Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
HP Security Strategy and Solutions
http://www.platforminformatiebeveiliging.nl/vak/20050525/HP_presentatie.pdf
PCI Express 2.0, een blik in de toekomst van I/O
http://tweakers.net/reviews/591/4
Can anyone translate?
Siemens AG - Trusted Integration of Mobile Platforms into Service-oriented Networks
September 15, 2005
http://www.math.uni-frankfurt.de/~aschmidt/docs/05-09-15_Tokyo-Presentation_Session_4-2%20Marhoefer_...
Extended version
August 11, 2005
http://www.math.uni-frankfurt.de/~aschmidt/docs/ExtAbs_4-2_Trusted_Integration_Marhoefer_Schmidt_05-...
OT: Mobile Phone Security
I don't have any reason to believe this is TPM related. It just emphasizes the fact that security is going to be a necessity for the Wireless market. It also shows some estimates by IDC for smartphone deployment.
This paper is interesting
Content Security at Hand
Protecting Smartphones against Harmful Content
September 2005
http://www.f-secure.com/marketing/materials/white-papers/content_security_at_hand.pdf
From F-secure's website
http://www.f-secure.com/wireless/solutions/
F-Secure Mobile Anti-Virus
F-Secure Mobile Anti-Virus provides automatic real-time protection against harmful content. The protection is ubiquitous: no matter how the content enters the phone, the security is always ensured.
F-Secure Mobile Anti-Virus for Series 60 and 90 phones
F-Secure Mobile Anti-Virus for Nokia 9300 and 9500 Communicator Series.
F-Secure Mobile Anti-Virus for Windows Mobile.
Coming Soon!
F-Secure Mobile Security. Coming Soon!
I believe the Coming Soon items above most likely are the SmartManage Protect(tm) solution that was announced here:
http://www.wirelessdevnet.com/news/2005/sep/20/news3.html
I don't have any reason to think it is TPM related
Cell phone makers embrace security
Threat mostly still distant, and operators want to keep it that way
http://www.msnbc.msn.com/id/9438892/
Updated: 8:29 p.m. ET Sept. 22, 2005
HELSINKI, Finland - It is December 2007 and you have just switched on your new mobile phone to find it has been sending thousands of unwanted photos to all your friends and colleagues, putting you in line for a 5,000 euro bill.
Sounds unlikely? Mobile phone providers want to keep it that way.
They are starting to fit security software to subscribers' cell phones, even though the threat from viruses and other rogue programs is still distant, hoping the mobile market will fend off the scourge of the Internet world.
"We wanted to be proactive...It is still a clean field and we want to keep it that way," said Pasi Mehtonen, head of mobile services at Sonera.
Sonera, a Finnish unit of top Nordic operator TeliaSonera, and its rivals in the homeland of cell phone giant Nokia have been among the first telecom firms in the world to opt for security software.
Mobile security is on the agenda for most of operators around the world, even though customers are not asking for it.
"On the corporate side, the demand is already there. IT managers have understood the issue. But to the consumers it's still more like pushing it," said Tuukka Toivonen, head of corporate accounts at rival Finnish operator Elisa.
"In smartphones, data security issues are similar to those we have in PCs today," he said, adding security software will become "a must-have" for phones within the next five years.
F-Secure of Finland, the global market leader in mobile security, has won five of eight deals announced with operators, and expects to generate profits from mobile business between 2006 and 2008, when it sees it becoming mainstream.
In addition to Elisa and Sonera, it has deals with Swisscom and Deutsche Telekom's mobile unit T-Mobile in Germany. Orange, a unit of France Telcom, is piloting its service in Switzerland.
U.S. security software maker McAfee Inc. said last month it expected mobile-device security products to add fractionally to earnings next year and contribute more in 2007.
"Some operators have elected to pick up mobile anti-virus software and break new ground. The vast majority, however, are content to move a lot more cautiously," said Aaron Davidson, chief executive of New Zealand-based antivirus firm Simworks.
"Despite popular belief, most operators move slowly and in my view, the very fact that they are interested in evaluating solutions is a big step forward," he said.
Research firm IDC believes the market for mobile security software will grow around 70 percent annually to ready nearly $1 billion in 2008 from $70 million in 2003, as more people start to use e-mail and the Internet on their phones.
The market for fighting viruses, worms and other malicious software on computers will still be as much as 10 times bigger, according to Research and Markets. But sales of cell phones are four times greater than the 200 million PCs sold annually.
Roughly 50 million advanced "smartphones" are in use, providing mobile access to the Internet and e-mail.
They make up only about 2-3 percent of all mobile phones in the world, but are the fastest growing part of the market, according to research firm Gartner, with annual sales expected to reach 200 million units in 2008.
Three out of four smartphones run on the Symbian operating system, making it the virus-writers' target of choice, with 81 out of the 83 mobile viruses so far recorded, according to F-Secure.
Now mobile viruses can kill a phone or create bills of hundreds of euros by sending pricey picture messages.
And while the mobile industry and security software firms say the risk of catching one is small, it is growing, and there are already thousands of infected phones.
Gartner said recently it does not expect a serious mobile virus outbreak before the end of 2007, adding that mobile operators have a key role in ensuring their networks protect customers.
Most of the mobile viruses and other malicious cell phone software use Bluetooth short-distance radio signals to spread. That requires phones to be near each other, compared with computer viruses which mostly spread through e-mail or over the Internet.
"Not one of these is able to spread by itself, always the user of the phone has to accept installing of the virus," said Mikko Hypponen, head of research at F-Secure.
Foam: re wireless and Dell.
Yes. This has been in the works for a very long time - several years.
http://www.investorshub.com/boards/read_msg.asp?message_id=7837625
Wireless and TPMs
Silicon Trust
Trusted Platforms for Mobile Network
Summer 2003
http://www.wave.com/about/whitepapers/st_SAR%2002_03_RZ.pdf
Intel
Simplified Network Selection (SNS)
EAP-SIM Interoperability Testing and Inter-Operator Roaming Overview
November 12, 2003
https://www.pcca.org/standards/architecture/intel_eap_sim.pdf
Intel Research & Development
Fall, 2003
http://securitytechnet.com/resource/rsc-center/presentation/intel/fall2003/F03USWNTS112_OS.pdf
Intel Updates Centrino Platform
Chip maker adds support for PCI Express, enhances wireless security.
Wednesday, January 19, 2005
http://www.pcworld.com/news/article/0,aid,119341,00.asp
Dell Launches New Sonoma Notebooks
Tuesday, February 01, 2005
http://www.pcworld.com/news/article/0,aid,119515,00.asp
Jakes_dad: .5%
Yes, maybe it is a shot in the dark...
1) I have seen absolutely no guidance from Wave (or press releases) to indicate TPM activation rates.
2) IDC has estimates for TPM deployment. To my knowledge, there have been no estimates of how many TPMs will be enabled.
3) Revenue has been trivial in the past.
Until I see numbers start to ramp up or guidance given, I am going to assume nearly NO revenues from ETS sales. If you prefer, I can revise my estimate to 0.0%
Do you think TPM activation will be higher or lower? If so, why?
I for one believe these estimates are useful, because there aren't many stock analysts following this company. Until there are additional analysts, I'll have to rely on other people who are familiar with the industry. And Investorshub is one of the best places to find these so called "experts". Many people on this board have been following Wave longer than me and have a better grasp on the technology.
I'm not saying my estimates are right, but it helps me think it thru (sanity check).
At least I'm not projecting revenues that will be LESS than last quarter. (I'll go insane if that is the case).
Jakes_dad: re 5% or 0.5%
I meant what I posted = 0.5%. My post stands as is.
I don't think activations will be high at all. Only some trials by government and most FY05 funds are spoken for already in IT budgets. I think activations will start to pick up in FY06.
My Revenue estimate
I as well am hoping for something like 3 million chips deployed (Wavoid inside of me).
However, since I have been following this stock for over 7 years, I tend to not get my hopes up too high.
Here's my estimate:
Estimate at least 1.5 million TPMs deployed by STMicroelectronics (and/or others)
$387,000
.5% x 1 million TPMs activated from last quarter = Wave's profit of $15 per TPM (I know the $15 is debatable, but this is the number I'll use for estimation)
= qty 5,000 x $15 = $75,000
2 KTM Servers sold with Wave's profit of:
$5,000
Total
$467,000
helpful: EAP
I'm sure you recall this presentation, but I'll post it again as a refresher for everyone.
http://www.eapartnership.org/docs/Jun2004/Wave_Systems_Sprague.ppt
South Dakota? There's like 5 whole people in that state... OK, not really, more like 750K.
Why couldn't it have been California or NY?!
Smart University - Emerging Standards
Sept 20 - 23, 2005
http://www.strategiestm.com/conferences/smartuniv/05/program.htm
3.6 - The Trusted Platform Module Specifications
Presentation by Patrick Georges, The Trusted Computing Group
Tumbleweed, Wave, Marine Corp
Here's a description of:
Tumbleweed Validation Authority Suite
http://www.tumbleweed.com/pdfs/Tumbleweed_Validation_Authority_Suite_Datasheet_0405.pdf
http://www.ig.com.au/ValidationAuthority.htm
This states that the United States Marine Corps (Marine Corps) has achieved enterprise-wide digital certificate validation with Tumbleweed Validation Authority
http://biz.yahoo.com/bw/050913/135363.html?.v=1
Does the above mean that the Orange boxes in this diagram are complete for the Marine Corp?
http://www.tumbleweed.com/pdfs/va-wavesys1.pdf
If I'm not mistaken, CAC cards are already in place.
What are the implications for Wave?
Does this indicate that the rest of the infrastructure is in place so that Embassy Smart Card Readers and Trusted Platforms can be deployed?
helfpul: FIXS
http://www.nacha.org/conferences/teleseminars/Tele_FiXs/Tele_FiXs.htm
FiXs & Financial Institutions: The Future of Authentication
October 6, 2005 1:30 p.m. - 3:00 p.m. Eastern Time
A Teleseminar presented by NACHA – The Electronic Payments Association and the Regional Payments Associations
With security issues increasing in importance what roles are financial institutions likely to play in the burgeoning industry of access control? It is more important than ever to ensure that only trusted employees and visitors have access to high security areas. Financial institutions have historically been the purveyors of trust. Are they keeping pace of current developments in access control for facilities and computer systems? What business opportunities await financial institutions and third-party entities?
The Federation for Identity and Cross-Credentialing Systems (FiXs) is implementing a federated identity management and cross-credentialing program between the Department of Defense (DOD) and industry/private sector participants. The program, which is being expanded to include additional government agencies and industry/private sector employers, promotes a joint working environment by providing a foundation of trusted, secure, and interoperable employee identification and authentication.
Financial institutions are seen as models for security and authentication. So what does this program mean to financial institutions? What role will financial institutions play in this process? The primary role for financial institutions will be to vett outside organizations before they can participate in the authentication networks planned for the future. Join us for this informative case study teleseminar which will examine:
What action-forcing issues promoted the development of this program
How FiXs created this authentication procedure
What role financial institutions will play
How your financial institution can learn more about an upcoming RFP
What the future holds for authentication in the future
This teleseminar will be led by: Helena Sims, Senior Director, Public/Private Partnerships, NACHA - The Electronic Payments Association
Presentations by: Michael J. Mestrovich, President & CEO, Federation for Identity & Cross-Credentialing and Jack Radzikowski, Director, Commercial Identity Practice, Northrop Grumman
Ample time will be provided for questions and answers.
What is a teleseminar? A teleseminar is an educational event conducted over the telephone and is an affordable and convenient education alternative. One fee does it all! One teleseminar fee can educate your entire department! Registration provides you with:
Access to the teleseminar on a single telephone line. There is no limit to the number of people who may listen in and participate on that line. If you plan to have people participating from multiple locations on different phone lines, a separate registration form must be submitted and a separate registration fee must be paid for each line used.
Each registered site will receive one (1) set of handout materials supplied by the speakers via a special website.
Interested in AAP credits? You may be eligible to obtain AAP credits for participation in this teleseminar! Visit www.nacha.org/aap for more information on these credits or to see how you can start the AAP application process!
Hosted by NACHA – The Electronic Payments Association and its Member Payments Associations
Alabama ACH Association l EastPay, Inc. l Electronic Payments Network lGeorgia ACH Association l Mid-Atlanta Payment Exchange l MACHA - The Mid-Atlantic Payments Association l Midwest ACH Associationl NEACH l Northwest Clearing House Association l Payments Central l Payments Resource One l SHAZAM, Inc. l South Carolina ACH Association l Southern Financial Exchange l Southwestern ACH Association l Tennessee ACH Association l The Payments Authority l Upper Midwest ACH Association l Western Payments Alliance l WACHA
Tumbleweed
For those who have misplaced it:
http://www.tumbleweed.com/pdfs/va-wavesys1.pdf
Barge: Yes, I think HIPAA has been ignored somewhat.
What's the latest with Tumbleweed and Wave?
Tumbleweed is having their Worldwide User Conference on October 24-25, 2005.
I know Wave has been in their booth in the past. I wonder if they will be at Tumbleweed's conference as well.
Barge: HIPAA
Yes, I remember that presentation.
Here's a newsletter as well...
May 5, 2005
Homecare Automation Report
Pages 7-8
http://www.hipaahomecare.com/Resources/pdf_05-05_HCAR.pdf
Upcoming 2006 events
February 13-17, 2006
RSA Conference 2006
http://2006.rsaconference.com/us/exhibition/exhibitor.aspx
The NEbraskaCERT Conference:
August, 2006
http://www.certconf.org/talks.php
Trusted Computing and Its Impact on the Healthcare Industry and HIPAA
Sprague, Steven
THR - 10:30 AM
Intermediate
Sprauge, Steven
Steven Sprague is president and CEO of Wave Systems Corp. Based in Lee, MA. A pioneer of the Trusted PC movement, Sprague has spoken and presented at more than 50 industry events, sharing his expertise and the leadership. Wave Systems has brought to delivering trusted computing applications and services. Wave Systems provides advanced products, infrastructure and solutions across multiple trusted platforms from a variety of vendors. The Company holds a portfolio of significant fundamental patents in security and e-commerce applications, and employs some of the world's leading security systems architects and engineers. Sprague was a vice president of Wave from 1992 to 1995. In 1995 he founded Wave Interactive Network, a specialized consumer distribution channel. In 1996 Wave acquired Wave Interactive Network and Sprague was elected president and COO of Wave Systems. In 2000 he took over responsibilities as CEO. Sprague has a B.S. in mechanical engineering from Cornell University and resides in Lenox, MA.
Recent and Upcoming Events
September 12, 2005
http://www.cmpevents.com/ESCe05/a.asp?option=C&V=11&SessID=1001
Embedded Systems Conference Boston 2005
Conference Program
[SEC-504] Extending Standards-Based Security to Embedded Computing
Speaker: Loring Wirbel (Communications Group Editorial Director, CMP Media LLC), Ned Smith (Security Architect Intel), Steven Sprague (President & CEO Wave Systems Corp.), Sachiko Yoshihama (Research Staff IBM Tokyo Research Laboratory)
Time/Date: Monday (September 12, 2005) 3:45pm — 5:00pm
Submission Proposal History: New
Track: Embedded Security Seminar
Formats: 90-Minute Class
Audience level: Introductory
Presentation Abstract
Completion of the Trusted Network Connect and Trusted Server specs within the Trusted Computing Group suite has added a new dimension to embedded computing security. What once was a platform-centric secure environment for the client has evolved to a multi-tier standard incorporating policy enforcement, authentication/authorization functions, and services at all levels of the OSI protocol stack. How do OEMs and software developers plan for such multiple levels of security support, and how does Trusted Computing Group work with such existing standards bodies as Service Availability Forum and Internet Engineering Task Force? This panel will explore the evolving TCG specs as a seven-layer comprehensive client/server model.
September 26-28, 2005
Gilder Telecosm
http://www.gilder.com/fridayletter/Samples/08.26.05.htm
http://www.gildertech.com/public/Telecosm2005/Speakers.htm
http://www.gildertech.com/public/Telecosm2005/Agenda.htm
Trusted Computing and Secure Networking: trusted storage, networks, processing, and computing applications
Speakers:
John Kish, President and CEO, Wyse Technology
Steven Sprague, President and Chief Executive Officer, Wave Systems
As organizations put their core business processes on the Internet, the ability to know the identities of the entities in a transaction, protect the data being sent, and keep unauthorized intruders away from sensitive databases and corporate resources has become a difficult challenge.
September 27-29
Tuesday, September 27
1:00 pm - 5:00 pm
Open to all registered attendees
http://www.wirelessit.com/general/security_and.cfm
Trusted Computing Group Members (TCG), AuthenTec, Inc., Nokia, Wave Systems and others in the mobile market will sponsor a FREE SEMINAR to address the growing issue of providing security for mobile devices. Security and mobile system experts will discuss the role of industry standards as well as next steps to ensure data and transactions are safe. The challenges and opportunities for wireless security in content, transactions and potential solutions will also be addressed as will the work currently being done by the Trusted Computing Group, an industry organization developing open specifications for security. Company representatives will be available during the session for questions and discussion.
October 4, 2005
http://www.rtcgroup.com/arm/calendar.php?q=view
Trusted Computing Group Solutions in ARM TrustZone Systems
Lark M. Allen, Wave Systems
The Trusted Computing Group develops open specifications designed to provide standard security building blocks and trust services for a wide range of platforms including cell phones, PDAs, peripherals, and embedded devices. This presentation provides an overview of the TCG specifications and explores implementation alternatives based on ARM's TrustZone technology. Also trusted application examples utilizing TCG technologies will be presented.
Speaker Bio: Lark Allen is Executive Vice President at Wave Systems Corp, a software leader in the Trusted Computing industry. Mr. Allen is responsible for corporate strategy and market development for Wave's trusted computing products and services. He is actively engaged a range of industry initiatives directed at defining the emerging world of trusted computing for digital business and e-commerce. He participates in the Trusted Computing Group, the E-Authentication Partnership, the International Security, Trust and Privacy Alliance, OASIS, and the Liberty Alliance. Mr. Allen previously worked for IBM in a number of worldwide executive positions.
November 2, 2005
ID World
http://www.idworldonline.com/modules.php?op=modload&name=News&file=article&sid=409
Wave Systems Europe
Consumers and businesses are demanding a computing environment that is more trusted, private, safe and secure. Wave is the leader in delivering trusted computing applications and services with advanced products, infrastructure and solutions across multiple trusted platforms from a variety of vendors. Wave holds a portfolio of significant fundamental patents in security and e-commerce applications and employs some of the world's leading security systems architects and engineers.
Website:
www.wave.com Please visit us on Stand E03/B
November 14-16, 2005
https://www.cmpevents.com/CSI32/a.asp?option=C&V=11&SessID=1000
[IAM-4] Trusted Computing: Empowering Computers to Protect Themselves
Speaker: Steven Sprague (President & CEO, Wave Systems Corp.)
Time/Date: Monday (November 14, 2005) 4:45pm — 5:45pm
Track: Identity & Access Management
Presentation Format: 75-minute Session
Audience level: Intermediate
Presentation Abstract
If you lost your laptop or PDA, would you trust it to secure itself? Tens of millions of new “Trusted Computers” can now do just that…securing themselves thanks to a revolutionary new hardware security chip. More than 100 vendors making up the Trusted Computing Group (Dell, Microsoft, Intel, Sony, Wave Systems and more) have created a hardware standard for ensuring data protection and security of computing devices. In this presentation you will learn key concepts of the Trusted Computing architecture and its implementation.
http://www.infosecurityevent.com/App/homepage.cfm?linkid=2215&moduleid=331&sesAction=Speaker....
Speaker Information
Name: Stephen Sprague
Job Title: President and CEO
Company: Wave Systems
Bio: Steven Sprague is president and CEO of Wave Systems Corp. Based in Lee, MA, Wave is a leader in delivering trusted computing applications and services with advanced products, infrastructure and solutions across multiple trusted platforms from a variety of vendors. Wave holds a portfolio of significant fundamental patents in security and e-commerce applications and employs some of the world's leading security systems architects and engineers. Sprague was a vice president of Wave from 1992 to 1995. In 1995 he founded Wave Interactive Network, a specialized consumer distribution channel. In 1996 Wave acquired Wave Interactive Network and Sprague was elected president and COO of Wave Systems. In 2000 he took over responsibilities as CEO. Sprague has a B.S. in mechanical engineering from Cornell University and resides in Lenox, MA.
T1: Trusted Computing Group: Stopping Attacks on Your Corporate Assets: A Seminar on Protecting Data, Systems and the Network:
Date - December-06-2005
Start Time - 9:00AM
End Time - 1:00PM
Kerry Maletsky - Business Unit Director, North American ASIC and ASSP Companies, Atmel
Michael Willett - Research Staff, Seagate Systems
Stephen Sprague - President and CEO, Wave Systems
Alexander Koehler - Director of Business Intelligence, Utimaco
Shab Madina - Product Marketing Manager, Hewlett-Packard
Stacy Cannady, CISSP - Senior Consultant and Product Manager for Client Security, Lenovo
John Vollbrecht - Senior Technical Consultant, Meetinghouse Data Communications
Seagate's Momentus drive encrypts data, Sept 14
http://www.techworld.com/storage/features/index.cfm?featureid=1777
September 14, 05
TPM - Trusted Platform Module
Seagate's Momentus drive encrypts data
By Chris Mellor
A Windows PC used to have a really horrendous security hole. The password needed to access a password-protected PC was held in clear text. It wasn't encrypted. Now, because Microsoft and PC manufacturers are members of the TCG, the Trusted Computing Group, its passwords can be stored in an encrypted state inside a special chip, the trusted platform module or TPM.
This module cannot be accessed by users, or hackers, and its contents cannot be read. Toshiba notebooks and other desktop systems using the TPM now come with a range of extra supplier software that can be used to enable the user to provide an encrypted environment such that were the PC lost or stolen then its secured contents cannot be read. The sensitive data is safe.
The idea is to hold identity management data in encrypted form and have it validated by special hardware and software. This can only be done by spcial hardware as software alone can be cracked.
With the TPM, files that are encrypted using a key will have the key stored in the TPM. When a user wants to decrypt or encrypt information he or she has to enter the key. Windows sends it to the TPM which validates it and, if valid, lets the user carry out the required operation.
If the computer is stolen then the encrypted file can be accessed but its contents are nonsense because the key needed to decrypt it cn't be obtained.
Dell, HP, IBM, Toshiba, and Fujitsu, Gateway and Acer have annouced products that have the TPM security hardware inside them. Various softare houses, such as Wave, build software applications that run on these systems to do things such as bulk encryption, single sign-on, and TPM management.
Every PC made should have TPM facilities by 2008/2009.
Trusted Computing Group
The Trusted Computing Group is, like the SNIA, a group of volunteers from vendors who produce specifications and requirements for trusted computers and intelligent devices. The group is sectioned into workgroups for different aspects of building a trusted computer environment. There are more than 100 members of the TCG. Informatio about members, specifications and products can be gleaned from the TCG web site.
The TPM facilities require users to do something. Security requires an active user. Like a householder who leaves windows open, a PC user who leaves Windows open is inviting break-in and theft.
The user has to do something to secure the device. But the user doesn't have to buy anything. The TPM hardware and allied software are, or will be, delivered with the notebook computer, PC, or Seagate FDE (full drive encryption) Momentus drive.
http://www.seagate.com/newsinfo/newsroom/success/D2g42.html
With the Momentus a user can set up an encrypted secure vault that just cannot be read by anyone unless they have the correct key. It is likely that other drive vendors will follow suit.
There are procedures and tools to use to migrate a trusted environment from one device to another or to backup keys.
Access control
TCG technology can be added to network end-points so that they can be validated before being allowed to access network facilities. We might expect TPMs to appear in, for example, mobile phones and external drives. The whole idea is a natural for storage devices such as notebook and PC drives, both internal and external.
It's not clear yet how this trusted environment idea will develop. But we might envisage tape drives employing the technology. Even USB drives might use it. Secure storage is a hot topic. Suppliers can email admin@trustedcomputinggroup.org to find out how to join the TCG. We'd encourage them to do so.
Sony: flexibility meets mobility
12 September, 2005
by Staff Report
http://www.integratedmar.com/ecl-usa/story.cfm?item=19934
Targeted at both business and IT managers, Sony Electronics has developed a new line of business notebooks that combine a choice of display sizes, swappable accessories and multiple configuration options into a single platform. The VAIO BX Series of notebooks features Sony's AdaptivePlus technology, incorporating flexibility, security and communications features for IT resource management. According to the consumer giant, the line's modular approach to accessories and peripherals offers IT managers a variety of options to best fit an organization's workforce from road warriors to desk jockeys.
"By providing a single platform and cross-compatible peripherals the latest edition to the VAIO Professional line provides an innovative approach and flexible option for companies," stated Mike Abary, vice president of VAIO product marketing for Sony Electronics, in a release. "We believe that this new modular solution combined with leading-edge security features will substantially reduce IT manpower and the total cost of ownership for businesses."
Although the BX Series is available with a variety of display sizes -- 14-inch, 15.4 and 17-inch wide screen sizes -- the same optional accessories such as a docking station with battery charger, standard and large capacity batteries and wireless presentation mouse can be used across the series so accessories can be shared and costs reduced. All sizes also feature Sony's multi-function bay. Users can swap out peripherals such as a DVD+/-RW, +R double layer drive (not all DVD media/formats are universally compatible) or an 80GB hard drive bay unit. Each of these optional accessories is cross-compatible with all three size configurations of the BX Series.
The BX Series is also distinguished by a longer lifecycle than the typical retail shelf life for consumer notebooks, ensuring businesses a stable platform. Further, the line is Cisco v.3-compliant, making it easy to deploy over existing corporate networks that utilize Cisco management applications. Security is another top priority for Sony, so the new line incorporates a Trusted Platform Module (TCG Ver.1.1b compliant) to set the level of security on a specific client/user basis. Data can be encrypted over a local network or over the Internet so IT managers have the ability to dial in the specific level of access. Additionally, the BX Series features an integrated biometric fingerprint sensor, which delivers personal security and eliminates the need to remember multiple passwords.
Equipped with the company's SmartWi technology, the BX Series allows users to toggle between various connectivity options including WWAN, WLAN for connections at home, office or hotspots, or Bluetooth technology for communication with Bluetooth-enabled peripherals such as a PDA, cellular phone or wireless headset.
Outfitted with an optional built-in camera and pre-loaded with Sony's Instant Video Everywhere or IVE service powered by GlowPoint, the BX Series is ready for instant real-time video conferencing. The model line also utilizes an advanced power-saving feature for mobile usage called VAIO Power Management Viewer, for setting power modes to control the balance of stamina and performance required.
Finally, exclusively for the business customer, Sony offers VAIO Care (www.sony.com/vaiocare), a new total lifecycle management program for all VAIO Professional notebooks. Components include consultation services, extended service and accidental damage protection options and a trade-in program. VAIO Care also offers dedicated technical support for an organization's IT team.
The BX notebooks will be available in mid-October, starting at about (US) $1,300.
AMD64 Virtualization Codenamed "Pacifica" Technology
Secure Virtual Machine Architecture Reference Manual
See specifically chapter 3
May, 2005
http://vip.amd.com/us-en/assets/content_type/white_papers_and_tech_docs/33047.pdf
NAVSEA and Dell Federal Systems (?)
Possibly the wrong 'Dell'
http://somd.com/news/headlines/articles/2615.shtml
Foam - re: waveetms.com
I just moved to Dallas (from Cincinnati), so I'm looking to purchase a home. I went ahead and filled out the "Full" mortgage application. The questionaire was:
1) very easy to fill out
2) thorough regarding assets and liabilities
3) it failed to ask me what type of loan product I was interested in (ie 15yr/20yr/30yr fixed, 5/1 ARM)
4) You can also attach PDF or fax documents as supporting information (a feature I haven't seen on other mortgage sites) - this feature is described in the confirmation email below. I did not attempt uploading any documents.
I immediately received a confirmation after submitting the application. I will keep the board informed on my interactions with them.
From: <jkearns@wavesys.com>
To: <email>
Subject: New Loan Application
Date: Tue, 13 Sep 2005
Dear <name>,
Thank you for submitting your loan application with us. At Wave Systems
Corp., we're committed to providing you with the highest level of
service and satisfaction. As part of our ongoing efforts, you'll be
receiving daily status reports from us showing the progress and current
status of your loan.
You can also return to our web site at any time to view status or attach
supporting documents to your loan application using our DirectFax
system. Just select the 'Customer Login' link from our menu and enter
the userID and password you created when starting your application.
Sincerely,
The Staff of Wave Systems Corp.
Trusted Network Technologies Joins Trusted Computing Group
http://www.prminds.com/pressrelease.php?id=2710
Joining TCG demonstrates TNT’s continuing commitment to developing open standards and ensuring the security of organizations’ critical data.
ATLANTA, GA –– September 13, 2005 – Trusted Network Technologies, Inc. (TNT), a leading developer of identity audit and control solutions, today announced that it has become a member of the Trusted Computing Group (TCG), a non-profit organization devoted to the creation of standards for strengthening the computing platform against software-based attacks. By aligning with TCG, TNT will contribute to the development of security standards and ensure that its Identity product line continues to support open standards.
“Trusted Network Technologies’ Identity solution and Identity Operation System (IDOS) align with TCG’s Trusted Network Connect (TNC) architecture, both of which are based on the concepts of integrity and identity,” said Brian Berger, TCG marketing work group chair. “A variety of network access controls, including VPNs and dial-up remote access, wireless networks, 802.1x infrastructures, and LAN environments, are supported in the TNC architecture. TNT’s innovative Identity products complement and strengthen these access control solutions as well.”
TCG develops and promotes open specifications. Industry vendors use these specifications in products that protect and strengthen the computing platform against software-based attacks. Adherence to these standards minimizes barriers to adoption by providing a common user experience across different TCG-enabled platforms while ultimately contributing to improved security for organizations’ sensitive data. Adopting TCG specifications enables more secure computing environments without compromising functional integrity, privacy, or individual rights.
"Joining TCG demonstrates our continuing commitment for helping to develop open standards, and for ensuring the security of organizations’ critical data," said Robert Ciampa, VP of marketing and business strategy for TNT. “Like TCG, our primary goal is to help users protect confidential customer and business information, and avoid risk. Trusted Network Technologies achieves this by providing identity audit and control solutions that enable companies to see, control and prove every user interaction with every computer, server and application.”
TNT’s Identity 2.0 is a simple, affordable software and appliance solution. By establishing pervasive identity for every user, computer, server and application, TNT enables organizations to easily enforce what authorized users can and cannot see or do. The identities are permanent and unalterable, and users without an identity cannot access a company’s assets at all. Identity’s clear, comprehensive reports satisfy auditors. In addition an organization can apply policy incrementally to users, groups, systems, applications, and subnets, easing deployment and reducing risk.
More than 100 companies worldwide are current TCG members, including Hewlett-Packard, IBM, Intel, Microsoft, Sony, and Sun Microsystems and many leading mobile systems and services vendors. TCG has active work groups for server, mobile devices, storage, peripherals and other implementation specifications. Hardware and software specifications are available on the organization's website.
About the Trusted Computing Group
TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft. More information and the organization’s specifications are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org.
About Trusted Network Technologies, Inc.
Trusted Network Technologies (TNT) provides identity audit and control solutions that enable companies to see, control and prove every user interaction with every computer, server and application. Utilities, banks, universities and Fortune 1000 companies rely on TNT solutions to save them millions in complying with Sarbanes-Oxley and other regulatory mandates, prevent the debilitating risk of exposing confidential information, and extend new services securely to partners and customers. TNT solutions enable these identity-driven companies to automate identity auditing and control as a fundamental business function, simultaneously strengthening and simplifying identity management and enforcement. For more information, visit www.trustednetworktech.com or call 888.566.9143.
###
Apple Strengthens Anti-Piracy Measures in Intel Version of OS X
http://www.macobserver.com/article/2005/09/13.11.shtml
Developers who purchased Apple's Intel Transition Kit, which consists of an Intel-based Power Mac that must be returned in a year, have now received version 10.4.2 of the Intel version of Mac OS X. According to Web site Twin Mac (as referenced by Macworld UK), this update strengthens the operating system's anti-piracy measures, starting with the prevention of any software built with this release from running on previous builds of Intel OS X.
What this means, according to Twin Mac, is that software built with this update won't run on the pirated copies of Intel OS X that are currently floating around the Internet. The site notes: "Apple is expected to deploy much stronger TPM [Trusted Platform Module] checks to final candidate builds, if not already implemented, in order to ensure the release versions of Universal Binary software will not run on non-authentic systems."
The Mac Observer reported last month that CNET had confirmed the existence of the TPM in the Intel Transition Kits. The TPM "handshakes" with the Mac OS X installation process, which is supposed to prevent the software from being installed on non-Apple Intel-based PCs. Apple won't stop users from installing Windows or Linux on the upcoming Intel Macs, but the company clearly wants to prevent OS X from showing up on garden variety Intel PCs.
Embassy Trust Suite 5.0 is now available
The link from Intel:
http://www.intel.com/design/motherbd/software/ets/
Wave's page:
http://www.wave.com/support/lkport_download.html
EMBASSY Trust Suite 5.0 Upgrade
For Intel Desktop Board Customers
Take advantage of our free upgrade* of your EMBASSY Trust Suite software to Version 5.0 now. The main feature is a new EMBASSY Security Center with more options for strong authentication and a consolidated view of password management for web passwords, application passwords, and TPM-based passwords.
In addition, Version 5.0 contains features that work with Wave's Enterprise Server Solutions**, such as
Multi-factor user authentication to a Windows domain controller combining options for passwords, biometrics, smart cards, and the TPM
Enterprise backup, recovery, and administration for TPM-enabled systems
* This upgrade is only available for and compatible with TPM-enabled Intel Desktop Boards D945GNT Executive Series, D945GTP Executive Series, and D945GCZ Executive Series that are bundled with the EMBASSY Trust Suite version 4.3. Any attempt to install on other Intel Desktop Board models can result in an improper configuration of the EMBASSY Trust Suite and potential data loss. For information on ordering the compatible version of ETS 5.0, click here.
**For more information on purchasing Wave's business solutions, click here .
OT: ENDFORCE Enterprise Software with Lucent VitalQIP Software Isolates Problem Computers from Corporate Network Resources
http://i-newswire.com/pr46200.html
(I-Newswire) - MURRAY HILL, N.J., and DUBLIN, OHIO — Lucent Technologies will resell ENDFORCE Enterprise™ software, the companies announced today, giving corporate and government IT managers additional power over network endpoints in the battle to ensure the security of their networks.
Technology added to ENDFORCE Enterprise now enables it to work hand-in-hand with Lucent's award-winning VitalQIP® next-generation IP address management software solution, the companies said, to make sure that all computer users on a network — on-site workers, remote offices, telecommuters and contractors — comply with official enterprise security policies before they gain access to corporate resources.
The joint solution is enabled by technology that ENDFORCE added to its Enterprise software that allows a Lucent VitalQIP DHCP ( Dynamic Host Configuration Protocol ) server to automatically identify and isolate rogue endpoints. Expensive router and switch upgrades are not necessary to gain increased control over network access.
Non-compliant endpoints include computers with missing operating system patches or out-of-date virus protection software, incorrect firewall or security settings, or those on which users have enabled peer-to-peer applications. Now these endpoints can be identified at network address assignment and can be quarantined or sent automatically to remediation servers before they are allowed access to the network. The software also can assess active endpoints to ensure that users do not alter approved settings during the day.
Industry analyst Michael Suby of Stratecast Partners ( a Division of Frost & Sullivan ) said, "As enterprises open up their networks to remote and portable endpoints, network managers need to re-evaluate their access control capabilities. This combination of products enables network managers to add an essential layer of network access control without the added concern of in-band appliance or the need to redesign their networks."
"An enterprise can now deny IP addresses to those endpoints, send those endpoints to a quarantined subnet, or send commands that isolate those endpoints to remediation servers," said Greg Moore, CEO, ENDFORCE. "This integration with the Lucent VitalQIP server enables secure network access control with broad enforcement capabilities. "
"VitalQIP was designed to simplify and automate management of IP networks with diverse security policies," said Kathleen Culver-Luzo, VitalQIP senior product manager, Lucent Technologies. "The combination of VitalQIP DHCP policies with ENDFORCE Enterprise software lifts network-based endpoint security policy enforcement to a new level. It also helps network managers improve measurement and reporting on network security compliance, which can be important to demonstrate regulatory compliance."
Lucent and its sales business partners will sell ENDFORCE Enterprise software in conjunction with VitalQIP DNS/DHCP and IP address management software. Lucent Worldwide Services LWS will provide software installation and support and incorporate the joint solution in its security offerings.
With more than 150 consultants, the LWS Security Practice team is responsible for assessing and improving network security for service providers, governments and enterprises around the world. The team offers comprehensive, multi-vendor, industry-leading reliability and security expertise and utilizes world-class models and proprietary tools from Bell Labs. Lucent continues to pioneer new security standards such as the Bell Labs Network Security Model ITU-T Recommendation X.805 recently adopted by the International Telecommunication Union. The standard is a comprehensive approach to combat security threats including hackers, viruses and worms.
ENDFORCE Enterprise automates the design, deployment and ongoing management of configurations and security policies for both fixed and mobile endpoints. By using ENDFORCE Enterprise to coordinate enforcement across existing security and customer defined applications, operating systems and network infrastructure, businesses are able to track and improve end user security compliance, while reducing the severity and costs of PC-borne network attacks.
VitalQIP DNS/DHCP IP management software helps companies efficiently configure, automate, integrate and administer IP services across the entire network. VitalQIP software simplifies processes from initial planning to solution deployment, from auditing access to the network to designating select administrator functions. VitalQIP supports Domain Name System ( DNS )/Dynamic Host Configuration Protocol ( DHCP ) and provides a single, shared network database. It is compatible with multiple technologies and platforms and streamlines diverse management tasks has a comprehensive suite of integrated add-on modules.
VitalQIP is part of Lucent's award-winning VitalSuite® Network and Service Management solution, which is used today by more than 200 fixed, mobile and broadband service providers and over 1,500 government and enterprises world-wide. For more information on Lucent's software portfolio: http://www.lucent.com/oss.
About ENDFORCE
ENDFORCE is the leader in secure network access control solutions. Leveraging CONTEXT Aware Authorization™ technology, this software-only, vendor-neutral framework protects corporate network resources from non-compliant or misconfigured endpoints, enabling enterprises to enforce endpoint security policies and control network access. ENDFORCE Enterprise™ works with existing network infrastructure to provide the most flexible and cost-effective solution for the deployment and ongoing management of endpoint security policies for fixed, mobile, wired or wireless endpoints. As a member of Cisco NAC, Microsoft NAP, and Trusted Computing Group™ ( TCG ), ENDFORCE Enterprise works seamlessly with all major network equipment platforms. For more information about ENDFORCE or to request a trial of its flagship product, ENDFORCE Enterprise, contact us at http://www.endforce.com or call 866-777-2537.
About Lucent Technologies
Lucent Technologies, headquartered in Murray Hill, N.J., designs and delivers the systems, software and services for next-generation communications networks for service providers and enterprises. Backed by the research and development of Bell Labs, Lucent focuses on high-growth areas such as broadband and mobile Internet infrastructure; communications software; web-based enterprise solutions that link private and public networks; and professional network design and consulting services. For more information on Lucent Technologies, visit its web site at http://www.lucent.com.
For more information, reporters may contact:
Dick Muldoon
Lucent Technologies
908-582-1616 – office
908-930-9391 – mobile
Email:rpmuldoon@lucent.com
Stacy Wood, Fahlgren Mortine
ENDFORCE
614-825-1806 – office
614-570-2633 – mobile
Email:stacy.wood@fahlgren.com
StocWatcher - Symantec buyout and other ramblings
I agree 100%; Unfortunately if the buyout price for Wave is too high, this may force the Symantecs of the world (ie. Trend Micro, McAfee, Computer Associates, Verisign, Infineon, Broadcom, STM or others) to find a work around to bypass Wave altogether.
Possible outcomes:
1) competition develops a solution on their own
2) and 3) competition partners with or purchases another company that has the missing link to make a complete solution that can compet with wave
4) competition stalls until it is in their best interest (ie Microsoft)
5) competition use politics to coerce others to purchase non-Wave products
6) Wave becomes a gorilla
I'm weighing the following factors:
a) Risk of purchasing Wave now - will Wave succeed? I sure hope so; I haven't followed this company for 7 yrs if I didn't so; I think they have the best odds now or at least since I started following Wave)
b) How much can I afford to lose (I can't afford to lose ALL my eggs AND the basket)
c) How much do I need to invest and sell to make serious $$$$$$$$$ before/if any of items 1-5 occur)
d) If 6 happens, then I'll hold a majority of my stock and I'll see everyone in Vegas.
At present, I don't have as much stock as I'd like, but I think I have some time before Wave is noticed by the masses. But, if Wave goes anywhere near $50 or $100 I sure won't complain.
I'm accumulating small chunks every qtr, and I'll hold my shares with an "Iron Fist" until I see it is not in the best interest of the company and the profit to the shareholders (especially myself). I plan to hold this stock as long as possible. I have many more years before I plan on retiring (errr, maybe not depending on wave's success).
I still don't have extremely high revenue expectations for this qtr; not that much traction. I anticipate at the very least:
$258,000 (just like last qtr; assumption that another 1,000,000 chips will deploy)
+
0.5% activation rate of 1,000,000 deployed chips (~5,000 ETS sales) x $30 = $150,000
+
1 or 2 KTM servers sold = $5000
Total estimated revenue = $413,000
In the near term, I'm hoping for traction in government, banking, HIPAA, SOX, and the protection of credit databases (next couple qtrs).
In several more quarters, I hope revenue is > $1 mil
thereafter, a severe hockey stick upwards
At the end of 2006 is when it will really get interesting.
* 25,000,000 deployed trusted PCs (and it looks like Wave has agreements with most of the OEMs so I'm hoping for alot of activations)
* Mobile devices - deployment of these devices will quickly outpace computers starting at the end of '06 and new application can quickly be developed and deployed (development cycle is much quicker than a PC)
* x-box 360, windows media PCs, regular PCs will start to monetize content and use premium TPM services or applications
I believe secure PCs will lag in the consumer space, unless there is a holy grail of TPM applications. I haven't seen an application at this point that meets this definition. I can eventually see the x-box 360 and windows media pcs converging into a digital platform for movie rentals and game rentals. I don't have high expectations for TVTonic anytime soon, but it's very, very early in monetizing content; TPMs need to be deployed before MPAA will trust that content can not be stolen. I also don't have high hopes for xbox 360 immediately. I believe Microsoft will primarily use the Security chip to protect against illegal copying of games.
OK, enough rambling for the evening. I need to get some sleep.
Good night
Reach
Yes, wouldn't that be something.
Wave buying either/both:
Symantec
Market Cap: 26.02B
Microsoft
Market Cap: 289.24B
Trusted Computing Group Names Roger Kay of Endpoint Technologies Associates to Advisory Council
PORTLAND, Ore. --(Business Wire)-- Sept. 1, 2005
http://www.tmcnet.com/usubmit/2005/sep/1178195.htm
Barge re: Gorillas
I believe you are correct. OEMs will not own the TPM space, and that is why Wave is able to sell to ALL of the OEMs without much controversy. Also, I do not believe Wave will be purchased by an OEM.
If I had to guess, Wave will eventually be purchased by a security company like Symantec. Symantec recently purcased Veritas. The combined company has a stake in protecting enterprise computers from Spam attacks, phishing, viruses and also providing secure enterprise storage and backup solutions.
I think Wave fits nicely into this model, and would be a good fit within Symantec. I'm not saying that a buyout is likely in the near term; but once Wave becomes a leader in Trusted Computing (millions of TPMs deployed and enabled) I think it will become much more probable at that time.
bake56 - re: Envoy
Since they are selling an "upgrade" version, does this mean that someone has actually bought the stand-alone?
or
Maybe:
Would the Intel implementation qualify as the stand-alone version?
cliffdweller: Gateway
Awesome work!
Here's some more info:
http://www.gateway.com/products/gconfig/prodseries.asp?seg=gv&gcseries=gtwym460b
TPM is prominent
M460ES
http://www.gateway.com/products/GConfig/proddetails.asp?system_id=m460esb&seg=gv
M460GS
http://www.gateway.com/products/GConfig/proddetails.asp?system_id=m460gsb&seg=gv
Trusted Platform Module (TPM)
TPM is an embedded hardware chip that stores keys, passwords and digital certificates. A groundbreaking advancement in security, TPM provides an extra level of protection against information exposure.
• Protects and authenticates user passwords from a hardware chip instead of in the software, providing a much higher level of security
• Safequards e-mail communications and file transfers, ensures private communication
• Capable of encrypting hard drive to defend against hackers
DoD Anti-Tamper Executive Agent
I don't know if this Anti-Tamper stuff is related to TPMs, but feel free to read on your own.
February, 2005
http://www.dtic.mil/descriptivesum/Y2006/AirForce/0605024F.pdf
"...All DoD acquisition programs, Foreign Military Sales, and Direct Commercial Sales with critical technology/critical information are required to have an Anti-Tamper plan with appropriate validation. The resources required to review Anti-Tamper plans and conduct Anti-Tamper validation began to ramp-up in late FY03. Currently, there are approximately eight recognized Anti-Tamper experts throught DoD. Based on Anti-Tamper validation requirement projections, this number needs to expand to approximately 40 DoD experts by FY07...
"...The Anti-Tamper technology development will occur in the following areas: advanced sensor hardware, generic electronic hardware, signature control, access detection & denial, software, and effectiveness..."
eamonnshute
I was just making the point that the military's network is vast and stretches multiple domains. For them to protect it, every point on the network needs to be secured.
TPMs are discussed in several of the papers. I'm sure they will be part of the military's strategy to help secure every PC (and I'm sure you are correct as well - TPMs will not be the ONLY technology used. The ones you listed will be used in some capacity as well.)
Doma re: Sony
Awesome find!
Here's the translated page, thanks to google.
http://translate.google.com/translate?u=http%3A%2F%2Fwww.vaio.sony.co.jp%2FBiz%2FProducts%2FVGN-BX90...
DoD Anti-Tamper
Anti-Tamper Conference
http://www.at.hpc.mil/at-conferences.htm
2006
The 2006 Anti-Tamper Conference has been scheduled for April 25-27 at Wright-Patterson Air Force Base, Ohio. The conference will run three full days. The conference classification is SECRET/NOFORN.
2005's conference agenda from April
http://www.at.hpc.mil/Docs/agenda.pdf