Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Microsoft launches Google Wave
https://techcrunch.com/2021/11/02/microsoft-launches-google-wave/?renderMode=ie11
Excerpt:
Google Wave was clearly ahead of its time.
==================================================================
Interesting........!!!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Researchers Push FITARA-Like Scorecard for Cybersecurity
https://www.nextgov.com/cybersecurity/2021/11/researchers-push-fitara-scorecard-cybersecurity/186532/
Excerpt:
A recent MITRE report lays out eight ways the federal government can improve cybersecurity habits across all agencies, hinging on enhanced Congressional funding and oversight.
==================================================================
Wave Integrating MITRE’s Attestation Technique into its Endpoint Monitor for Remediating Advanced Malware
MITRE Details Technique at Black Hat 2013
http://www.wavesys.com/buzz/pr/wave-integrating-mitre%E2%80%99s-attestation-technique-its-endpoint-monitor-remediating-advanced-mal
Lee, MA -
July 31, 2013 -
Wave Systems Corp. (NASDAQ:WAVX), the Trusted Computing Company, announced plans to integrate The MITRE Corporation’s new timing-based attestation technique into Wave Endpoint Monitor (WEM), the industry’s first solution to leverage industry standard hardware to detect and remediate malware that can surreptitiously mount attacks before the operating system loads. MITRE is a not-for-profit organization that provides systems engineering, research and development, and information technology support to the government.
With this enhancement, Wave will integrate MITRE’s technique that doubly verifies that the core BIOS hasn’t been corrupted. The BIOS is the first software run by the PC when powered-on and is responsible for initializing hardware and getting the operating system running. It also contains the “core root of trust measurement” (CRTM) software, the first software in the boot trust chain that ends in the assurance that the computer booted safely.
“MITRE has made a significant contribution to the body of research by identifying a scenario in which malicious code could be introduced to the BIOS that would cause it to provide a false reading and allow the malicious BIOS to indicate the system had not been corrupted,” said Dr. Robert Thibadeau, Wave’s Chief Scientist. “MITRE’s technique offers a second control for determining the CRTM does not lie about itself and any of the rest of the trust chain.”
Dr. Thibadeau added, “While BIOS attacks are still fairly rare today—less than one percent by many accounts—they represent a new and dangerous attack vector, and we’re bound to see more in future years as the more popular preboot targets are secured by our existing WEM technology.”
The management of CRTM detection will be incorporated in a module for WEM, which Wave expects will be production-ready in early 2014 to meet the expected increase of these attacks. Wave Endpoint Monitor captures verifiable PC health and security by utilizing information stored within the TPM. If anomalies are detected, the attack is controlled, and IT is alerted immediately with real-time analytics.
MITRE research presented at Black Hat 2013
MITRE researchers John Butterworth, Corey Kallenberg, and Xeno Kovah presented their research on this vulnerability and technique, “BIOS Chronomancy: Fixing the Core Root of Trust for Measurement,” at Black Hat 2013.
The team’s research highlights a vulnerability in which a firmware rootkit tricks an endpoint’s Trusted Platform Module (TPM) chip into reporting a clean BIOS firmware, when in fact it has been compromised. MITRE’s research shows the importance of using timing-based attestation systems, which can defend against attackers who obtain the same privilege levels as the defender. John Butterworth, a Senior Infosec Engineer at MITRE, adds, “additional complexities are imposed on an attacker who tries to conceal a rootkit in the presence of timing-based attestation; even concealing the modification of a single byte will trigger a measurable change.”
The team’s findings come as vendors work to implement BIOS protection specifications as outlined by the National Institute of Standards and Technology (NIST) special publication 800-155, published in 2011.
==================================================================
Along with incorporating active TPMs and SEDs into the scorecard, with software such as Wave's, MITRE/Wave could dramatically help the effectiveness of the cybersecurity scorecard! If someone from Wave or Wave Nation could mention that to the researchers or Congress for this scorecard, cybersecurity could be tremendously improved!
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Unhappy Halloween: Gaming platform Roblox crashes
https://www.foxbusiness.com/technology/unhappy-halloween-gaming-platform-roblox-crashes
Excerpt:
According to numbers compiled by the social media consulting firm Backlinko, Roblox has more than 43 million active users a day (up from 14 million in 2016), 40 million games and 9.5 million developers. The most popular game on Roblox, according to Backlinko, is "Adopt Me!’’ -- which allows users to raise digital pets.
=================================================================
There are many ways that Wave could really help out with this situation! Protect gamers on the network, protect Roblox from cyber attacks, and make the experience better! Minecraft has over 100 million users and Roblox has over 40 million, and there are so many other gamers that are looking for games that players are playing by the rules and Wave could help with that!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Chaos ransomware targets gamers via fake Minecraft alt lists
https://www.bleepingcomputer.com/news/security/chaos-ransomware-targets-gamers-via-fake-minecraft-alt-lists/
Excerpts:
The Chaos Ransomware gang encrypts gamers' Windows devices through fake Minecraft alt lists promoted on gaming forums.
Minecraft is a massively popular sandbox video game currently played by over 140 million people, and according to Nintendo sales numbers, it's a top-seller title in Japan.
=================================================================
Solid State Drives (SSDs) were made to be Self-Encrypting Drives (SEDs) as of a few years ago, and just need to be activated and managed. It seems that Wave could enable and manage these drives to help protect against ransomware and if Wave Endpoint Monitor were used the technology would detect this ransomware (malware)! Wave's MFA, Wave VSC 2.0 could also help protect the gamers so that the bad guys are not accessing the network. Steven Sprague once said that the consumer market would arrive first. Here is a big opportunity for Wave!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware Has Disrupted Almost 1,000 Schools in the US This Year
https://www.vice.com/en/article/4awyvp/ransomware-has-disrupted-almost-1000-schools-in-the-us-this-year
=================================================================
'Cyber event' knocks dairy giant Schreiber Foods offline amid industry ransomware outbreak
https://www.cyberscoop.com/schreiber-foods-cyber-event-ransomware-agriculture-food/
=================================================================
A Russian-speaking ransomware gang says it hacked the National Rifle Association
https://www.cyberscoop.com/evil-corp-nra-ransomware/
=================================================================
It's really amazing that organizations are not using Wave solutions extensively to protect themselves from ransomware attacks! Organizations would be keeping unknown and unapproved devices from accessing their network and thus sensitive data.
================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Biden administration officials outline steps to tackle urgent cyber threats
https://thehill.com/policy/cybersecurity/578987-biden-administration-officials-outline-steps-to-tackle-urgent-cyber
Excerpts:
Both Inglis and Neuberger expressed support for more mandatory cyber standards in certain cases, comparing these to safety and security standards applied to automobiles.
“At some point we have to decide, what are those things that are so essential that they are not discretionary? We therefore have to insist that certain features and certain practices are built in,” Inglis said at CSIS. “We will do this for critical systems and in the digital infrastructure as well, but it will be by exception.”
=================================================================
http://www.wavesys.com/wave-alternative
Excerpt:
You have to start with the device
Wave has an alternative: security that’s built into each and every device.
We’re talking about hardware: self-encrypting drives (SEDs), which protect data when a device is stolen or lost, and trusted platform modules (TPMs), or embedded security chips. Both go in at the factory, and increasingly, both are standard. They make it possible for you to monitor and control each individual device and its data, no matter where it is. But you need software to turn on and manage your SEDs and TPMs. Wave makes that software.
================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Natural Disasters Can Set the Stage for Cyberattacks
https://www.nextgov.com/cybersecurity/2021/10/natural-disasters-can-set-stage-cyberattacks/186366/
Excerpt:
“We almost always see some spike in cyberattack attempts impacted by any major event, whether it’s natural disaster or something else,” Rose said. “It’s an easier way for threat actors to gain a foothold. They take advantage of a system in a weakened state.”
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
Life for hackers who are hacking organizations appears to be relatively easy judging by all the ransomware attacks, and data breaches happening over the last 5 years. Why not make life much more difficult for hackers by mandating activated hardware security (SEDs and TPMs that are built-in to devices) for organizations, particularly critical industries! It would make things easier and more secure for the states in this article!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Cyberattack blamed as Iran gas stations hit with major disruptions
https://www.nbcnews.com/news/world/cyberattack-blamed-iran-gas-stations-hit-major-disruptions-rcna3806
Excerpt:
Speaking with state broadcaster IRIB, Abolhassan Firoozabadi, the secretary of Iran’s Supreme Council of Cyberspace, said he believed the incident was caused by a cyberattack from a foreign country.
=================================================================
Rethink cybersecurity and use Wave's awesome solutions!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Russian hackers targeting US networks in ‘very large and ongoing’ cyberattack
https://nypost.com/2021/10/25/russian-hackers-target-us-networks-in-ongoing-cyberattack/
=================================================================
You need better cybersecurity, and you need data protection that actually works! Contact Wave!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Personal data protection to become a fundamental right in Brazil
https://www.zdnet.com/article/personal-data-protection-to-become-a-fundamental-right-in-brazil/
================================================================
Given the new importance of data protection to Brazil, and that Wave's data protection is so great, why not have many organizations in Brazil use Wave's great data protection solutions!
================================================================
http://www.wavesys.com/data-protection
================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Many organizations lack basic cyber hygiene despite high confidence in their cyber defenses
https://www.helpnetsecurity.com/2021/10/21/organizations-cyber-hygiene/
Excerpts:
The report found that while 81% of those surveyed consider their security to be above average or exceptional, many lack basic cyber hygiene – 41% lack a password complexity requirement, one of the cheapest, easiest forms of protection, and only 55.6% have implemented multi-factor authentication (MFA).
•72% of surveyed organizations were affected by ransomware from August 2020 – August 2021, with 13% affected 6-10 times.
Detecting stolen credentials and resetting them before criminals can use them to infiltrate corporate networks is the most direct path to fighting ransomware before criminals can gain a foothold. (fight the easy way with Wave VSC 2.0!)
==================================================================
Here Wave has Wave VSC 2.0 to offer as an essential MFA protection for organizations, and only 55.6% have implemented MFA! Given what Wave VSC 2.0 can do, the market needs to know about it! Between Wave Nation and ESW, Wave solutions deserves major marketing so that the other 45% (and the 55% too) are aware of what better security can do for them!
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
73% of UK Businesses Suffered Phishing-Related Data Breaches in Last 12 Months
https://www.pymnts.com/news/security-and-risk/2021/73-of-uk-businesses-suffered-phishing-related-data-breaches-in-last-twelve-months/
==================================================================
Wow! Wave could be tremendously helping in the scenario above! Hopefully, Wave Nation in the UK, and the rest of the world could show the market that Wave could protect against phishing so that these data breaches don't keep happening!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft now defends nonprofits against nation-state attacks
https://www.bleepingcomputer.com/news/microsoft/microsoft-now-defends-nonprofits-against-nation-state-attacks/
Excerpt:
Through the new Security Program for Nonprofits, Microsoft will:
•provide proactive monitoring and notification in the case of a nation-state attack via the AccountGuard program
==================================================================
With Wave solutions, only allowing known and approved devices access to the network could do a better job of protecting the network than proactive monitoring! Wave offers better security posture!
Better security at less than half the cost!
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Increased activity surrounding stolen data on the dark web
https://www.helpnetsecurity.com/2021/10/21/stolen-data-dark-web/
Excerpts:
Of all of the types of data researchers seeded on the dark web, data to access retail and U.S. government networks received the most clicks, 37% and 32%, respectively.
“Unfortunately, organizations’ cybersecurity efforts to protect data have not kept pace, as evident by the continuous onslaught of headlines reporting on the latest data breaches.
“In comparing the results of this latest experiment to that of 2015, it is clear that data on the dark web is spreading farther, faster,” said Schuricht. “Not only that, but cybercriminals are getting better at covering their tracks and taking steps to evade law enforcement efforts to prosecute cybercrime.
==================================================================
Use Wave VSC 2.0 (MFA), use better security at less than half the cost!
==================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
83% of ransomware victims paid ransom: Survey
https://www.zdnet.com/article/83-of-ransomware-victims-paid-ransom-survey/
Of the 192 respondents who had been hit with ransomware attacks, 83% said they felt they had no choice but to pay the ransom.
==================================================================
What if your organization simply didn't allow ransomware attackers on your network by using Wave solutions?!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
AXA XL announces new Cyber Claims Leader and launch of Incident Response Team in the Americas
https://www.yahoo.com/now/axa-xl-announces-cyber-claims-151500552.html
=================================================================
I'm surprised that AXA is not recommending Wave given organizations' lack of success against ransomware attackers, and AXA's success with Wave VSC 2.0!
=================================================================
Wave Announces 5-Year Master License Agreement for Virtual Smart Card 2.0 with Leading Global Financial Services Company
Wins competitive evaluation against market leader in two-factor authentication tokens
http://www.wavesys.com/buzz/pr/wave-announces-5-year-master-license-agreement-virtual-smart-card-20-leading-global
Excerpt:
“This customer is a major global financial services company and their standards for protecting their systems from unauthorized access and the integrity of their data are of the highest order. Wave had to pass a very rigorous technical and business review to win the competition.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Army delays $22B augmented reality goggle program
https://federalnewsnetwork.com/defense-main/2021/10/army-delays-22-billion-augmented-reality-goggle-program/
=================================================================
It's amazing that for not even a tenth of this budget, Wave could provide the software that protects the whole U.S. government from cyberattacks! Choose data protection that actually works!
=================================================================
http://www.wavesys.com/wave-alternative
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
How to enable TPM 2.0 for Windows 11
https://www.techradar.com/how-to/how-to-enable-tpm-20-for-windows-11
=================================================================
Given the built-in security that the TPM offers, all TPMs should be activated, not just if the computer is being updated to Windows 11. When activating multiple TPMs in an organization, Wave has a simpler method than manual effort required in this article. Use Wave solutions which are hardware based security (SEDs and TPMs) for better security!
=================================================================
http://www.wavesys.com/wave-alternative
Excerpts:
You have to start with the device
Wave has an alternative: security that’s built into each and every device.
We’re talking about hardware: self-encrypting drives (SEDs), which protect data when a device is stolen or lost, and trusted platform modules (TPMs), or embedded security chips. Both go in at the factory, and increasingly, both are standard. They make it possible for you to monitor and control each individual device and its data, no matter where it is. But you need software to turn on and manage your SEDs and TPMs. Wave makes that software.
Start closing your security gaps today, with what you’ve got
You might be surprised to hear that 90 percent or more of your computers probably already have TPMs. Mobile devices are catching up fast. SEDs are newer, but you probably have a bunch of those too. Machines that don’t have them can often be outfitted at little to no extra cost. So you’ve got some or all of the hardware. All you need to do is turn it on with Wave.
It’s almost as easy as it sounds. TPMs and SEDs are built to open, vendor-neutral industry standards, and so are Wave solutions. That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
Questions? Read on, or contact our sales department.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft Details Biggest Threats to U.S. Cybersecurity; China, Russia Attacks Outlined
https://www.newsweek.com/microsoft-details-biggest-threats-us-cybersecurity-china-russia-attacks-outlined-1636591
Excerpt:
China accounted for fewer than 1 in 10 of the state-backed hacking attempts outlined in the report, but its success rate was 44 percent when it did attempt to break into networks, Microsoft said in its second annual Digital Defense Report.
Russia has become notorious for its high-volume, state-backed hacking, and Microsoft's report provides rare insight on how it stacks up against the U.S.'s other adversaries. Overall, hacking of other governments has a 10-20 percent success rate, according to Cristin Goodwin, head of Microsoft's Digital Security Unit.
==================================================================
If Wave solutions were being used, the success rates bolded above of breaking into networks would be dramatically reduced if not 0!
Wave would give these organizations a whole new better outlook on their security!
=================================================================
Better security at less than half the cost!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
The White House's Plan to Stop Government Employees From Getting Phished
https://www.vice.com/en/article/93yemz/white-house-omb-phishing-plan
==================================================================
The government could be paying for hardware that can be easily lost rather than not having to pay for hardware (TPM) that is not easily lost.
==================================================================
Use better security, use Wave VSC 2.0!
http://www.wavesys.com/products/wave-virtual-smart-card
Get better security at less than half the cost
Passwords are weak. Tokens are expensive. Don’t compromise on security or price.
Wave Virtual Smart Card does anything your physical smart cards and tokens do, but it starts with hardware you already have: the Trusted Platform Module (TPM), a hardware security chip built into the motherboard of most business-class PCs. You may not even know you have it, but once you do, the TPM can be used in a myriad of ways. Wave turns it into a smart card, embedded directly into your laptop.
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
One helpdesk call you'll never get: "I lost my virtual smart card again..."
There are so many ways to lose a token – couch cushions, street drains, curious toddlers. In fact, up to 30% of all tokens are eventually lost. It’s much harder to lose a laptop, and you notice a lot faster when you do.
The user experience with a virtual smart card is simple: he or she logs in with a PIN (authentication factor number one). The TPM (authentication factor number two) then transparently identifies the device to the network and connects the user to all the approved services. It’s one less thing for users to carry around.
What will you do with >50% TCO savings?*
Tokens and smart cards require an additional hardware purchase, plus the time and money to ship to remote users. Use something that’s already in the users’ hands (the TPM), and your acquisition and deployment costs are lower.
Then consider the management savings in not having to replace lost and stolen tokens. That means fewer helpdesk calls, less interruption of user productivity, and fewer acquisition and shipping costs.
When we say “secure”…
…we mean it. Our solution starts with a proven hardware root-of-trust. Multi-factor authentication is an established best-practice for strong authentication: the TPM-based virtual smart card is one factor (something you have) and the user PIN is a second factor (something you know).
*Actual number may vary. Contact us today to receive more details and a free quote.
Key Features:
• Full lifecycle management of virtual smart cards
• Intuitive interface to create (or delete) virtual smart cards
• Command line option to create and delete virtual smart cards
• Flexible PIN policies
• Helpdesk-assisted PIN reset and recovery
• Generates reports for compliance
• Integrates with Active Directory
• Supports familiar use cases ? Virtual Private Network (VPN)
? Local logon
? Remote logon
? Remote desktop access
? Intranet/Extranet
? Cloud applications
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Secure device & user authentication
Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.
Here’s how it works:
Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication
Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.
Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
Decrease expenses with virtual smart cards
You know what else happens when you take passwords out of the equation? A lot fewer calls to IT. Imagine if you took password resets out of the picture – that frees up a chunk of IT time, lowering your operating expenses significantly.
If your organization currently uses traditional tokens or smart cards, switching to virtual smart cards takes an even bigger burden off of IT – we use the hardware-protected credentials in the TPM to create a virtual smart card, which performs the same functionality as traditional smart cards. That means no need to purchase, deploy, replace or maintain external tokens, smart cards or smart card readers. Because virtual smart cards are already on your machines and can’t be forgotten, lost or stolen, you have lower capital expenses and lower operating expenses.
Wave's is the only management to support virtual smart cards on Windows 7, as well as Windows 8 and 8.1.
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
Low TCO
• Reduce operating expenses by eliminating password reset and shortening deployment times
• Minimize capital expenses by using hardware you already have
• Integrate with Microsoft Active Directory for IT familiarity
Superior User Experience
• No more tokens or smart cards to achieve two-factor authentication
• Eliminate VPN/WiFi/website passwords for faster access to resources
• No add-on software means improved OS performance
Flexibility
• Compatible with Windows 8.1, 8, 7 and Vista operating systems – manage mixed environments from one console
• Create custom management policies to suit your organization’s needs
• User and device authentication from a common console
Seamless Device Authentication
• Access control over wireless (i.e. 802.1x)
• Single sign-on
• VPN authentication (i.e. Microsoft DirectAccess)
<p><em>Microsoft, Windows, and BitLocker are either registered trademarks or trademark of the Microsoft group of companies.</em></p>
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Enterprises choose Wave to manage SEDs
http://www.wavesys.com/products/wave-self-encrypting-drive-management
Why? From our single console, you can manage all your organization’s self-encrypting drives (SEDs) easily and remotely, whether they number in the hundreds, or hundreds of thousands.
SEDs are the most secure, best-performing and most transparent encryption option for protecting data on laptops. These drives automatically encrypt all data written to the drive, so you don’t have to decide what’s important enough to encrypt. They also perform this encryption in the hardware of the drive, so you don’t end up with the performance issues software full-disk encryption is infamous for. SEDs are available as HDD or SSD, and are sold by most major drive manufacturers.
Wave’s management solution delivers remote drive initialization, user management, drive locking, user recovery and crypto-erase for all Opal-based, proprietary and solid-state SEDs.
Easy proof of compliance
Your encryption is only as good as you can prove it to be. To comply with most data protection regulations, your organization has to prove encryption was in place at the time of a potential breach. Wave provides secure audit logs to help you demonstrate compliance.
If you lose a device with a Wave-managed SED, there’s no wondering or guessing. You know encryption was on by default, and you can prove it.
No vendor lock-in
SED technology was created and standardized by a consortium of the best in the infosec industry, a standards body called the Trusted Computing Group (TCG). This means you can buy your drives wherever you want, from whatever vendor you want—any SED built to the TCG’s Opal specification can be managed by Wave.
No SEDs yet? No problem.
If your organization hasn’t yet deployed SEDs, you can skip the process of retro-fitting and simply incorporate SEDs on all new laptops as part of your regular refresh cycle. In the meantime, the same Wave console can manage BitLocker and SEDs, so you can protect the devices you have now with BitLocker and add those with SEDs as they are deployed. And if you’re using Wave’s cloud platform, you can also support OSX FileVault2.
Pick your platform
Wave SED management is available via the cloud or on-premise servers. Ask us for more details about which platform is right for your deployment.
Key Features:
Easy security compliance
• Active monitoring, logging and reporting of all user and device events
Data protection
• Local changes are prohibited
• Drive locking is supported in sleep or standby (S3) modes
• Manage clients inside or outside the firewall and on non-domain machines
Simplicity
• Everything is automatically encrypted—users don’t have to identify which data is sensitive
• Windows password synchronization and single sign-on
• Add or remove users remotely
• MMC snap-in is familiar and easy—less administrator training
• Role management allows delegation of tasks with customized or predefined roles.
No compromises
• Encryption is completely transparent to your users—they won’t even notice it's there
• Customizable pre-boot message at authentication screen
==================================================================
The last post by Methinks gives an idea of the full cost of Bitlocker. SEDs are built-in to all SSDs. SEDs have a lot of advantages over Bitlocker, and activated SEDs would make for many happy present and future SED and Wave SED management customers!
==================================================================
http://www.wavesys.com/products/wave-cloud
Excerpts:
No infrastructure, no software …
no more excuses
You know you should be encrypting data on every device in your organization, especially your laptops. Self-encrypting drives (SEDs) are the fastest, easiest and most secure way to do that. But setting up to support and manage SEDs can seem daunting. Even to test them, you need server infrastructure and management software. Right?
Not with Wave Cloud. The world’s first cloud-based service for managing SEDs, Microsoft Bitlocker and OS X FileVault 2, Wave Cloud lets users take advantage of the benefits of SEDs without jumping through the hoops traditionally associated with SED management. Whether you’re doing a small proof-of-concept or full-blown production deployment, Wave Cloud is the fastest way to get there.
Contact Wave Sales and you’re on your way - no servers or software or big capital expenditures.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Is your firewall protecting the business? 7 questions to ask
https://www.zdnet.com/paid-content/article/is-your-firewall-protecting-the-business-7-questions-to-ask/
If you haven't updated your firewall in the last few years, chances are you're putting your business at risk.
=================================================================
The term "firewall" can be traced as far back as 1666. Webster's tells us that the term was used to describe a wall that could block fire from spreading between storehouses.
Motorheads know this term, as well. The firewall is the part of the car that sits between the engine and the passenger compartment. It's designed to isolate the heat in the engine compartment, preventing the potentially flammable materials in the passenger compartment from igniting.
Firewall's first use in computing dates back to the 1990s, but some assert that its first use was actually in the movie WarGames, from 1983.
Speaking of feeling old, how old is your firewall? That's a question I'll bet you don't ask yourself all that often. But it's the first of our seven questions.
In today's computing environments, firewalls block certain data from transitioning from one part of a network to another. This is particularly important when it comes to isolating the internet from a local area network, since traffic on the open internet is often malicious.
In homes and small businesses, the router has some level of firewall functionality. In more elaborate deployments, the firewall can be a separate device, or even a software-based system that's part of a virtual networking environment.
Since this article is intended for small business owners and managers, we'll stick with the idea of a firewall either as a part of a router or a small, standalone firewall device.
Is your equipment outdated?
This brings us back to the question of firewall (or router) age. How long has it been since you've replaced it? If it's more than three or four years, you're flirting with potential disaster.
How many news reports about hacks and attacks and ransomware have you seen over the past three years? Cyberattacks are incredibly profitable, which means that cybercriminals are investing in and developing techniques to crack security.
Old firewalls, especially if they're from the Windows 7 or 8 era, are just not up to handling the sorts of attacks we're seeing today. They're not fast enough, and they don't have the latest defense features. So here's the takeaway: If your firewall is more than 3 years old, and definitely if it's 5 years old or older, consider replacing it. The cost of replacement will be a tiny fraction of the cost of what will eventually hit you if you don't.
Have you updated your firewall software recently?
Updating your firewall software is as important as updating your operating system software. Many attacks use older exploits. Every time you update, you prevent the newest waves of attacks. If you haven't checked and updated your firewall or router in the last few months, stop right now and go do it.
This is another reason why you need to replace older equipment. Updates are crucial to preventing attacks, and if your firewall is older and no longer under support, you are probably not getting those crucial updates.
Have you backed up your firewall configuration recently?
If your firewall glitches and you have to reset it, it's much easier to restore a configuration backup than to set everything up again. It's usually a 5-10 minute process. Once again, go do it now.
Have you increased broadband speed?
We're now in a highly video-centric world. Zoom meetings mean that upload bandwidth is as important as download bandwidth. Even at home, you might have more than one Zoom or video connection happening simultaneously. To handle it, many folks in homes and small businesses have increased broadband bandwidth.
That's great, but can your old router handle it? Routers designed to just feed basic Netflix and let you play games online were never designed for entire families working and schooling all day online at home. If you've increased your network use, it's probably time to upgrade the firewall or router.
Does your firewall inspect large files and zip/compressed files?
Not all routers or firewalls do this, but they should. Your firewall should be able to examine all data coming into your network, whether encrypted or compressed or not. It needs to be able to look inside the packets to make sure nothing malicious is coming into your network.
If your current firewall or router can't protect you adequately, get a new one. (Dell SonicWall offers a host of next-generation firewalls designed for businesses of all sizes.)
Have you added more people? Are people working remotely?
Business routers/firewalls installed prior to the pandemic were probably not intended to support workers connecting into the office from home on a full-time basis. Are more of your people working remotely? If so, all the traffic that used to flow around your internal LAN is now blended with internet traffic. That's a lot more work for a firewall to manage.
Likewise, if you've increased your network-using workforce, that's a lot more load on the firewall. It's entirely possible that old twenty-teens firewalls will bottleneck or fail. Might be time for an upgrade.
Are all your firewall security features enabled?
Firewalls and routers ship with a lot of capabilities, but they're not all turned on at the factory. That's often because they need to be configured to manage a given network.
If you haven't turned on all the security features available, you're leaving yourself and your company vulnerable. Spend a few minutes logging into your firewall and auditing your security features. If you're not sure how to use those features, feel free to reach out to Dell's support services, who can help you tune everything to best fit your company's needs.
==================================================================
If you have not updated your organization's cyber defenses to Wave solutions, chances are you're really putting your business at risk!
==================================================================
http://www.wavesys.com/wave-alternative
Excerpts:
It’s a new world, one without borders. Yet most organizations are still trying to protect their data with the same old firewalls and antivirus software. It’s not working. We refer you to the headline-making breach of the week.
Start closing your security gaps today, with what you’ve got
You might be surprised to hear that 90 percent or more of your computers probably already have TPMs. Mobile devices are catching up fast. SEDs are newer, but you probably have a bunch of those too. Machines that don’t have them can often be outfitted at little to no extra cost. So you’ve got some or all of the hardware. All you need to do is turn it on with Wave.
It’s almost as easy as it sounds. TPMs and SEDs are built to open, vendor-neutral industry standards, and so are Wave solutions. That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
Questions? Read on, or contact our sales department.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Tech giants encouraging adoption of hardware-based auth keys
https://www.scmagazine.com/analysis/physical-security/tech-giants-encouraging-adoption-of-hardware-based-auth-keys
=================================================================
A small company out of Austin, Texas has a better alternative!!
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpts:
Get better security at less than half the cost
Passwords are weak. Tokens are expensive. Don’t compromise on security or price.
Wave Virtual Smart Card does anything your physical smart cards and tokens do, but it starts with hardware you already have: the Trusted Platform Module (TPM), a hardware security chip built into the motherboard of most business-class PCs. You may not even know you have it, but once you do, the TPM can be used in a myriad of ways. Wave turns it into a smart card, embedded directly into your laptop.
What can it be used for?
What do you use your smart card for today? With the exception of keying open the door at work, Wave Virtual Smart Card can perform any of the services or applications you rely on your smart card for today. Secure VPN, WiFi, remote desktop, cloud applications – it can all be done with a virtual smart card.
One helpdesk call you'll never get: "I lost my virtual smart card again..."
There are so many ways to lose a token – couch cushions, street drains, curious toddlers. In fact, up to 30% of all tokens are eventually lost. It’s much harder to lose a laptop, and you notice a lot faster when you do.
The user experience with a virtual smart card is simple: he or she logs in with a PIN (authentication factor number one). The TPM (authentication factor number two) then transparently identifies the device to the network and connects the user to all the approved services. It’s one less thing for users to carry around.
=================================================================
Choose data protection that actually works!
http://www.wavesys.com/wave-alternative
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Okta's addressable market is only getting bigger
https://www.nasdaq.com/articles/oktas-addressable-market-is-only-getting-bigger-2021-10-04
Excerpt:
Okta now estimates that its addressable market is valued at $80 billion. Compared to just $1 billion in revenue today that presents a large opportunity for the company.
==================================================================
Does Okta use hardware security (TPM and SED) as part of its security offering like Wave does? Does their technology become simpler and really more secure with its acquisition of OAuth? With an $80 billion addressable market, Wave which is simpler and more secure with TPMs and SEDs has a sizable market to participate in!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Overly Complex IT Infrastructures Pose Security Risk
https://www.itsecuritynews.info/overly-complex-it-infrastructures-pose-security-risk/
Cybersecurity budgets are set to increase in 2022, but companies worry that complex IT networks and data infrastructure are wasting money, new PwC survey finds.
=================================================================
PwC was a customer of Wave for its 2FA (two factor authentication). PwC found hardware security (TPMs) to be successful along with Wave's software. The Wave Alternative as Wave notes on its website is simpler, more secure and cheaper. It seems that PwC would want to share this simpler, more secure, cheaper, successful, and enhanced hardware based technology with its customers.
==================================================================
http://www.wavesys.com/compliance
With device-based security, compliance is simple.
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft warns over password attacks against these Office 365 customers
Another good reason to turn on multi-factor authentication now.
https://www.zdnet.com/article/microsoft-warns-over-password-attacks-against-250-office-365-customers/
==================================================================
Use Wave VSC 2.0 (MFA) to prevent the problem from happening for organizations in the above article!
http://www.wavesys.com/products/wave-virtual-smart-card
Excerpts:
One helpdesk call you'll never get: "I lost my virtual smart card again..."
There are so many ways to lose a token – couch cushions, street drains, curious toddlers. In fact, up to 30% of all tokens are eventually lost. It’s much harder to lose a laptop, and you notice a lot faster when you do.
The user experience with a virtual smart card is simple: he or she logs in with a PIN (authentication factor number one). The TPM (authentication factor number two) then transparently identifies the device to the network and connects the user to all the approved services. It’s one less thing for users to carry around.
==================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
SnapMC hackers skip file encryption and just steal your files
https://www.bleepingcomputer.com/news/security/snapmc-hackers-skip-file-encryption-and-just-steal-your-files/
Excerpt:
Researchers at NCC Group have been tracking a new adversary which they call SnapMC, named after the rapid strike approach the group follows, who enter networks, steal files, and deliver extortion emails in under 30 minutes.
=================================================================
Wave could keep this group off the network. As an added protection, activated SEDs could have these files automatically encrypted so SnapMC wouldn't be stealing files, and Wave SED management could activate and manage an organization's SEDs!
=================================================================
Thanks Methinks!
=================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Microsoft demoes hacker attacks on PCs with no TPM, VBS, and more
https://www.neowin.net/news/microsoft-demoes-hacker-attacks-on-pcs-with-no-tpm-vbs-and-more/
Excerpt:
Not just that but the firm also presented a video demo - starring Weston - that shows how potential hackers could easily gain access to such vulnerable machines that don't have these features. The video shows how hackers can gain control of a vulnerable device both remotely or locally to infect such systems with malicious payloads like ransomware or steal user authentication data. The video is meant to really drive the point home that such features are indeed crucial for a secure Windows 11 environment.
=================================================================
A good idea to activate TPMs and use Wave software!!!
=================================================================
Better security at less than half the cost!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
TSA set to mandate railroads and rail systems report cyber incidents to government
https://abcnews.go.com/Politics/tsa-set-mandate-railroads-rail-systems-report-cyber/story?id=80457231
Excerpts:
The CISA director said over 90% of successful cyber attacks occur because of a phishing email and urged companies to prepare for a disruption.
"When those who are entrusted with government dollars who are trusted to work on sensitive government systems fail to follow required cybersecurity standards, we're going to go after that behavior and extract very hefty -- very hefty fines," Deputy Attorney General Lisa Monaco said Wednesday in an appearance at the Aspen Cyber Summit.
In addition to railways, the TSA is also requiring U.S. airport operators, passenger aircraft operators and all cargo aircraft operators to designate a cybersecurity coordinator and report all incidents to CISA, by next spring, Mayorkas said at the Billington Cybersecurity Forum.
==================================================================
Wave protects against phishing!
And if organizations are using built-in cybersecurity standards like SEDs and TPMs with Wave software, CISA won't need to go after your organization with hefty fines!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Key Features:
Strong Security
• Authenticate securely, encrypt email, and prove integrity of the device with one management console
• Protect against phishing, malware and other network security threats by storing authentication credentials in hardware
• Provide centralized enforcement of custom policies
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Your cybersecurity team will face burnout, and you need to help
https://venturebeat.com/2021/10/09/your-cybersecurity-team-will-face-burnout-and-you-need-to-help/
=================================================================
After reading this article, one has to ask why are these security teams doing what they are doing to experience burnout constantly. Keeping unknown and unapproved devices from accessing the network (see how this is possible in the link below) could eliminate a lot of stress, lead to better security, better employee health and greater efficiency in organizations. Wave's solutions can make shareholders', the BODs' and employees' lives much improved in organizations across the world!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Secure device & user authentication
Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.
Here’s how it works:
Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication
Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.
Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
North American Orgs Hit with an Average of 497 Cyberattacks per Week
https://www.darkreading.com/attacks-breaches/north-american-orgs-experience-497-attacks-per-week-on-average-currently
=================================================================
The number of data breaches in 2021 has already surpassed last year’s total
https://fortune.com/2021/10/06/data-breach-2021-2020-total-hacks/
Excerpt:
Year to date, there have been 1,291 breaches, compared to 1,108 in 2020. The all-time high was set in 2017, with 1,529. And 2020’s biggest spikes occurred beginning in August, implying more are on the way.
=================================================================
Day after day, year after year, the cybersecurity market continues to allow too many cyberattacks and data breaches!!! If Wave solutions was a big part of that market, cyberattacks and data breaches wouldn't be close to happening at their current pace!!! Wave's cybersecurity solutions unlike other products actually work and work well!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Company that routes SMS for all major US carriers was hacked for five years
https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/
Excerpts:
Syniverse hasn't revealed whether text messages were exposed.
A filing with the Securities and Exchange Commission last week said that "in May 2021, Syniverse became aware of unauthorized access to its operational and information technology systems by an unknown individual or organization.
Syniverse said that its "investigation revealed that the unauthorized access began in May 2016" and "that the individual or organization gained unauthorized access to databases within its network on several occasions, and that login information allowing access to or from its Electronic Data Transfer ('EDT') environment was compromised for approximately 235 of its customers."
Syniverse says its intercarrier messaging service processes over 740 billion messages each year for over 300 mobile operators worldwide. Though Syniverse likely isn't a familiar name to most cell phone users, the company plays a key role in ensuring that text messages get to their destination.
=================================================================
Unauthorized access keeps happening!!! Why, because these organizations don't have the protection that Wave solutions offers!!! Protect your data with Wave solutions!!! Choose data protection that actually works, choose Wave solutions!!!
=================================================================
http://www.wavesys.com/data-protection
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
BYOD security warning: You can't do everything securely with just personal devices
https://www.zdnet.com/article/byod-security-warning-you-cant-do-everything-securely-with-personal-devices-says-cybersecurity-body/
Excerpts:
New National Cyber Security Centre guidance looks to find a balance between BYOD and security -- and warns if BYOD devices have admin privileges, those privileges should be removed immediately.
Remote working has become far more commonplace over the past year. Still, even as some employees start returning to the office, businesses must be aware that there should be limitations to staff using their own laptops and other devices inside a corporate environment.
==================================================================
Definitely a positive article for Wave!!! All the more reason for organizations to be using TPM based devices with SEDs! All your corporate devices could be recognized as known and approved devices on your network. A great way to keep the bad guys off the network!!! With many BYODs, it opens the corporate network up to unknown and unapproved devices (including hackers) if you are letting BYODs (non-TPM based devices) have access to the network. In other words, if you let non-TPM based devices (BYOD) on the network you are also opening the network to hackers!!!
==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
DOJ to Hit Government Contractors with ‘Very Hefty Fines’ If They Fail to Disclose Data Breaches
https://www.nextgov.com/cybersecurity/2021/10/doj-hit-government-contractors-very-hefty-fines-if-they-fail-disclose-data-breaches/185894/
Excerpt:
Deputy Attorney General Lisa Monaco promised to use an existing law to go after contractors that don't follow required cybersecurity standards.
=================================================================
Required cybersecurity standards should include activated SEDs and TPMs!!! After all, they are hardware security, already built-in to computers, supported by the TCG, and just need to be activated and managed!!!
Avoid these data breaches by using these critical activated hardware security standards (SEDs and TPMs) along with Wave software!!!
==================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Google to auto-enroll 150m users, 2m YouTubers with two-factor authentication
https://www.theregister.com/2021/10/06/google_twofactor_authentication/
Excerpts:
Uh, cool?
Two-factor authentication provides an extra layer of security by, say, requiring a one-time code to complete your login – this code could be generated by an app on your phone or emailed to you – or a hardware key you insert into your computer. The idea being that if someone learns of or guesses your password, they also need to get something else off you, like your unlocked phone or hardware key.
Google calls this two-step verification (2SV) and it involves being sent a code to type in, using a hardware key, or an app on your phone.
=================================================================
Wave VSC 2.0 (MFA) in organizations could be easier, more secure, and cooler than Google's method for 2FA!!! Google should give an option that if you are enrolled in Wave VSC 2.0, you don't have to be enrolled in Google 2FA!!!
=================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpts:
Token-free, password-free user authentication
We know you’ve dreamt about shredding your list of passwords. Go on and do it.
Because you are starting the authentication process in the device’s hardware, the user doesn’t have to interact with it. All users see is their usual Windows log-in screen – no more additional passwords to access the VPN or other resources. They just sign in once, and the secure credentials in their TPMs securely and quickly connect them to everything they need. Say goodbye to user frustration and slow OS performance.
Decrease expenses with virtual smart cards
You know what else happens when you take passwords out of the equation? A lot fewer calls to IT. Imagine if you took password resets out of the picture – that frees up a chunk of IT time, lowering your operating expenses significantly.
If your organization currently uses traditional tokens or smart cards, switching to virtual smart cards takes an even bigger burden off of IT – we use the hardware-protected credentials in the TPM to create a virtual smart card, which performs the same functionality as traditional smart cards. That means no need to purchase, deploy, replace or maintain external tokens, smart cards or smart card readers. Because virtual smart cards are already on your machines and can’t be forgotten, lost or stolen, you have lower capital expenses and lower operating expenses.
==================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
NSA director expects to be facing ransomware attacks 'every single day' in five years
https://thehill.com/policy/cybersecurity/575386-nsa-director-expects-to-be-facing-ransomware-attacks-every-single-day-in
=================================================================
The title of this article doesn't lend too much confidence in the cybersecurity of the world!!!
Have we really used hardware security (SEDs and TPMs) extensively, and Wave software to prevent these ransomware attacks?! Hardware security has proven itself!!! If you use Wave solutions, you will have confidence in Wave, based on its ability to protect your organization!!!
=================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
Excerpt:
Start closing your security gaps today, with what you’ve got
You might be surprised to hear that 90 percent or more of your computers probably already have TPMs. Mobile devices are catching up fast. SEDs are newer, but you probably have a bunch of those too. Machines that don’t have them can often be outfitted at little to no extra cost. So you’ve got some or all of the hardware. All you need to do is turn it on with Wave.
It’s almost as easy as it sounds. TPMs and SEDs are built to open, vendor-neutral industry standards, and so are Wave solutions. That means Wave works on your existing mix of hardware, across platforms, and will evolve with you. It’s part of what makes the Wave alternative not only more secure, but also simpler and cheaper. Total cost of ownership for Wave data protection can be almost half that of a traditional software-based system.
Questions? Read on, or contact our sales department.
=================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
President Biden wants to kill off ransomware for good
https://www.techradar.com/news/president-biden-wants-to-kill-off-ransomware-for-good
Encrypt your data and use MFA, President urges
=================================================================
When you mix TPMs and Wave VSC 2.0 (MFA), you are able to keep unknown and unapproved devices from accessing your organization's network. In other words, you keep the bad guys from stealing your data that is on the network. When you encrypt your data by using SEDs, your data at rest is protected!!! Activated TPMs and SEDs make the cybersecurity to protect against ransomware better!!! Encrypting your data and using MFA is good, but using it with activated standards, SEDs and TPMs, is even better!!!
=================================================================
http://www.wavesys.com/products/wave-self-encrypting-drive-management
http://www.wavesys.com/products/wave-virtual-smart-card
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management
Excerpt:
With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Ransomware Is a Growing Problem. Here’s How the Cyberinsurance Industry Is Fueling It.
https://flipboard.com/@barrons/barron-s-q6kg2r1sz/ransomware-is-a-growing-problem-here-s-how-the-cyberinsurance-industry-is-fueli/a-_rjFJZ73SiGKZzlKRgUuwQ%3Aa%3A1900270198-049c692b37%2Fbarrons.com
==================================================================
It's amazing that there is a group, The Trusted Computing Group (TCG), that is made up of 100+ companies (and Wave was a promoter), and they back SEDs and TPMs (hardware security) for better cybersecurity, and what is mentioned in this article for companies' protection is security software!!! It's kind of ironic that October is Cybersecurity Awareness Month and two activated hardware standards (SEDs and TPMs) with the right software (Wave) could make cybersecurity so much better!!! Here we have a gigantic ransomware problem, and these hardware technologies could have a hugely positive impact on the problem!!! When is this going to be mandated in at least critical industries? Better late than never!!! Hopefully, Wave Nation is making people aware of the tremendous benefits of hardware security that is already built-in!!!
=================================================================
http://www.wavesys.com/wave-alternative
Choose data protection that actually works!!!
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
Chinese Hackers Used a New Rootkit to Spy on Targeted Windows 10 Users
https://thehackernews.com/2021/10/chinese-hackers-used-new-rootkit-to-spy.html
==================================================================
Wave Endpoint Monitor Delivers a Powerful Weapon in the Battle against Advanced Persistent Threats
Monitors PC Health, Detects Anomalous Behavior & Ensures a Higher Level of Trust in the Endpoint
http://www.wavesys.com/buzz/pr/wave-endpoint-monitor-delivers-powerful-weapon-battle-against-advanced-persistent-threats
Lee, MA -
September 11, 2012 -
Wave Systems Corp. (NASDAQ:“WAVX”) today announced the general availability of Wave Endpoint Monitor (WEM), the only solution that detects malware by leveraging capabilities of an industry standard security chip onboard the PC. WEM provides increased visibility into endpoint health to help protect enterprise resources and minimize the potential cost of advanced persistent threats such as rootkits.
Rootkit attacks are particularly harmful in their ability to hide in host systems, evade current mainstream detection methods (such as anti-virus programs or whitelisting at the operating system level) and their capacity to replace legitimate IT system firmware. Such attacks occur before the operating system (OS) loads, targeting the system BIOS and Master Boot Record (MBR), and can persistently infect higher-level system functions including operating systems and applications.
“APTs facing enterprises today are more complex, nefarious and sophisticated than ever before,” said Richard Stiennon, Chief Research Analyst at IT-Harvest and author of Surviving Cyberwar. “Malware hiding in a device’s BIOS will go undetected by traditional anti-virus programs operating at the OS level, creating a strong need for a solution that can identify an attack as it happens. Because Wave’s approach is rooted in hardware-based technologies, rootkits and other malware can be spotted before the OS even starts.”
Wave Endpoint Monitor captures verifiable PC health and security metrics before the operating system loads, by utilizing information stored within the Trusted Platform Module (TPM), a security chip located on the motherboard of all business PCs. If anomalies are detected, IT is alerted immediately with real-time analytics. Capabilities of Wave Endpoint Monitor include:
• Securely reports PC integrity measurements for central reporting and analysis
• Ensures data comes from a known endpoint
• Alerts IT administrators to anomalous behaviors, which can be linked to the presence of malware
• Provides configurable reporting and query tools
• Ensures strong device identity through the use of hardware-based digital certificates
• Remote provisioning of the TPM
“Today’s security threat environment calls for industry-proven solutions to collect and analyze pre-operating system health information and to ensure endpoints are known and trusted,” said Steven Sprague, CEO of Wave Systems. “Since advanced persistent threats can sometimes appear as normal traffic, new rootkits often go unnoticed for long periods of time and cause severe damage in the form of infected systems and data loss. Wave Endpoint Monitor allows IT to utilize the hardware security you’ve already bought and deployed to ensure PC health from the start of the boot process while creating a higher level of trust in your endpoints.”
Wave has successfully piloted WEM with several government groups for the past six months.
The National Institute of Standards and Technology (NIST) has also recognized the importance of BIOS integrity and has issued initial guidelines for protecting a computer's BIOS in SP 800-147 and SP 800-155 (draft).
Wave Endpoint Monitor, plus Wave’s EMBASSY Remote Administration Server (ERAS) with full central management of all enterprise TPMs, supports all platforms with version 1.2 TPMs and is now available for purchase.
=================================================================
Only hardware-based security can beat malware!!!
http://www.wavesys.com/malware-protection
http://www.wavesys.com/products/wave-endpoint-monitor
=================================================================
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE
First on CNN: Biden administration to convene 30 countries to crack down on ransomware threat
https://www.cnn.com/2021/10/01/politics/blinken-cybersecurity-alliance/index.html
Excerpt:
In bolstering US cybersecurity, "the Federal government needs the partnership of every American and every American company in these efforts," Biden added.
=================================================================
With all the great minds on Wave's BODs, current and former employees are in a better position to speak to Biden about Wave's simpler, more secure, and cheaper set of solutions. One key feature is that only known and approved devices are allowed access to the network!!! Wave solutions activates hardware security (SEDs and TPMs), and manages these standards as well!!! Hopefully, Wave Nation isn't silent when an opportunity like this arises!!! Wave has such awesome cybersecurity!!!
==================================================================
Choose data protection that actually works!!!
http://www.wavesys.com/wave-alternative
==================================================================
Better security at less than half the cost!!!
http://www.wavesys.com/
http://www.wavesys.com/contact-information
Contact Wave
Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com
Gold Customer Support:
goldsupport@wavesys.com
1-800-928-3638
Support:
support@wavesys.com
1-844-250-7077
Sales:
1-877-228-WAVE