Risk
2/26/2014
12:31 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Wave Systems Begins Shipping its Management Software With Samsung Electronics' TPM Security Chips

With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit

Lee, MA--February 24, 2014--Wave Systems Corp. (NASDAQ: WAVX) announced the inclusion of its management software on Samsung Electronics' new Trusted Platform Module (TPM). The TPM chip, combined with Wave's EMBASSY Security Center, provides enterprises with a powerful tool to ensure endpoint and network security.

The TPM is a secure micro-controller with cryptographic features that provides a root of trust and enables the secure generation of keys (with the ability to limit the use of the keys to signing/ verification or encryption/decryption). With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit; protect digital certificates for more secure remote access via VPN or wireless network; establish second-factor authentication with virtual smart cards in place of one-time password tokens or physical smart cards; and strengthen Microsoft BitLocker encryption.

"As the world's leading semiconductor manufacturer, Samsung's entry into the TPM market signals an important development in hardware-based security built on industry standards," said Wave CEO Bill Solms. "This news builds on Wave's already-strong partnership with Samsung and long history of collaboration."

Wave collaborated with Samsung Electronics during the development of their TPM chip; in addition to supplying the management software Wave played an instrumental role in helping Samsung during the development process.

EMBASSY Security Center enables all functions of the TPM, with applications varying from hardware-based data encryption to ensuring that only known users and their devices can access corporate resources. The keys are secured by the device itself, making them less vulnerable to tampering.

Supported on Windows 8, Windows 7, Windows Vista, and Windows XP, Samsung's TPM security chip is available to all original equipment manufacturers (OEMs) and is compatible to configurations shipping on all business-class systems. Under the agreement, Wave's EMBASSY® Security Center (ESC) – Samsung Edition, TPM Software Stack ("TSS"), EMBASSY® Trusted Suite (ETS) – Samsung Edition, and EMBASSY® Security Center (ESC) Pro – Samsung Edition will be available for distribution.

Samsung's development of the TPM marks growing support from the global technology firm. Last month, Samsung introduced the 840 EVO solid-state (SSD) self encrypting drive that is compliant with the Opal standard from the Trusted Computing Group. Wave provides management software for the 840 EVO.

About Wave Systems

Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web