We build  securitythat starts  with the    device
AboutWave Systems
Many companies claim to be ahead of the information securitycurve. But for two decades, Wave Systems Corp. has activelydef...
THE   Information    Security Landscape         As more users, devices and data move beyond the traditional security      ...
Embedded information securityWave’s leading-edge solutions build on a very simple principle:Security starts with the devic...
3The Three Elements of Embedded SecurityA decade ago, leading hardware, software and security vendors recognized the perim...
CAPABILITIESWave offers more than just another piecemeal defense against endpoint                              GARTNER    ...
CAPABILITIES                              Wave offers a range of solutions, whether you need to protect data-in-motion,   ...
7
PRODUCTS               Wave EMBASSY® Remote Administration Server (ERAS)               Wave ERAS provides all the tools yo...
PRODUCTSSafend ProtectorSafend Protector defends your organization from the risks associated withendpoint data leakage. It...
The Leader in     Embedded Security     Management     Leading device and software vendors, government cyber-             ...
The FutureAs the corporate perimeter continues to vanish, Elvis isn’t theonly one leaving the building. Your mobile workfo...
Wave Systems Corp.                                                             480 Pleasant Street                        ...
the ITBecauseperimeter hasvanished,security muststart with thedevice.                 13
Wave Systems Corp. Brochure
Upcoming SlideShare
Loading in...5
×

Wave Systems Corp. Brochure

822

Published on

Dated Feb. 2012 - a user-friendly overview of Wave and its key technology solutions in the security software space.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
822
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wave Systems Corp. Brochure

  1. 1. We build securitythat starts with the device
  2. 2. AboutWave Systems
  3. 3. Many companies claim to be ahead of the information securitycurve. But for two decades, Wave Systems Corp. has activelydefined that curve.Our technological innovation and leadership in embeddedsecurity have steered the IT industry toward data and networkprotection that is transparently simple, highly cost-effective andvirtually impossible to penetrate. With Wave as your partner, youcan guarantee the integrity of network endpoint devices usingleading-edge technology that’s already deployed across yourscattered workforce.Wave is not just another enterprise software security firm. Oursolutions make it a pain-free task to protect all data on mobileplatforms, securely access the Cloud and allow workers to safelylog onto your network with their personal devices. 1
  4. 4. THE Information Security Landscape As more users, devices and data move beyond the traditional security of the corporate campus, attacks on information have grown in both diversity and sophistication. Today, the dangers range from sophisticated Advanced Persistent Threats that can silently monitor a network, to FireWire attacks able to bypass endpoint encryption to the all too common lost or stolen laptop. Meanwhile, governments around the globe are enacting laws and regulations that require companies to publicly disclose data breaches, and often pay hefty fines—unless the company can guarantee its data is safe and cannot be misused by unauthorized persons. The traditional defense of hiding information behind a wall of software is clearly inadequate to these challenges. And it will become even less effective as enterprises increasingly rely on mobile platforms, Cloud computing and personal devices used for work. Fortunately, the industry needn’t invent some futuristic new solution to defend this infinitely expanding frontier. The future is right here, right now. It is already revolutionizing the strength, reach and simplicity of information security today. …And Wave Systems is the leading provider.2
  5. 5. Embedded information securityWave’s leading-edge solutions build on a very simple principle:Security starts with the device.Far from being radically new or unproven, embedded security already preventsfraudulent use of cell phone and cable networks, Xbox LIVE and iTunes. All makean endpoint device the cornerstone of network security.No device; no access. It’s that simple.Imagine if you could… „„ Turn your endpoint devices themselves into security tokens „„ Use a single password to access your corporate network and all of your Cloud-based services „„ Monitor endpoint health in real-time to counter malware attacks „„ Save time and money while guaranteeing compliance „„ Allow employees to safely use their personal devices for work „„ Be confident that your investment in endpoint protection today can address the unknown security needs of tomorrowOnly embedded security can enable this vision for your data network, and itshardware elements are already onboard over 500 million PCs today, or availablefor a nominal fee as an option on new devices. The final piece is available fromWave Systems, which is the most comprehensive source for solutions thatlet you activate and take advantage of the embedded security you probablyalready own.Security starts with the device. 3
  6. 6. 3The Three Elements of Embedded SecurityA decade ago, leading hardware, software and security vendors recognized the perimeter of thecorporate network was quickly vanishing, and that hiding endpoint data behind a wall of software nolonger provided adequate protection. In response, they formed the Trusted Computing Group (TCG),whose charter members included the likes of Dell, IBM, Intel, Microsoft and Wave Systems. The TCG’s aimwas to develop international vendor-neutral, peer-vetted and interoperable standards that would enablea new generation of information security built on three elements: 1. Self-Encrypting Drives (SEDs): The future of encryption, SEDs are available today as an inexpensive option from leading PC vendors. SEDs are similar to standard hard drives, except they embed encryption into their core processor chip. That not only makes them impervious to software attacks, it also means they cost significantly less and greatly outperform conventional software encryption solutions. 2. Trusted Platform Modules (TPMs): The foundation for device identity and health, TPMs are cryptographic security chips included in virtually every business class PC today. Think of them as built-in tokens—without the costs associated with purchasing, deploying or replacing them. TPMs provide a persistent and unique identity for each endpoint on your network. In addition, they can protect user access to your network and cloud services. Plus, TPMs enable centralized monitoring of endpoint health by ensuring, for example, that an endpoint’s BIOS is free of malware. 3. Central Security Management: The third and most important element, enterprise management, enables centralized administration of embedded security on all mobile endpoints. Available only from Wave, it enables remote activation, monitoring and management of all SEDs and TPMs across your distributed organization. Plus, it restores real-time, policy-based security controls and proof of compliance on your network’s furthest endpoints.The future of information security is right here right now, and Wave Systems is your most trusted provider. 4
  7. 7. CAPABILITIESWave offers more than just another piecemeal defense against endpoint GARTNER BELIEVES THATdata loss and network breaches. It provides everything you need to BY 2015 ALL DISKprove your data is protected, and to know what devices are attached to DRIVES WILL SHIPyour network and Cloud services. PRE-LOADED WITH SOME INDUSTRY-Deter unauthorized users, devices and malware STANDARD FDE TECHNOLOGY,With the lion’s share of corporate data residing on network endpoints, you have LIKE SELF-a lot of territory to defend. Yet, it is surprisingly easy to breach sensitive data by ENCRYPTINGsimply connecting a memory stick to a corporate laptop, or to bridge private DRIVES.internal networks via a WiFi or 3G modem connection. Only embedded securityfrom Wave Systems lets you actively defend data on every endpoint and everydevice over every interface across your organization.Specifically, Wave allows you to: „„ Stop data leakage through physical ports, wireless interfaces and removable media „„ Detect and restrict devices by type, model or unique serial number, or control WiFi access by MAC address, SSID or the security level of the network „„ Inspect, classify and block data leakage via email, instant messaging, websites, external storage devices, printers and more „„ Control the transfer of files both to and from external storage devices according to file type „„ Detect and block both USB and PS/2 hardware keyloggersDefend dataYour network’s mobile endpoints are literally moving targets and, until they aresecure against attack, your business intelligence, reputation and bottom line areat risk. Most experts agree that encryption is essential to protecting data at theendpoint. The question is: Which encryption solution is right for you?THE FUTURE OF INFORMATION SECURITY IS RIGHT HERE RIGHT NOW, ANDWAVE SYSTEMS IS YOUR MOST TRUSTED PROVIDER. 5
  8. 8. CAPABILITIES Wave offers a range of solutions, whether you need to protect data-in-motion, secure endpoint data or manage full-disk encryption platforms across your organization. „„ Self-Encrypting Drives (SEDs): The future of encryption is available today as an inexpensive option from leading PC vendors, and Wave provides the industry’s most comprehensive management solution. Wave is the only solution that delivers drive initialization, user management, drive locking, user recovery and crypto erase for all Opal-based, proprietary and solid-state SEDs. “YOU MAY FIND YOUR „„ Microsoft BitLocker®: Wave provides automated turn-key ORGANIZATION IS IN A management for Microsoft BitLocker encryption, which is SIMILAR SITUATION TO suitable for organizations that have not yet phased SEDs into PWC, WHICH MAY LEAD YOU their computers and who are migrating to Win7 that have TO USE TPM FOR STRONG Microsoft Enterprise Agreements or Software Assurance for AUTHENTICATION.” Volume Licensing. KARL WAGNER, PWC „„ Software Encryption: In cases where SEDs are not an option, DIRCTOR, GLOBAL IT Wave offers its award-winning Safend Encryptor software, which automatically encrypts all data files without any negative effect on system performance. „„ Removable Media Encryption: With Wave, you can easily encrypt data-in-motion on removable storage devices, external hard drives and CD/DVDs. Detect emerging threats Wave lets you ensure that only the devices you trust are attached to your networks and services. Our solutions tell you what’s happening with your security as it’s happening, and enables you to prove your data is safe at all times. „„ Guarantee only known devices gain access to your networks and services „„ Spot Advanced Persistent Threats by detecting unauthorized changes to the pre-boot environment, as your systems power on „„ Know who is connecting what devices to each and every port on each and every endpoint „„ Locate, classify and map sensitive data stored on network endpoints6
  9. 9. 7
  10. 10. PRODUCTS Wave EMBASSY® Remote Administration Server (ERAS) Wave ERAS provides all the tools you need to remotely search for, initialize, configure and administer a global fleet of computers equipped with self- encrypting drives (SEDs) and Trusted Platform Modules (TPMs). With ERAS, you can centrally provision security policies to end-points across your organization, limit access of encrypted information to authorized individuals and remotely manage user and device credentials. Most importantly, ERAS grants an authority of proof, allowing organizations to demonstrate that they were, and are, compliant with regulations in the wake of a security breach. Wave for BitLocker® Management Wave for BitLocker Management provides a turn-key solution for intuitive, centralized management of Microsoft BitLocker encryption across your organization. Set policies, with a click of a button, and monitor your security from a single console—dramatically simplifying your deployment by eliminating the need for specialized knowledge or costly systems. Wave Cloud Wave Cloud is scalable, yet a powerful software-as-a-service solution for data protection. Deployed quickly and managed efficiently, it allows organizations to centrally enforce strong data encryption policies on laptops across the enterprise—but without the complexity and cost associated with an on-premise solution. Wave Cloud is the only Cloud-based service that lets you manage SEDs. Wave Endpoint Monitor Wave Endpoint Monitor (WEM) is the industry’s first embedded solution for detecting Advanced Persistent Threats that install malware within a computer’s pre-boot environment. Such attacks can allow hackers to silently monitor a user’s keystrokes, invade networked machines, or upload sensitive data—all while remaining invisible to both the user and the computer’s anti-virus security defenses. WEM counters such threats by leveraging the TPM to scan a system’s pre-boot environment for anomalous behaviors. If it detects such anomalies, WEM immediately alerts IT authorities with real-time analytics.8
  11. 11. PRODUCTSSafend ProtectorSafend Protector defends your organization from the risks associated withendpoint data leakage. It enforces encryption of all data transferred toremovable storage devices, and grants control over every physical and wirelessport across your organization. Now you can intelligently allow, block or restrictthe usage of any or all computer ports across your company according to thecomputer on which they are located, the user who is logged in and/or the typeof port. Plus, Safend Protector can detect and selectively restrict devices bydevice type, model and even by specific device serial number.Safend EncryptorSafend Encryptor automatically encrypts all data files, while avoiding encryptionof the operating system and program files. This innovative concept minimizesthe risk of operating system failure, and has a negligible impact on systemperformance—seamlessly protecting your data, without changing any of yourexisting end-user or helpdesk workflows.Safend InspectorSafend Inspector prevents data leakage from common data transfer methods. Itenforces data-centric security policies across multiple channels, including email,web (HTTP, HTTPS), FTP, external storage devices, CD/DVD burners, PDA devicesand printers—all without disrupting legitimate business processes or impactingend-user productivity.Safend DiscovererSafend Discoverer maps and locates sensitive data stored on network endpointsand shares. Running in the background with minimal system impact, it savesvaluable time by expertly mapping data to disclose unsecured informationand at-risk business processes. Armed with this information, administrators candramatically improve security before a breach occurs. 9
  12. 12. The Leader in Embedded Security Management Leading device and software vendors, government cyber- The Leader in security officials and independent industry analysts all agree: Embedded security is the future. But it was WaveEmbedded Security Management Systems that blazed the trail for the technology. Today, we are the industry’s most experienced partner and its most comprehensive source for embedded security solutions. A few credits we’ve Leading device and software vendors, government cyber-security earned: officials and independent industry analysts all agree: Embedded security is the future. But it was Wave Systems that blazed the trail 1. for the technology. Today, we are the industry’s most experienced Wave pioneered the industry’s first enterprise-level partner and its most comprehensive source for embedded security embedded security solutions, and currently supports the management platforms. A few credits we’ve earned: world’s largest deployments. Our client list includes one of Detroit’s Big1. Automakers, as well as market leadersenterprise-level 3 Wave pioneered the industry’s first like BASF and Pricewaterhouse Coopers.solutions, and currently supports the embedded security world’s largest deployments in Financial, Healthcare and 2. Wave was a founding board member of the list includes one of Detroit’s Big Government. Our client Trusted Computing Group, where it helped defineas market leaders like BASF and 3 Automakers, as well international Pricewaterhouse Coopers. open standards for Trusted Platform Modules and Self- Encrypting Drives. Wave was a founding board member of the Trusted 2. 3. Computing Group, where it helped define international Wave is a lead contributor of federal guidelines for open standards for Trusted Platform Modules and Self- embedded security, such as NIST Special Publication Encrypting Drives. 800-155 which establishes standards for using TPMs to 3. Wave is a lead contributor of federal guidelines for counter Advanced Persistent Threats. embedded security, such as NIST Special Publication 4. Wave is an embedded security innovator, withstandards for using TPMs to 800-155 which establishes an counter Advanced Persistent Threats. intellectual property portfolio comprising 16 issued patents and 354. Wave is a top innovator, with an intellectual property more on file. portfolio comprising 16 patents on embedded security, with 35 more on file.10
  13. 13. The FutureAs the corporate perimeter continues to vanish, Elvis isn’t theonly one leaving the building. Your mobile workforce is almostcertainly growing. As it does, your people will expect the flexibilityof an office without walls to meet the growing demands of theirprofessional and personal lives. With that expectation therewill come increasing demands for anytime anywhere access toinformation. If they haven’t already, expect people to start askingquestions about using their personal computers, smart phonesand tablet devices for work.Meanwhile, there’s the Cloud, which promises to deliver yourpeople timely access to email, sales contacts, and benefitsanywhere in the world. But for you, that promise will feel likepressure—pressure to eliminate complex network connections, andlet data be available on-demand. But delivering on that promisedoesn’t let you off the hook for protecting information security.Your network endpoints may still be multiplying. AdvancedPersistent Threats (APTs) may still be evolving. Yet, you’re stillaccountable for ensuring the safety of all the critical businessinformation and trade secrets that your organization is storing,accessing and sharing… Out there.Your users and applications have left the building. There’s alreadya billion devices out there and counting. Where will you draw theline of defense that will protect your business and your brand?Arm your devices! 11
  14. 14. Wave Systems Corp. 480 Pleasant Street Lee, MA 01238 toll free: (877) 228-WAVE tel: (413) 243-1600 fax: (413) 243-0045 03-000313/version 1.00 Release date: 02-24-201212 Copyright © 2012 Wave Systems Corp. All rights reserved. Wave logo is trademark of Wave Systems Corp. All other brands are the property of their respective owners. Distributed by Wave Systems Corp. Specifications are subject to change without notice.
  15. 15. the ITBecauseperimeter hasvanished,security muststart with thedevice. 13

×