Risk
2/26/2014
12:31 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Wave Systems Begins Shipping its Management Software With Samsung Electronics' TPM Security Chips

With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit

Lee, MA--February 24, 2014--Wave Systems Corp. (NASDAQ: WAVX) announced the inclusion of its management software on Samsung Electronics' new Trusted Platform Module (TPM). The TPM chip, combined with Wave's EMBASSY Security Center, provides enterprises with a powerful tool to ensure endpoint and network security.

The TPM is a secure micro-controller with cryptographic features that provides a root of trust and enables the secure generation of keys (with the ability to limit the use of the keys to signing/ verification or encryption/decryption). With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit; protect digital certificates for more secure remote access via VPN or wireless network; establish second-factor authentication with virtual smart cards in place of one-time password tokens or physical smart cards; and strengthen Microsoft BitLocker encryption.

"As the world's leading semiconductor manufacturer, Samsung's entry into the TPM market signals an important development in hardware-based security built on industry standards," said Wave CEO Bill Solms. "This news builds on Wave's already-strong partnership with Samsung and long history of collaboration."

Wave collaborated with Samsung Electronics during the development of their TPM chip; in addition to supplying the management software Wave played an instrumental role in helping Samsung during the development process.

EMBASSY Security Center enables all functions of the TPM, with applications varying from hardware-based data encryption to ensuring that only known users and their devices can access corporate resources. The keys are secured by the device itself, making them less vulnerable to tampering.

Supported on Windows 8, Windows 7, Windows Vista, and Windows XP, Samsung's TPM security chip is available to all original equipment manufacturers (OEMs) and is compatible to configurations shipping on all business-class systems. Under the agreement, Wave's EMBASSY® Security Center (ESC) – Samsung Edition, TPM Software Stack ("TSS"), EMBASSY® Trusted Suite (ETS) – Samsung Edition, and EMBASSY® Security Center (ESC) Pro – Samsung Edition will be available for distribution.

Samsung's development of the TPM marks growing support from the global technology firm. Last month, Samsung introduced the 840 EVO solid-state (SSD) self encrypting drive that is compliant with the Opal standard from the Trusted Computing Group. Wave provides management software for the 840 EVO.

About Wave Systems

Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web