Risk
2/26/2014
12:31 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Wave Systems Begins Shipping its Management Software With Samsung Electronics' TPM Security Chips

With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit

Lee, MA--February 24, 2014--Wave Systems Corp. (NASDAQ: WAVX) announced the inclusion of its management software on Samsung Electronics' new Trusted Platform Module (TPM). The TPM chip, combined with Wave's EMBASSY Security Center, provides enterprises with a powerful tool to ensure endpoint and network security.

The TPM is a secure micro-controller with cryptographic features that provides a root of trust and enables the secure generation of keys (with the ability to limit the use of the keys to signing/ verification or encryption/decryption). With the TPM, IT can detect unauthorized changes in the boot process that could signal the presence of a rootkit; protect digital certificates for more secure remote access via VPN or wireless network; establish second-factor authentication with virtual smart cards in place of one-time password tokens or physical smart cards; and strengthen Microsoft BitLocker encryption.

"As the world's leading semiconductor manufacturer, Samsung's entry into the TPM market signals an important development in hardware-based security built on industry standards," said Wave CEO Bill Solms. "This news builds on Wave's already-strong partnership with Samsung and long history of collaboration."

Wave collaborated with Samsung Electronics during the development of their TPM chip; in addition to supplying the management software Wave played an instrumental role in helping Samsung during the development process.

EMBASSY Security Center enables all functions of the TPM, with applications varying from hardware-based data encryption to ensuring that only known users and their devices can access corporate resources. The keys are secured by the device itself, making them less vulnerable to tampering.

Supported on Windows 8, Windows 7, Windows Vista, and Windows XP, Samsung's TPM security chip is available to all original equipment manufacturers (OEMs) and is compatible to configurations shipping on all business-class systems. Under the agreement, Wave's EMBASSY® Security Center (ESC) – Samsung Edition, TPM Software Stack ("TSS"), EMBASSY® Trusted Suite (ETS) – Samsung Edition, and EMBASSY® Security Center (ESC) Pro – Samsung Edition will be available for distribution.

Samsung's development of the TPM marks growing support from the global technology firm. Last month, Samsung introduced the 840 EVO solid-state (SSD) self encrypting drive that is compliant with the Opal standard from the Trusted Computing Group. Wave provides management software for the 840 EVO.

About Wave Systems

Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant