Risk
2/26/2014
12:31 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Wave Systems Begins Shipping its Management Software With Samsung Electronics' TPM Security Chips

With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit

Lee, MA--February 24, 2014--Wave Systems Corp. (NASDAQ: WAVX) announced the inclusion of its management software on Samsung Electronics' new Trusted Platform Module (TPM). The TPM chip, combined with Wave's EMBASSY Security Center, provides enterprises with a powerful tool to ensure endpoint and network security.

The TPM is a secure micro-controller with cryptographic features that provides a root of trust and enables the secure generation of keys (with the ability to limit the use of the keys to signing/ verification or encryption/decryption). With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit; protect digital certificates for more secure remote access via VPN or wireless network; establish second-factor authentication with virtual smart cards in place of one-time password tokens or physical smart cards; and strengthen Microsoft BitLocker encryption.

"As the world's leading semiconductor manufacturer, Samsung's entry into the TPM market signals an important development in hardware-based security built on industry standards," said Wave CEO Bill Solms. "This news builds on Wave's already-strong partnership with Samsung and long history of collaboration."

Wave collaborated with Samsung Electronics during the development of their TPM chip; in addition to supplying the management software Wave played an instrumental role in helping Samsung during the development process.

EMBASSY Security Center enables all functions of the TPM, with applications varying from hardware-based data encryption to ensuring that only known users and their devices can access corporate resources. The keys are secured by the device itself, making them less vulnerable to tampering.

Supported on Windows 8, Windows 7, Windows Vista, and Windows XP, Samsung's TPM security chip is available to all original equipment manufacturers (OEMs) and is compatible to configurations shipping on all business-class systems. Under the agreement, Wave's EMBASSY® Security Center (ESC) – Samsung Edition, TPM Software Stack ("TSS"), EMBASSY® Trusted Suite (ETS) – Samsung Edition, and EMBASSY® Security Center (ESC) Pro – Samsung Edition will be available for distribution.

Samsung's development of the TPM marks growing support from the global technology firm. Last month, Samsung introduced the 840 EVO solid-state (SSD) self encrypting drive that is compliant with the Opal standard from the Trusted Computing Group. Wave provides management software for the 840 EVO.

About Wave Systems

Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7052
Published: 2014-10-19
The sahab-alkher.com (aka com.tapatalk.sahabalkhercomvb) application 2.4.9.7 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7056
Published: 2014-10-19
The Yeast Infection (aka com.wyeastinfectionapp) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7070
Published: 2014-10-19
The Air War Hero (aka com.dev.airwar) application 3.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7075
Published: 2014-10-19
The HAPPY (aka com.tw.knowhowdesign.sinfonghuei) application 2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-7079
Published: 2014-10-19
The Romeo and Juliet (aka jp.co.cybird.appli.android.rjs) application 1.0.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.