Risk
2/26/2014
12:31 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Wave Systems Begins Shipping its Management Software With Samsung Electronics' TPM Security Chips

With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit

Lee, MA--February 24, 2014--Wave Systems Corp. (NASDAQ: WAVX) announced the inclusion of its management software on Samsung Electronics' new Trusted Platform Module (TPM). The TPM chip, combined with Wave's EMBASSY Security Center, provides enterprises with a powerful tool to ensure endpoint and network security.

The TPM is a secure micro-controller with cryptographic features that provides a root of trust and enables the secure generation of keys (with the ability to limit the use of the keys to signing/ verification or encryption/decryption). With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit; protect digital certificates for more secure remote access via VPN or wireless network; establish second-factor authentication with virtual smart cards in place of one-time password tokens or physical smart cards; and strengthen Microsoft BitLocker encryption.

"As the world's leading semiconductor manufacturer, Samsung's entry into the TPM market signals an important development in hardware-based security built on industry standards," said Wave CEO Bill Solms. "This news builds on Wave's already-strong partnership with Samsung and long history of collaboration."

Wave collaborated with Samsung Electronics during the development of their TPM chip; in addition to supplying the management software Wave played an instrumental role in helping Samsung during the development process.

EMBASSY Security Center enables all functions of the TPM, with applications varying from hardware-based data encryption to ensuring that only known users and their devices can access corporate resources. The keys are secured by the device itself, making them less vulnerable to tampering.

Supported on Windows 8, Windows 7, Windows Vista, and Windows XP, Samsung's TPM security chip is available to all original equipment manufacturers (OEMs) and is compatible to configurations shipping on all business-class systems. Under the agreement, Wave's EMBASSY® Security Center (ESC) – Samsung Edition, TPM Software Stack ("TSS"), EMBASSY® Trusted Suite (ETS) – Samsung Edition, and EMBASSY® Security Center (ESC) Pro – Samsung Edition will be available for distribution.

Samsung's development of the TPM marks growing support from the global technology firm. Last month, Samsung introduced the 840 EVO solid-state (SSD) self encrypting drive that is compliant with the Opal standard from the Trusted Computing Group. Wave provides management software for the 840 EVO.

About Wave Systems

Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2012-0871
Published: 2014-04-18
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.

CVE-2012-6646
Published: 2014-04-18
F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors.

CVE-2013-4279
Published: 2014-04-18
imapsync 1.564 and earlier performs a release check by default, which sends sensitive information (imapsync, operating system, and Perl version) to the developer's site.

Best of the Web