monitor (WEM)

    Key features • Wave Endpoint Monitor (WEM) detects malware in the BIOS before the operating system loads, leveraging capabilities of the Trusted Platform Module (TPM) security chip on the motherboard of business PCs.

     

    Read More...

  • September 13, 2012

    Wave Endpoint Monitor detects anomalous behavior

    Wave Systems announced Wave Endpoint Monitor (WEM), a solution that detects malware by leveraging capabilities of an industry standard security chip onboard the PC.

    WEM provides increased visibility into endpoint health to help protect enterprise resources and minimize the potential cost of advanced persistent threats such as rootkits.

    Read More...

  • September 12, 2012

    Wave Systems launch security on a chip via an endpoint monitor

    Wave Systems have announced the launch of an endpoint monitor that detects malware by using the capabilities of the security chip onboard a PC.

    According to the company, the Wave Endpoint Monitor provides protection against threats such as rootkits by utilising information stored within the Trusted Platform Module (TPM) to check security health before the operating system loads. If any anomalies are detected, the IT department is alerted immediately with real-time analytics.

    Read More...

  • September 11, 2012

    Wave Systems Launches TPM-Based Malware Detection Technology

    The Wave Endpoint Monitor takes advantage of the Trusted Platform Module chip's built-in security capabilities to provide businesses with advanced protection against sophisticated malware and advanced persistent threats, Wave Systems said Tuesday. The Wave Endpoint Monitor provides increased visibility into what is running on the computer even before the operating system launches, the company said.

    Read More...

  • September 3, 2012

    NetworkWorld features Wave Cloud in its 'roundup of intriguing new products'

    Product name • Wave Cloud

    Key features • Wave Cloud introduced cloud-based management of self-encrypting drives (SEDs), a platform for enterprises that wish to rapidly deploy centrally-managed hardware-based data encryption without the complexity and cost of on-premise servers.

     

    Read More...

  • August 21, 2012

    Wave Launches Cloud-Based Management Of Self-Encrypting Devices

    Wave Systems Corp. (NASDAQ:WAVX www.wave.com) today launched Wave Cloud, a cloud-based service for enterprise-wide management of self-encrypting drives (SEDs). The company’s new subscription-based service introduces a game-changing platform for enterprises that wish to rapidly deploy centrally-managed hardware-based data encryption on laptops— all without the complexity and cost associated with maintaining on-premise servers.

    Read More...

  • August 15, 2012

    Wave Cloud Centrally Manages Self-encrypting Drives

    Wave Systems, a Massachusetts-based provider of security, data protection and encryption solutions, today launched a subscription-based cloud service to help enterprises simplify management of self-encrypting drives (SEDs).

    Read More...

  • August 9, 2012

    Westholland names Wave Systems "Company of the Month August"

    Lost or stolen laptops are a growing concern to all organisations. The major issue when this occurs is ensuring the information contained on the devices is secure. There are many solutions available to encrypt data on laptops however with the growing sophistication of criminals who target this information, these solutions have proven to be ineffective.

    Read More...

  • August 3, 2012

    Securing Data on a Moving Target: Self-Encrypting Drives Deliver Top Security, Performance and Manageability

    Today’s increasingly mobile work force has moved more and more end-users, devices, computing applications and highly sensitive data beyond the safety of the enterprise firewall. As the number of laptops multiplies across the enterprise, the prospect of a security breach through a lost or stolen device shifts from a speculative risk to a virtual inevitability. Such breaches can now be measured in dollar signs, as underscored by a 2009 study by the Ponemon Institute, which estimated a lost or stolen laptop can cost an enterprise $200 for every customer record stored on the device.

    Read More...

  • August 3, 2012

    Top Ten Reasons to Buy Self-Encrypting Drives (SEDs)

    Seagate introduced the first laptop hard drive with built-in encryption in 2007. Since then, the Trusted Computing Group (TCG) has defined an SED standard called Opal that has since paved the way for a wide-range of Opal-based SEDs from leading hard drive manufactures like Seagate and Hitachi, flash vendors like Micron and Samsung and external drive providers like CMS. PC vendors like Dell, HP and Lenovo offer these SEDs on a variety of systems, for little to no additional cost. Gartner estimates that in five years all drives will be hardware encrypted.

    Read More...

  • August 1, 2012

    SC Magazine Reviews Wave Systems EMBASSY Remote Administration Server

    Deploying full hardware-based encryption throughout the enterprise can be a tricky feat in many environments. This is where the EMBASSY Remote Administration Server, or ERAS, from Wave Systems shines the brightest. Administrators can use this product to quickly and easily manage many types of both hardware- and software-based encryption throughout the enterprise. The EMBASSY Remote Administration Server can directly interface with Opal-based self-encrypting drives and SafeNet ProtectDrive, as well as Microsoft BitLocker.

    Read More...