Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Nice Wave Document (CAC card mentioned)
http://www.trustedcomputinggroup.org/files/resource_files/D4B369A9-1A4B-B294-D09294642C4EC92E/Wave%20Systems.pdf
Wave now an observer member of GlobalPlatform
http://www.globalplatform.org/membershipcurrentview.asp?id=113
Also interesting that DOD is a member
http://www.globalplatform.org/membershipcurrentview.asp?id=14
Looks like Joseph Souren is not fooling around and clearly sets a good example for Wave North America sales personnel. Good sales strategy about to meet real incipient demand? I think so. Foam
New Channel Partners for Wave
http://www.wave.com/partners/channelpartnersEMEA.asp
Wavedreamer - wouldn't it boil down to determining how the endorsement key is guaranteed in a system that doesn't have a discrete MTM with factory installed EK and certificate? From what I remember the key could be in non-volatile authenticated memory, but not sure how you attest to the key's authenticity in such a system (Trusted Third Party over the air?). Needs clarification.... Foam
Hi Cartoon,
I don't think the reference is to Wave's software. As far as I understand, Wave would provide a client app. that would leverage the MTM within a trusted network first for authentication and later for secure services. The software referenced would be lower down the stack, I assume. In theory, Wave's client app. would be interchangeable with any other (i.e. open standards), but in practice they definitely have a head start with years of research, trials, an installed base on and compatibility with many computers (with which mobile devices would have to interact), and now a working relationship with a very important player in the mobile space (Samsung). Foam
Dreamer/Taxi - What about the following statement?
http://www.theregister.co.uk/2012/02/29/trusted_computing/print.html
To be secure the cryptographic keys and software, need to be installed during manufacture, so what's being shown in Barcelona is a proof-of-concept rather than something one could deploy onto today's phones - but it's a proof-of-concept which could quickly be integrated if the handset manufacturers wish to.
Interesting Mobile TC job
http://jobview.monster.com/Product-Security-Engineer-Job-San-Diego-CA-US-107212868.aspx
Product Security Engineer
About the Job
The Cydio Group ( www.cydio.com ) is a premier IT staffing company. Founded by IT professionals, The Cydio Group differentiates itself by bringing first-hand IT knowledge and experience to the IT staffing industry.
A prominent Fortune 500 company in San Diego has an immediate W2 contract opening for a Product Security Engineer. If you or someone you know may be interested, please respond today!
Responsibilities:
- The individual will perform risk and threat analyses on features, products and services and communicate the results of those analyses with internal customers.
- He/she may also design and recommend security controls to put in place to mitigate the identified risks.
Skills/Experience:
- Applicants should have expertise in two or more of the following areas:
- Risk Analysis/Threat Modeling
- Embedded Systems
- Mobile Operating System Security
- Software/Firmware Security
- Security Protocol Analysis
- Cryptography - Digital Rights Management (DRM)
- Consumer Device Security
- Network Security
- Knowledge in the following specific areas will be considered a plus:
- Mobile operating system internals (Android, Windows Phone, iOS)
- Trusted computing architectures (TPM, ARMs TrustZone)
- Wireless communication systems and protocols ( CDMA/GSM/UMTS/LTE, Bluetooth, 802.11, NFC, ZigBee)
- Security protocols (SSL/TLS, PKI, IPsec, Kerberos)
- ARM architecture
Education:
- Graduate degree in electrical engineering or computer science with a focus on a security-related field is a plus.
*** Must be able to work on a W2 in the US for any employer without sponsorship (i.e., no H1B) ***
Dig, it's why I find Samsung's decision particularly illuminating. They sell all kinds of devices that are run on different OSs, they sell parts (i.e. TPMs) to different OEMs who may also use different OSs, and I think are well placed to understand that as all kinds of devices get networked a kind of universal adapter, as you say, will be necessary. He who meets the least resistance at the sale point (OK, works with this works with that, I'll buy it), will have a happy sales flow.... Foam
Dig, Let me also clarify. I guess I'm just testing the idea that Samsung went to Wave precisely because they intend to make use of both Android and Win 8 - hence building Wave into the chips that presumably will go into devices of different OS flavors. The Wave client can span multiple OSs in one network environment or collaborating networks (as in MIB), also can do pre-boot in one network (for devices running different OSs), and perhaps also Win 8 doesn't necessarily make Wave's client so redundant - for this last point, I think we currently don't know enough to nail it down for sure. Foam
Hi Dig, No way to know for sure until more info is released, I guess. The fact that Samsung seems to be building a Wave client right into TPM chips they intend to sell (presumably to all kinds of devices running all kinds of OSs) seems to belie your Android vs Windows 8 guess. Seems to me it would be a lot neater to have one universal TC client spanning all devices and hooked into the centralized server management. But I have to admit I am scratching my head over some of the Windows 8 TC features. Foam
Awk - it would be strange for Samsung to begin TC development with Wave slightly before the release of a Windows 8 product that would purportedly subsume the very type of Wave client that Samsung seemed interested in taking up for their own purposes. No doubt Samsung and other OEMs have a pretty good sense of what's going to be offered with Windows 8 (i.e. in TC) and yet they continue to show interest in developing some TC interface via Wave. Methinks some of this needs clarification. Cheers, Foam
UUsilehto (Nokia) NATO talk
Lecture Series on Next Generation Communications
http://www.rto.nato.int/page.asp?ID=742&t=Lecture%20Series%20on%20Next%20Generation%20Communications
Military operations have become less predictable and much more mobile. The decreasing size of military forces has been countered by much improved military capabilities. However these changes have made effective military communications more important than ever before.
The long term trends in society and in the development of networking and communication technologies that have existed for years probably still continue for long, and many of them affect in all segments of technology. In addition, the cycle that produces new technologies from the first proposals to everyday use can be about ten years. The long development delay is mostly due to the difficulty of standardization. The probable technological development of the wireless and wired network systems is thus rather predictable while it is always difficult to estimate the commercial success of new technologies.
On the other hand, time, new short term changes are almost unpredictable, while they may quickly and radically change the operational environment and scenarios. Typically the hit technologies are not really new or ingenious, but they become hot after their price level changes or a new business innovation opens new opportunities for them. Crucial technological breakthroughs also happen; these are easier to predict as often they result from a long-term work in basic research.
The objective of this lecture series is to address future trends in selected segments of technologies starting from their current state and extending several years ahead, describing the expected development of these technologies. Particular attention is given to what opportunities and/or threats these trends pose to military communication. At best, new technologies may enable more efficient operations and enhance interoperability with increased cost effectiveness. At worst, hasty deployment of newest and hottest technology may lead to expensive and eventually non-functioning solutions.
Effective and efficient use of radio spectrum (by Dr. Tricia WILLINK)
Access to the RF spectrum underpins almost every activity within the military sphere. Advances in application technologies continue to increase the demand for the limited amount of spectrum that is available to national defence forces. In coalition actions, many nations have to share this resource and recent experience has shown that many nations are unable to exploit their full capability of spectrum-dependent systems. Two possible approaches to addressing this problem will be addressed in these lectures. One is to use the available spectrum more efficiently, achieving greater throughput per unit of frequency bandwidth. This may be through better waveform design and digital signal processing or newer concepts such as multi-input multi-output (MIMO) systems. A second, complementary, approach is to change the policies regarding access to spectrum. In place of the current system of fixed allocations, a more dynamic strategy would be to exploit opportunities where spectrum may be unused. Radio networks, and other spectrum-dependent devices, might make their own, local decisions about frequency and bandwidth parameters, or these decisions might be made in real-time by a central authority. These lectures on "Efficient and Effective Spectrum Access" will look at these two areas, and will discuss the potential advantages and challenges of implementing new concepts for future military systems.
Biography of Tricia Willink
Tricia Willink received her MA from Cambridge University, UK and her PhD from Queen's University at Kingston, Canada. Tricia has been a Research Scientist at the Communications Research Centre, Ottawa, Canada since 1994. She started working in HF communications, and later developed R&D programs in MIMO and spectrum access. Her research interests include channel measurement, analysis and modeling and signal processing techniques for efficient and effective spectrum use.
Nature of product security in consumer business and Industry in action, standards, forums and
challenges in global product security (by Mr. Janne UUSILEHTO)
This presentation discusses the basic nature of security, concentrating not only on what product security is but also on what it appears to be, depending on its use and users expectations. What makes product security eternal failure and more often than not a continuous investment for many other things than just implementation of security features? This presentation also addresses the different approaches for the implementation of the assets protection. Second part of the presentation gives some examples how consumer services and devices industry is responding to the increasing need of better product security, what are the challenges in global market place and what kind of industry forums there are out there. This presentation shares some views of how the future security standards may look like. Presentation is technical in nature, but will focus higher level issues, use cases and concepts.
Biography of Janne Uusilehto
Mr. Janne Uusilehto has a long experience in ICT industry, having begun his career already during his studies in 1982 as an independent SW developer and consultant for small businesses.
He began working with security related tasks as an IT Support and Electronic Banking Specialist in several Finnish banks. The latest bank position was in Nordea (then Merita-Nordbanken) as a global Cash Management Specialist and product responsible for the telecommunication aspects of cash management software. Amongst other duties, Mr. Uusilehto was a member of the Merita-Nordbanken Cash Management Services team who initiated Internet sales portals in Finland in the mid 1990’s.
Nokia recruited Mr.Uusilehto in 1998. His current position is as Director and Head of Nokia Product Security, globally responsible for Nokia product security development. His team is the overall owner of Product Security and product security-related education, awareness, process improvement tasks, and related industry collaboration globally.
Janne Uusilehto is also a member of several Nokia internal security related management boards, Nokia’s main representative and board member to Trusted Computing Group, Chairman of TCG Mobile Phone Working Group, Strategic Director for Global Platform and Nokia’s main representative and board member in the SAFECode forum.
Interesting Intel talk on internationalization of security standards
http://docbox.etsi.org/Workshop/2012/201201_SECURITYWORKSHOP/3_INTERNATIONAL_STANDARDIZATION/INTEL_VISHIK.pdf
Wave and Samsung at Storage Visions
http://www.trustedcomputinggroup.org/media_room/events/113
Storage Visions 2012
January 8, 2012 - January 9, 2012
Las Vegas, Nevada
When: January 8 - 9, 2012
Where: Rivieria Hotel and Convention Center, Las Vegas, Nevada
Join TCG at booth #31 where TCG members Samsung and Wave will demonstrate their products that support the TCG Opal specification for notebook PCs.
For more information, or to register for the conference, click here.
Return to events listing
New Wave Job
http://seeker.dice.com/jobsearch/result/WAVESYS/332-01/US/Software-Development/CA/Cupertino%7ECA/Security/c--position--contract-
C# position (Contract)
Wave Systems Corp. is an equal opportunity employer.
An exciting and rapidly growing software development company in the digital security arena is seeking a Senior Engineer to join their dynamic engineering team located in Cupertino, CA.
Responsibilities:
- This position will contribute in design, development, and maintenance of scalable enterprise application (ERAS) based on Microsoft technology.
- Perform testing and troubleshooting of existing systems.
- Work efficiently in a team environment
Requirements:
- 5+ experience in developing commercial scalable server/client or web service based software products
- Proficient in C#, .Net, Web Services, WCF, ASP.NET,
- Experience working with SQL Server, LINQ, able to write stored procedures.
- Strong debugging skills, ability to organize and write clean and maintainable code.
- Ability to perform assigned tasks independently, work in team environment and meet deadlines.
- Ability to troubleshoot and provide production support.
- Excellent interpersonal skills
What you be working on:
- Work with Product Management to develop technical specifications for new products.
- Design and development of client middleware and UI for security related applications.
- Troubleshoot issues, test and release to QA.
Education:
- Masters 2 years or Bachelor with 5 years of relevant experience.
Neelu Aulakh
Wave Systems Corporation
19925 Stevens Creek Blvd
Suite 220
Cupertino, CA 95014
Phone: (408) 517-6645
Fax: (800) 542-3220
Web: http://www.wave.com
2011 Made History; Let’s Learn From It in 2012
http://blog.wave.com/sprague/2011-made-history-let’s-learn-from-it-in-2012/
December 28, 2011
2011 Made History; Let’s Learn From It in 2012
Historians will label 2011 as the year when our IT security infrastructure failed us. The RSA and Sony breaches, attacks by Anonymous and LulzSec, even WikiLeaks drove home to the broad marketplace that when it comes to data security, cyber attackers can take down systems and steal data at will.
The worst thing is, we all saw it coming. We’re trapped in a reverse “Groundhog Day” scenario where things keep repeating but get worse instead of better. It brings to mind Winston Churchill’s adage, “Those that fail to learn from history are doomed to repeat it.”
I’m also reminded of the Maginot Line, France’s answer to World War I trench warfare that German tanks blitzed past on their way through Belgium in World War II. With both the Maginot Line and software-based IT security over the past several years, the establishment continued pouring resources into better, more expensive solutions for fighting the last war, instead of preparing for the next one. The difference, of course, is that the French abandoned the Maginot Line after it failed.
We’ve been fighting a new war with old weapons for a while now and our enemies – cybercriminals and Advanced Persistent Threats (APTs) – are breezing past our defenses and occupying our systems. We need a new strategy. We know what works – device-based security that ensures only known devices and users access networks and data. Protecting identity-authenticating encryption keys in hardware keeps the bad guys out.
Then as now, the problem isn’t technology, it’s the will to mobilize. Many vendors care more about quarterly profits and selling their entrenched (pun definitely intended) products instead of collaborating on new approaches to address a common mortal threat.
Eventually, the IT security industry will drop its myopic refusal to consider proven hardware-based security practices from other industries, such as telecommunications and cable. When was the last time you heard about cloned cell phones or stolen cable accounts?
Despite all the bad news this year, I’m still hopeful for 2012. Here are some of my thoughts on what we can expect in the coming year:
1. We will see a significant cyber attack on a major public utility or power grid of significant scope and size.
2. The actual “physicality” (size, type, etc.) of the mobile device will no longer define the device’s functionality. To explain further, whether you have a tablet, smartphone or laptop, the barriers to categorizing a device will blur.
3. Along the same lines, the BYOD phenomenon will continue to flourish and will put tremendous pressure on the software security model.
4. Other government agencies will follow the lead of NSA and DoD in promoting change as it relates to touting and deploying hardware-based security.
5. Major technology players will jump in with Intel (DeepSafe) and Microsoft (Windows in embracing embedded security solutions and best practices.
6. Apple’s IT security model will gain more recognition as a model worth emulating. Surprised? Most people are so absorbed with Apple’s aesthetics and user interfaces that they miss how Apple has created a perfect example of identity-centric security for enterprise networks. As one of the biggest suppliers of consumer IT devices, Apple wants people to access networks securely. So they allow only known users and devices, only five devices per user, every device must run whitelisted applications on an approved OS, and they require DRM for content. Managing one endpoint on their device-centered security model costs a tenth of what many enterprises pay for ineffective network-based security systems. I’d love to see more organizations copy that.
Anyway, let’s hope in 2012 we see large-scale implementation of lessons learned from history’s mistakes and today’s good examples. We’re at a tipping point; it’s our choice now how history will label us.
Nokia on Trusted Computing
Very technical presentation with interesting points at the end regarding NFC
http://www.fruct.org/sites/default/files/files/conference10/Mobile%20Trusted%20Computing.pdf
Recent Janne Uusilehto presentation, but you have to register
http://www.smart-event.eu/videos-uusilehto
Wave Systems - Endpoint Data and Device Security for the Banking Industry
http://www.banking-gateway.com/contractors/banking-security/wave-systems/
Wave Systems offers more than just another defence against endpoint data loss and network breaches. It provides everything you need to prove that your data is protected, and to know what devices are attached to your network. Wave is a leading source for trusted computing solutions, which shift the focus from add-on software to the security that is integrated in the hardware computing platforms you already own.
Together with Safend's award-winning data loss prevention products, Wave provides a truly comprehensive portfolio of solutions for data security, data leakage protection and device integrity for desktops, laptops and mobile devices. We are uniquely dedicated to building security 'from the ground up' and solving your most critical data-at-rest and data-in-motion security challenges.
Security software to protect vulnerable information
Wave Systems roots security software to trusted hardware built into your devices, ensuring that only known computers gain access to the network. With passwords, certificates and tokens all vulnerable to attack, Wave allows organisations to keep information secure by leveraging the trusted platform modules (TPMs) already on-board most corporate PCs and laptops from Dell, Lenovo and HP.
A TPM is a cryptographic security chip that acts as a built-in hardware token, except it imposes none of the incremental acquisition or deployment costs that conventional tokens incur. Wave allows companies to use TPMs for:
Device identification
Early detection of APTs
Device identification allows access only to known devices, simplifying data security and virtually eliminating the risk of hackers impersonating authorised personnel. TPMs can be used with any standard certificate authority and Wave's EMBASSY software to create hardware-based digital certificates for VPN, wireless or any other PKI-enabled applications.
With advanced persistent threats (APTs) appearing as normal traffic, new malware often goes completely unnoticed for long periods of time, and leads to critical data loss. Wave's software adds an additional layer of security that can discover rootkits, by scanning for changes in the pre-OS environment. In addition to activating and managing TPM policies and keys, Wave's software collects platform configuration register values each time a system powers on and compares these against a set of values known to be correct.
Endpoint data protection
Wave offers one of the most comprehensive portfolios of managed encryption solutions, as well as the latest technologies for preventing data leakage from ports, devices and removable media. Our management software provides powerful support for:
Self-encrypting drives (SEDs)
Microsoft BitLocker
Port and device control
Removable media encryption and content inspection
Wave encryption service (WES)
SEDs are the strongest full-disk encryption (FDE) platform available today. Wave's software provides remote management of all Opal-based, proprietary and solid-state SEDs currently offered as an inexpensive option from Dell, Lenovo or HP. Our industry-leading software is the most comprehensive solution for SED security policy management, reporting, centralised control and user recovery.
Integrated with the Windows 7 OS, Microsoft BitLocker substantially enhances encryption over conventional, third-party FDE software. Wave strengthens BitLocker security by enabling remote management of the TPM, and organising core Microsoft capabilities into a simple, intuitive administrative application for setting up and maintaining BitLocker clients. Through our port and device control solutions we empower our clients to defend their organisation against data loss through a single server, console and agent architecture. This provides centralised control and management over every physical port, wireless port and device across your enterprise.
Wave's software enables you to monitor, control and encrypt all file transfers to or from external storage devices, such as USB hard drives, disks on keys, memory sticks, SD cards, CDs and DVDs. We also make it simple to generate logs and send real-time alerts about information written to or read from these devices.
For small and medium-sized businesses, Wave Encryption Service (WES) lets you rapidly deploy compliance-grade, managed encryption across your business without the need for dedicated servers, software or other IT resources. WES automatically detects a computer's resident encryption capabilities, such as SEDs, Microsoft BitLocker and Microsoft Encrypting File System, and seamlessly adapts them to the service's online management interface
Data security and data leakage protection
Wave simplifies data security via trusted computing. Our solutions not only strengthen your information security, they also make it simpler to manage. We go well beyond passwords, tokens and third-party software to deliver data security, data leakage protection and device integrity that you can rely on.
The security risks and consequences posed by today's increasingly mobile workforce are rapidly evolving past the capabilities of conventional security. With Wave you can meet all your data and network security challenges today and lay the foundation to meet those of tomorrow.
Contact Details
Wave Systems EMEA
UK Office
47 Belgrave Square
London
SW1X 8QR
United Kingdom
Tel: +44 1235 520 956
Email: sweekes@wavesys.com
URL: www.wavesys.com
The trusted platform module delivers embedded hardware security, installed on half a billion devices around the world.
The Wave endpoint monitor uses the TPM to ferret out advanced persistent threats by scanning a system’s environment before the operating system loads and alerts the presence of malware.
Wave Systems' EMBASSY remote administration server (ERAS) is the highest quality management of endpoint and network security.
Moving to high value with the adoption of best-in-class security.
Bavarian State Government is a customer (not bad!!)
The potential for the public sector in the US and beyond is enormous, nice to see some traction in Europe like this. Foam
Forgot that Michael Willett is now with Samsung
(past keeps resurfacing to Wave's benefit, it seems)
http://storagevisions.com/2012Agenda.htm
10:30 to 12:00 AM B1: Protecting What we Have
Moderator: Michael Willett, Samsung
This session covers the challenges facing security of stored content, especially content on mobile devices. The low level technology underlying physical storage, both magnetic (hard drives) and electrical (flash memory) adversely affects traditional storage protection and erasure techniques. New, standardized products can resolve these protection issues and provide robust storage erasure. Other "hot buttons" in content protection will be highlighted. Come to this session armed with your security questions for open-mike Q/A.
Speakers:
Ben Thiel, Micron
David Duncan, Imation
Aidan Herbert, Wave Systems
Jorge Campello, Hitachi GST
Michael Willett, Samsung
Panelists:
Chris Bross, Drivesavers
Tom Coughlin, Coughlin Associates
Thanks everyone re:Samsung
A few points then:
1) It's great that Wave's solutions are now poised to move into a multiple OS environment. This will definitely make it harder for the competition or for an established gorilla (usually working in one of these environments) to muscle them out of the way. This is crucial for Wave going forward.
2) Wave is providing expertise on Samsung next gen. TPM which tells us that they are still the go-to people in Trusted Computing and seem to be well ahead of the competition in anticipating the future of TC. What's more, they will be the only player to have WORKING (i.e. interoperable, tested, debugged) solutions on past and future platforms - well, not really tested on future platforms, but their software will be baked into the platform, so to speak. Also, very important for someone who wants the simplest plug-and-play offering that will work without problems from day one across multiple endpoints.
3) Wave is clearly going to be deployed across much of Samsung's own product line which spans multiple devices and has pretty good market share, especially in the hottest emerging markets (smartphones, tablets).
What's not to like here? If I were a large public organization looking to secure its many endpoints from APTs etc. I would certainly love the roadmap Wave was showing me. Strange market reaction, Foam
Alea, just to put the final touches on this. Wave's role with Samsung on TPMs then is for non-PC devices primarily, in your opinion? Tablets and handsets from other OEMs are the main target here? Thanks, Foam
What I believe are the two dimensions to the Wave/Samsung Relationship
1) Wave also announced today that it will provide services, software and marketing to Samsung as part of Samsung's plans to enable semiconductor capabilities in its PC, tablet and consumer device product lines.
http://finance.yahoo.com/news/MEDIA-ADVISORY-Wave-Showcase-iw-2946922315.html?x=0&l=1
-Here Wave is said to provide TC solutions for Samsung's own product line.
2) "We look forward to providing Samsung's OEM customers the ability to turn on, manage and leverage the Trusted Platform Module with Wave's software, to deliver stronger security for end-users and better protection for their critical data," said Brian Berger
-Here Wave is said to provide TPM solutions for Samsung's OEM customers. So who exactly are these OEM customers? Dell, Acer, Asus (not such a big deal, Wave is already there)? HP (now that would be good news)? Apple (would be great as well)? Lenovo? Who exactly are we talking about here?
New Wave, Sorry to flog this horse some more but just to be clear on all of this. Are we looking potentially at inroads into Samsung's product line (tablets, handsets etc) and in addition to that Wave's product on TPMs from Samsung aimed at PCs from Dell, Acer, Asus (a bit redundant here, since Wave is already inside) and HP (now that in addition to Samsung would be really nice indeed). Just trying to get a clear grasp of the outlines of the new terrain emerging here. All of this can potentially be quite huge, in my mind. Regards, Foam
I suppose the ambiguity is deliberate, but this new relationship could potentially mean that Samsung is gearing up to load Embassy on its own product line and IN ADDITION sell next gen. TPM chips with some Wave functionality to other OEMs (Apple? or who exactly or we talking about). Regards, Foam
Just trying to sort out in my mind the ambiguity in the PR between Samsung as supplier to OEMs and Samsung as an OEM itself. On the one hand they seem to be offering TPM solutions for other OEMs and on the other they seem interested themselves in these solutions for their own product line. Any thoughts? Regards, Foam
MILCOM 2011: US Army commands address cyber and C4ISR challenges
http://www.shephardmedia.com/news/digital-battlespace/milcom-2011-us-army-commands-address-cyber-and-c4i/
The US armed forces must continue to push ahead with the development of cyber doctrine as budget restrictions reduce the amount of C4ISR equipment available to the warfighter, senior service officials have warned.
Addressing the MILCOM conference in Baltimore on 8 November, Maj Gen Randolph Strong, Commander of US Army Communications-Electronics Command (CECOM), and Lt Gen Rhett Hernandez, Commander of the US Army Cyber Command, both outlined their vision of the future in relation to the current and future operating environments.
'We are no longer bound by the heavy, kinetic and man-centric warfare of the past. Instead, we require precision lethality on the battlefield,' Strong told delegates while describing diminishing emphasis on the 'big five' capabilities which include Apache, Patriot, Bradley, Black Hawk and Abrams.
'Our focus is now on the network. Soldiers, sailors and airmen must be informed to make split second decisions while engaging the enemy, enabling every shooter to shoot effectively and think and decide on a common intent,' he continued.
'In theatre, C4ISR systems give them that combat edge and save lives on the battlefield. Whether you speak to General Petraeus or the soldier on point, C4ISR equipment allows them to take the fight to the edge.'
However, highlighting budget constraints, Strong warned that it was important to be able to 'do more with less'.
'We need to focus on the core stuff and minimise the nice to have stuff,' he stressed while referring to unused attachments on a Swiss Army knife as a comparison. 'With industry, we must work together. As we withdraw from Iraq and begin to downsize from Afghanistan, and in a new fiscal reality, we must adjust to having less in many areas but not in quality.'
Meanwhile, Hernandez described the army's 'most pressing' requirement to develop cyber space doctrine as well as a concept of operations. He added that his command must also act as a joint task force commander for operations around the world.
'We must treat [cyber] as a weapons system as we operationalise cyber space operations,' he stated. 'The army must fundamentally transform cyber in order to meet the challenges of the 2020 strategic environment.'
In addition, Hernandez revealed his 'wishlist' for the Cyber Command which included: shared situational awareness across both kinetic and non-kinetic domains; rapid and accurate attribution and forensic capabilities; rapid tool development to achieve effects for the full range of capabilities; [b]trusted computing and identification validation; cyber environment change detection; and finally increased automated decision logic.
'Cyberspace is already a game changer. Our adversaries know this and are acting on it,' he urged. 'There are evolving cyber threat capabilities. Now, there is potential limited disruption to mission command. Next, potential destruction and isolation of tactical forces. Our mission commands are increasingly reliant on networks and they will become more and more at risk. We need to increase capacity and capabilities to conduct all forms of cyber operations,' Hernandez concluded.
National Security Agency Information Assurance Directorate and Trusted Computing Group win 2011 National Cybersecurity Innovation Awards
http://www.prnewswire.com/news-releases/national-security-agency-information-assurance-directorate-and-trusted-computing-group-win-2011-national-cybersecurity-innovation-awards-133401078.html
Resurrecting the promise of application white listing and network access control
WASHINGTON, Nov. 7, 2011 /PRNewswire-USNewswire/ -- The SANS Institute announced today that the National Security Agency Information Assurance Directorate and the Trusted Computing Group have won the 2011 U.S. National Cybersecurity Innovation Award for their innovative use of available technologies to revive the key defenses of application white listing and comply-to-connect network access control.
(Photo: http://photos.prnewswire.com/prnh/20111107/DC02013-a)
(Photo: http://photos.prnewswire.com/prnh/20111107/DC02013-b)
Two very promising defensive strategies, application white listing and network access control, have unfortunately failed to deliver the benefits they promised. Application white listing involves blocking any program from being executed on a computer unless that program is in a pre-approved list (white list). It is very effective in stopping unauthorized software from being run by malicious outsiders, and is the single most important defense against the targeted intrusions that comprise the bulk of successful information exfiltration attacks. Sadly, white listing has proven to be nearly impossible to implement cost-effectively because of the difficulty in maintaining an up-to-date white list while hundreds of common programs are being continually updated.
Network access control is a system for blocking users seeking to access a network unless the user's computer can be proven to meet a series of security thresholds helping to ensure it will not carry infections into the network. This too has failed to gain broad acceptance because of the difficulty in testing computers that are constantly changing their configuration.
Earlier this year the National Security Agency, with help from the Trusted Computing Group, launched an innovative pilot program to implement both technologies in ways that avoided the problems faced by pioneers. The pilot program has proven to be effective in hindering the spread of targeted attack infections as well as often causing systems that are infected to announce that fact to administrators who can immediately take action.
As a result, the National Security Agency Information Assurance Directorate and the Trusted Computing Group win the 2011 National Cybersecurity Innovation Award for eliminating security weaknesses that enable targeted cyber-attacks to succeed.
Because of the importance of these techniques, a webcast is being scheduled for late November at which the winners will explain the techniques they used and users around the world will be able to get answers to questions so they can implement the technologies quickly.
Wave job posting for federal govt.?
http://jobview.monster.com/Federal-Sales-Engineer-Job-washington-DC-US-103316797.aspx
Federal Sales Engineer
About the Job
Federal Sales Engineer - MUST Have exposure with DoD Dept of Defense - Public Sector
Washington DC area - no relocation package
Great company, Great Team, Great Growth Opportunities, Great Stock and Benefits Plan
We are looking for (2) Sales Engineers(no quota position) . We are a leading provider of client and server software for hardware-based digital security, enabling organizations to know who is connecting to their critical IT infrastructure, protect corporate data, and strengthen the boundaries of their networks. The core products are based around the Trusted Platform Module (TPM), the industry-standard hardware security chip that is included as standard equipment on most enterprise-class PCs shipping today. A TPM is a highly secure cryptographic support system. It generates, stores and processes keys, which can be used to encrypt information and harden identities. It provides a broad range of security features, but because the TPM works independently of the operating system, it can serve as a “root of trust,” verifying the integrity of the machine and user.
MUST haves for this position include:
· Experience in hardware based digital security solutions
· Experience in selling or marketing security and/or storage solutions
· MUST have superior negotiation skills
· MUST be a problem solver, solution oriented player within a Team environment
Also, looking for these skills as well to bring on best of breed talent:
· Providing technical expertise and support to our Enterprise sales team
· Developing technical proposals and responses to RFPs
· Preparing technical presentations, documentation and whitepapers
· Delivering and implementation on contracts
· Implementing development and integration at customer sites
· Drive Technical side of the sale process
· Gather market information Competitors Products, capabilities, and plans
· Create mindshare around the company’s technologies
· Create and Maintain a strong team relations with the Pre sales process
The successful candidate will meet the following minimum requirements:
· Detailed knowledge of, and experience with Windows Server, Active Directory, PC system and network security, biometrics, cryptography, smart cards and public key infrastructure (PKI) is required
· Bachelor's degree in Computer Science or Information Technology (or equivalent) and a minimum of five years technical experience. BSEE Preferred, MBA is a PLUS
· Knowledge of, and/or experience with, current trends in 'Trusted Computing'
· Strong verbal and written communications skills
· Detail-oriented, deadline-driven, ability to prioritize and multi-task.
· Self-starter who has the ability to work independently to achieve results.
· Experience with contracts, management SOWs.
· Strong computer skills including Microsoft Word, PowerPoint, Excel and Outlook.
· Ability to work as part of a team.
· Ability to travel (up to 50%) - ideal candidate near a major airport.
Salary and Benefits:
Salary for this position will be commensurate with experience. We offer extensive benefits, including medical and dental insurance (95% paid by the company), short- and long-term disability, employee stock option and stock purchase plans, life insurance, paid sick, holidays and vacation. Casual dress code too!
Wave solutions part of EC-Council course on Advanced Network Defense
(Provide best practices training for many government agencies worldwide)
http://www.eccouncil.org/training/advanced_security_training/courses/cast-614.aspx
Windows Server 2008 Security (Part II)
IPsec Rules
Firewall Scripting
netsh
Isolating a Server
Group Policy Object
Server Isolation Steps
Domain Isolation
Domain Isolation Issues
Best Practices
Trusted Platform Module
Wave Systems
TPM Architecture
Crypto API
Example
Embassy Server Software
Embassy Client Software
Self-Encrypting Drives
LAB: TPM
Looks like Nokia is going with Trusted Execution Environment
(first time I see this - abstracted MTM?)
http://www.developer.nokia.com/Community/Wiki/Harmattan:Platform_Guide/Harmattan_platform_and_Platform_SDK_overview/Security_domain_overview#Trusted_Execution_Environment_Services_and_Boot_Process
Also Northrop Grumman and Raytheon
Whole ecosystem getting pulled along - even if they're small steps for the moment, it seems pretty clear where all of this is going and it's important to know where these organizations went first for their solution. Foam
Interesting NSA talk at RSA (on mobile infrastructure)
https://ae.rsaconference.com/US12/scheduler/eventcatalog/eventCatalog.do
PNG-202 - NSA's Secure Mobility Strategy
Session Title NSA's Secure Mobility Strategy
Speaker(s)
Margaret Salter, National Security Agency, Technical Director
Times Wednesday, February 29, 9:30 AM
Green Room 130
Length 50 minutes
Classification Intermediate
Abstract The intelligence community and Department of Defense need the ability to communicate anytime, anywhere, regardless of the classification level. They also want the ability to communicate securely using the same kinds of user-friendly devices available commercially. To meet these requirements, the National Security Agency is testing a new mobile infrastructure to secure classified communications.
Pre-requisite Knowledge Participants should have an intermediate understanding of the various types of mobile device technologies, as well as 3G/4G technology, encryption, and key management.
Learning Objectives
Learn about NSA’s secure mobility strategy
Learn about the specific technologies NSA is evaluating as part of the strategy
Understand the opportunities and obstacles to securing classified communications
Recognize alternatives to securing mobile communications
Interesting Safend presentation (as a Wave company)
http://www.it-sa.de/fileadmin/itsa_files/Handouts/2011/BL_Mi_12_00_Almer.pdf
Looks like Softex has a TPM customer (small, but still an indicator)
(Very good PWC presentation in same document)
http://www.trustedcomputinggroup.org/files/resource_files/AD8BA30C-1A4B-B294-D0BE654C46673C43/TCG_Authentication_Webcast_Slides_Final.pdf
Dramatic Shift to Self-Encrypting Hard Disk and Solid State Drives by 2017 with More Than 80 Percent of HDDs to Be SEDs in Next Two Years
http://www.marketwatch.com/story/new-industry-forecast-projects-dramatic-shift-to-self-encrypting-hard-disk-and-solid-state-drives-by-2017-with-more-than-80-percent-of-hdds-to-be-seds-in-next-two-years-2011-09-21
Dr. Thomas Coughlin and Trusted Computing Group to Host Webcast October 5 to Discuss Detailed Findings of SED Market and Usage
ORLANDO, Fla., Sep 21, 2011 (BUSINESS WIRE) -- Data storage industry analyst Dr. Thomas Coughlin, Coughlin Associates, today revealed the industry's first forecast examining the adoption of self-encrypting drives (SEDs). Self-encrypting drives, most of which are based on specifications created by the Trusted Computing Group, automatically and continuously encrypt all data in the drive itself, protecting it from loss, theft or attack.
Coughlin addressed attendees in an Emerging Technologies session at the NSA (National Security Agency) Trusted Computing Conference and Expo.
Coughlin's research found that:
-- Within 2 years (by 2013) SED capability will be in over 80 percent of SSDs and likely in almost all SSDs within 3 years (2014).
-- By 2017, almost all HDDs will include SED capability.
-- By 2016 the high, median and low estimates for security adoption for SED HDDs are 411 million, 315 million and 122 million units.
Coughlin notes that a number of factors will foster adoption. These include cost parity of SEDs to non-self encrypting storage devices; no performance impact on individual systems with SEDs compared to software-based encryption; no performance overhead compared to software encryption running on the host; and possibly longer useful drive life than drives used in a software encrypted system, due to increased reads and writes with SW encryption.
The report also notes additional benefits of SEDs. These include:
-- The encryption key is stored on the storage device and cannot be accessed through host hacking, which is a typical and common attack on systems with software encryption.
-- SEDs are less complex to implement in storage array encryption solutions.
-- Increasing legislation and regulations favor the use of SEDs, particularly those with FIPS 140 certification.
Webcast to Review Results and Offer Discussion with Dr. Coughlin
Dr. Coughlin and Trusted Computing Group will host a free webcast, "Why SEDs Soon Will Be the De Facto Drive: Industry Forecast and Predictions from Dr. Thomas Coughlin" on October 5 at 10 a.m. Pacific/1 p.m. Eastern, to review the report's findings in more detail. A question and answer session will follow the webinar. To get more information and to register, go to http://www.trustedcomputinggroup.org/media_room/events/110 .
Dr. Coughlin has more than 30 years in the data storage industry with multiple engineering and management positions at high-profile companies, and he holds six patents. Dr. Coughlin authored Digital Storage in Consumer Electronics: The Essential Guide and publishes the Digital Storage in Consumer Electronics Report, a Media and Entertainment Storage Report, and a Capital Equipment and Technology Report for the Hard Disk Drive Industry. He is active with SMPTE, SNIA, IDEMA, the IEEE Magnetics Society, IEEE CE Society, and other professional organizations. Dr. Coughlin is the founder and organizer of the Annual Storage Visions Conference ( www.storagevisions.com ), a partner to the International Consumer Electronics Show, as well as the Creative Storage Conference ( www.creativestorage.org ).
Trusted Computing Group
The Trusted Computing Group (TCG) provides open standards that enable a safer computing environment across platforms and geographies. Benefits of Trusted Computing include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Organizations using built-in, widely available trusted hardware and applications reduce their total cost of ownership. TCG technologies also provide regulatory compliance that is based upon trustworthy hardware. More information and the organization's specifications and work groups are available at the Trusted Computing Group's website, www.trustedcomputinggroup.org . Follow TCG on Twitter and on LinkedIn.
Brands and trademarks are the property of their respective owners.
SOURCE: Trusted Computing Group
About Time - TCG marketing director wanted
Are we about to go live?
http://www.jobhost.org/jobs/viewjob/marketng-director-1ab1a2de93a21b37?source=indeed&medium=sponsored
Marketng Director
Trusted Computing Group - Cupertino, CA 95014
Created on Sep 06, 2011
The Trusted Computing Group (TCG), an international industry standards group, is seeking a Marketing Director to assist the TCG Marketing Work Group Chairperson and direct TCG’s marketing and communication programs, as well as promote outreach and membership recruitment.
Responsibilities for this position also include ensuring that the marketing, advertising and PR programs contribute to the organization's mission. Additionally, the Marketing Director will be responsible for developing, managing and delivering annual marketing and membership plans, maintaining outstanding member relations (including recruiting and retention) and providing support and counsel to the Marketing Work Group Chairperson and Board of Directors. He or she will also drive the development of TCG strategies and reflect the priorities of the Board of Directors, manage the global public relations program and support personnel, direct market research acquisition and dissemination, and develop and maintain TCG’s calendar of events and programs. Requirements:
MBA degree in Marketing and Communications or a related discipline
Five to seven years experience in technical marketing, communications or program marketing
Experience in industry association or multi-national company marketing (strongly preferred)
Although the candidate can work from home, 25% travel (both U.S. Domestic and International) is required
The ideal candidate should also possess:
Experience or related to technology field (security a plus)
Experience with multi-national organizations or special interest groups
Excellent written and oral communication skills
Superior program and project management skills
Excellent presentation and interpersonal skills
Strong leadership and consensus building
Vendor management expertise
Top level facilitation skills
Proven record of developing and implementing successful marketing programs
Self-starter and highly organized
Ability to comprehend and communicate technical concepts to diverse audiences
Flexible in managing multiple high priority tasks among many constituencies
Ability to address diverging member interests
Ability to adapt to changing responsibilities and priorities
Ability to conduct multimedia marketing
Salary is commensurate with experience. TCG also offers extensive opportunities for growth and development. If you are looking for a professional, challenging, and stimulating position, and meet the above criteria, please submit your resume
"global deployment of Wave-managed Trusted Platform Modules (TPMs)."
Has PWC upgraded to Wave for managing TPMs? That would be great!
Reach - Also government sales has become more carefully targeted.
Martin Wargon
Federal Government Sales — DoD and Intelligence
561-752-4464
mwargon@wavesys.com
Andy Tarbox
Federal Government Sales — Civilian Agencies
703-448-0980
atarbox@wavesys.com
Paul Nowacek
DoD and Civilian Agencies
(301) 776-6363
pnowacek@wavesys.com