Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Wave Gold Support
Yup, I like the sound of that
www.wave.com/goldsupport/
Recent Job Postings at Wave
(1)Title:
Principal Software Engineer
Skills:
UEFI, BIOS 80x86, C++, Windows, Linux
Date:
3-10-2010
Description:
Wave Systems Corp. is an equal opportunity employer.
Job responsibilities:
* Design and implement solutions in preboot execution environments such as UEFI-shell or Wave*s proprietary WAVEDOS
* Maintain and extend Wave*s proprietary preboot execution environment
* Provide realistic development effort estimates and schedules
* Provide clear, concise and accurate documentation
* Work with cross-functional teams such as Quality Assurance and Product Management
Required skills:
* Open-minded in terms of technology and solutions
* The ability to communicate clearly and concisely
* In-depth knowledge of and experience in UEFI BIOS programming
* Extremely proficient in C programming and debugging
* Proficient in 80x86 assembly language
* Proficient in C++
* Detail oriented and thorough
Desirable Skills:
* Experience in successfully leading a team of developers
* Knowledge of and experience in implementing crypto algorithms
* Experience in Linux kernel/Linux driver development
* Experience in Windows driver development
* Experience with OpenSSL
* Experience with Watcom C/C++
* Experience with Visual Studio 2005/2008
Wave offers competitive salary, great benefits, casual dress code, and friendly working environment.
(2)
Title:
Senior QA Engineer
Skills:
testing client-server applications, Windows platform, setting up testing domains, Win2K, WinXP, Vista
Date:
3-10-2010
Description:
Wave Systems Corp. is an equal opportunity employer.
Nature of work:
- Insure quality and reliability client/server software products in a fast-paced, dynamic engineering environment, through the use of systematic software testing.
- Develop and apply test strategies and test plans to validate software products according to their specifications, use cases, and market requirements
Job requirements:
Candidates must have:
- Minimum of 3 years testing of integrated hardware/ software products
- Experience in setting up and troubleshooting Windows-based PCs.
- Experience in testing Windows client-server applications
- Experience user of Win2K, Win XP, and Vista.
Having the following skills is an advantage:
- Experience using WinRunner and/ or Test Director
- Knowledge or familiarity of Windows BIOS, smartcard, software security, and/ or Trusted Computing Group (TCG) technology.
- Knowledge of XML, Active Directory, SSL.
Wave Systems offer competitive salary, great benefit package, casual dress code and friendly working environment.
(3)
Title:
Project Manager
Skills:
PMI, MS Project, SDLC, BS or MS in Computer Science
Date:
3-15-2010
Description:
Wave Systems Corp. is an equal opportunity employer.
Primary Responsibilities:
? Engineering Point of Contact for our OEM Manufacturer partners
? Creation of project plans based on input from engineering and requirements from partners
? Solicit information to track projects to completion and report status internally and externally
? Receiving feedback from partners on project status
? Gather, negotiate, and document requirements at the start of projects
? Receive reports of issues from partners and provide status on those issues through resolution
? Create and expand relationships with customer representatives
? Engage with stakeholders to gain commitment to successful project completion
Background and Expertise Required To Accomplish The Job:
To perform this job successfully, an individual must meet the following minimum qualifications:
? 3+ years of experience software development project planning, PMI certification is a plus
? 3+ years of experience interacting with external customers
? Excellent communication skills
? Experience with MS Project or related project management tool and MS Office
? Ability to manage multiple projects simultaneously
? A proven track record of success managing risks, dependencies, and schedules
? BS/MS in CS/EE or equivalent
Personal Profile: (Subjective, personal attributes or qualities necessary to accomplish the job.)
? Ability to learn quickly
? Sharp problem solving skills
? Proactive and team oriented
? Self-starter with the ability to multi-task, and to handle multiple priorities
? Must have strong communication skills, verbal and written
? Must be well organized, deadline and detail oriented
? Must be able to handle confrontation with the customer in a constructive and non-damaging way
? Ability to interact successfully with personnel at all levels of the organization
? Facilitation skills with experience in managing large group meetings
(4)
Title:
C# .NET developer
Skills:
C#, .NET 3.5, WCF, OOP/OOD, LINQ, SOAP, XML/ WSDL, SQL Server
Date:
3-10-2010
Description:
Wave Systems Corp. is an equal opportunity employer.
Job Responsibilities:
- Provides principal level contribution to a team, responsible for design and development of enterprise server applications using industry best practices.
- Employs unit testing implementation and creates technical design document.
- Performs testing and troubleshooting of existing systems, working with QA team to improve product quality.
Job requirements:
- 5+ years experience developing commercial scalable server/ client or service based software products.
- Extensive and profound technology knowledge and the ability/ experience in architecting reusable solutions for enterprises.
- Proficient in C#, .NET 3.5, Web Services, WCF, OOP/OOD.
- Experience with SQL server, LINQ, SOAP, XML/WSDL
- Strong debugging skills, ability to organize and write clean and maintainable codes.
- Ability to perform assigned tasks independently, work in team environment and meet deadlines
- Ability to troubleshoot and provide technical support
- Excellent interpersonal skills
(5)
Title:
Senior Product Manager - Enterprise Server Software Specialty
Skills:
server, marketing, sales, presentation, technical expertise
Date:
3-10-2010
Description:
Wave Systems Corp. is an equal opportunity employer.
Job description:
We currently have an opening for a Senior Product Manager- Enterprise Server Software Specialty, located at our office inCupertino, CA. This position is responsible for activities associated with the development and marketing of new products and services with a focus on enterprise management of trusted platforms. Activities include developing marketing requirements documents, managing engineering project deliverables, SOWs, PRDs, MRDs, marketing brochures, whitepapers, competitive analyses, presentations and the like to establish, enhance or distinguish product placement within the competitive arena. This position performs market research, monitors competitive activity and identifies customer needs, implementing product specifications and deliverables to the sales team. This position interfaces heavily with Engineering, Technology Partners, Sales, Marketing and partners/customers and, at times, performs product demonstrations and training.
To perform this job successfully, an individual must meet the following minimum qualifications:
Six or more years of experience in product management and marketing or related field with the proven ability to develop quality products on time
Four or more years of experience with the high technology industry, specifically enterprise client management
Understanding of the product lifecycle and engineering lifecycle processes
Knowledge of technical softwaredevelopment is required for collaboration with engineering throughout the product lifecycle
Proven ability to lead cross-functional teams in a matrix management style
Proven capability in creating and delivering business presentations
A Bachelor's degree is required (preferably technical)
The following qualifications are not required, but will be instrumental in evaluating a candidate for this position:
Knowledge or experience with software security technology
Sales support, business development, marketing, or software engineering experience
Industry experience in finance, healthcare, government, or other major industry
An MBA degree
Personal Profile:
Excellent verbal and written communication skills
Customer service orientation
Strong technical aptitude and ability to grasp technical concepts quickly
Excellent organizational skills
Solid business sense combined with ability to think strategically and execute tactically
Good coaching and counseling skills
Ability to develop organizational talents
Ability to work as part of a team or independently, whichever the situation requires
Proven self-starter, who takes the initiative to solve problems and execute tasks
Lots more detail from slide 17 onward
http://www.freescale.com/files/training_pdf/VFTF09_AN133.pdf
Freescale/TrustedComputing/SmartGrid
(The scope of this thing is starting to make me DIZZY)
http://www.freescale.com/files/maps/MAPSSMGDBBPMOCRD.pdf
Now Cisco plugging End to End Trust (well, their version) in a message targeted deliberately at the government opportunity:
http://blogs.cisco.com/security/comments/end-to-end_trust_delivering_a_safer_more_secure_internet/
End-to-End Trust: Delivering a Safer, More Secure Internet
March 03, 2010
Increased Confidence, Enabled Collaboration
We depend on the Internet for news, for staying in touch with family and friends, for banking, and for entertainment. Healthcare, electrical power systems, video communications, self-service customer experience and collaboration are some of the emerging capabilities enabled by the Internet, and it’s pretty safe to say that other new capabilities will emerge in our lifetime. What we must protect and ensure is our confidence and trust in these services.
With end-to-end trust, we can have increased confidence and conviction that the hardware, software, operating systems, and network—even the data and the people online using these systems—are as safe and secure as possible. Greater collaboration is a true benefit of a trusted Internet. It enables us to communicate, interact, work, and play—essentially, get closer to those we want to get closer to, while keeping away those we don’t want near—as we conduct business and our lives.
More and Better Managed IT Services
A trusted Internet enables better services delivered through data centers and cloud computing—that is, managed solutions that use a web-delivery model, such as multitenant, pay-per-use, software-as-a-service (SaaS), and platform-as-a-service (PaaS). These services offer a flexible, low-cost, low-resource-intensive, and in some cases, a technically superior alternative to conventional technology service delivery models.
Whether it’s utility computing, online backup and recovery, or hosted email and other collaborative functions delivered as SaaS, these solutions are attractive because cloud service providers have the technology infrastructure, economies of scale, and expertise to deliver managed IT offerings to business clients at a fraction of what it would cost customers to build and operate them internally.
Furthering End-to-End Trust
A major initiative to further end-to-end trust at Cisco is the effort to ensure the protection of data as it is processed throughout the network. Data integrity, confidentiality, and authenticity are critical to the success of the network.
Today, the technologies that are used to protect data over untrusted transmission media take advantage of strong commercial cryptographic algorithms overlayed by a rich set of control capabilities. These controls make building VPN environments that are user- and administrator-friendly, reducing the barriers to deploying this critical technology.
When it comes to trusted environments, it is critical that visibility and transparency be maintained across the network. Without visibility, techniques such as intrusion prevention, stateful firewalls, and other deep-packet inspection technologies are useless. These techniques (and others) are critical to diagnose, respond to incidents, and handle other operational complexities that increase a network’s overall fragility and cost of operation.
Increased visibility and transparency enables us to assert more and better controls over our systems, which, in turn, improve our ability to protect data and also to protect users so that they can use these online tools with greater confidence.
Identity, Authentication, and Access
Information use and sharing are coming under increased scrutiny when it comes to who should access data and networks, and under what conditions that access should be granted. The common practice of allowing any device that can physically plug into a network to access that network is an invitation for problems.
It is also unreasonable for each application to be the sole point of enforcement for a coherent, enterprise-wide information access policy. This issue of identity (who you are) and policy enforcement (what you are allowed to access) is an increasing security challenge as technology continues to connect users in new ways.
In the past, the way to tackle the problem of access to network services was through operationally expensive, configuration-intensive, and relatively inflexible network design and configuration. Today, we use more granular identity-based network services achieved by determining who is attempting to access the network, and the state of the device that they are using. Once this information is in hand, the network can provide differentiated access to the network itself, as well as network-based resources.
The technologies required to provide identity-based policy enforcement are pervasive throughout communications products today. These technologies provide an opportunity to increase not only the security of the network, but also the overall effectiveness of the network as an information-sharing mechanism.
Private Industry Primed for Action
Businesses and governments must join together to protect and secure each nation’s critical infrastructure and to help protect the people who use the information and services offered by the Internet.
Creating stronger private-public partnerships to focus on key infrastructure and to coordinate responsive preventive actions is crucial to handling today’s threats. This is true both nationally and globally, because we need unprecedented levels of cooperation.
This is not just a technology challenge; it’s an education challenge. We must ask ourselves, “What are the risks, and how do I avoid them?” We also need answers to: “Who is in charge, and what is our strategy?” We must implement new and enhanced security technologies that can mitigate and eradicate the more sophisticated threats, as recommended by the Center for Strategic and International Studies (CSIS) report, Securing Cyberspace for the 44th Presidency.
The balance of privacy and security will be a major challenge for President Obama’s administration. The good news is that the industry is ready and willing to help take a leadership role and work closely with our government partners on solutions that will make us all more secure. This will go a long way to further end-to-end trust.
We have positively changed the way we live, work, play, and learn via the Internet. Now we need to ensure these benefits are here for the long term, with more to come.
John Stewart Posted by John Stewart at 06:49AM PST
Between Microsoft talking up End to End Trust, Google touting TPMs, NSA postponing its HAP conference (so everyone can get on board the next big thing), Intel launching Trusted Execution in a big way....
I dunno but it smells like a perfect storm out there, no? Cheers, Foam (just mobile missing!)
HAP Conference now on TCG website
(Very interesting presentation referenced at end of page with interesting timeline on page 14. Funny how the whole concept sounds so much like the original Embassy idea!! Cheers)
http://www.trustedcomputinggroup.org/media_room/events/47
High Assurance Platform® (HAP) Conference and Exposition
March 16, 2010 - March 18, 2010
San Francisco, California
TCG Member Speakers
Ernie Brickell, Chief Security Architect, Intel Corporation
Ronald Perez, Fellow, Platform Security Architecture, Advanced Micro Devices (AMD)
Stephen Sprague, Wave Systems
Erik Visnyak, BAE
High Assurance Platform® (HAP) Conference and Exposition Mission and Objectives:
* Learn how HAP is enabling the transformation of computing-a new approach to cyber security that reliably protects information, networks and applications in a connected world.
* Understand the HAP roadmap, and discover opportunities to help build on and extend this exciting portfolio of Trusted Computing technologies.
* HAP technologies have been deployed in multiple user environments over the past year. Learn how HAP is delivering Secure, Manageable, Sharing, and Multi-form factor solutions in these environments.
* See vendor presentations of HAP-related products and technologies and their progress toward HAP commercialization.
* Network with leading experts, vendors and users of cyber security technologies.
* IT Decision Makers: Learn how you can pilot HAP technologies in your organization, agency or program.
* Technology Vendors: Learn how you can develop and deliver trusted computing-based technologies for the burgeoning cyber security market."
For more information, please visit https://www.ncsi.com/hap10/index.shtml.
In addition, an excellent NSA overview of the HAP challenges can be found here: http://fm.csl.sri.com/LAW09/dobry-law09-HAP-Challenges.pdf
DigitalPersona/Safenet getting in on the action
Safenet (Aladdin Tokens)
http://www.pcworld.com/businesscenter/article/190656/safenet_looks_to_secure_data_in_the_cloud.html
SafeNet Looks to Secure Data in the Cloud
By Jeremy Kirk, IDG News Service
Encryption vendor SafeNet is now offering technologies that help enterprises securely store and access information held in third-party data centers.
Companies are increasing shifting their computing to vendor-hosted data centers, which poses new challenges for how information is stored, moved and accessed, said Peter Schill, SafeNet's director of channel sales, at Cebit on Wednesday.
Since company networks no longer have a traditional perimeter, the data itself must be controlled, he said.
"If you start to rent storage space here and computing power there, there is no control of who actually can access your data or manipulate your data," Schill said. "Cloud computing is not a threat to security. It can be solved if you have the right technologies in place."
SafeNet's strategy is to focus on access control and encryption. The technology in one of the new products -- intelligent authentication tokens -- comes from SafeNet's acquisition in January 2009 of Aladdin Knowledge Systems.
The tokens allow administrators to assign certain policies and access rights to different pieces of data, Schill said.
Another component is encryption. SafeNet has a hardware appliance that can manage the keys used to encrypt databases, applications and other information, Schill said. The appliance centralizes encryption processing and performs other functions such as logging, auditing and policy administration.
SafeNet doesn't have a product name for the cryptographic key storage or the intelligent authentication tokens, but neither technology needs its own appliance. It can be bought as a so-called "virtual appliance" that can be installed on another server. SafeNet also sells hardware security modules.
SafeNet has many competitors in the areas of authentication tokens or encryption, but Schill said SafeNet has an edge as its central management and encryption system can be used with different databases such as IBM's DB2, Microsoft's SQL or Oracle products.
Digital Persona
http://pr-usa.net/index.php?option=com_content&task=view&id=342863&Itemid=96
DigitalPersona, Inc., a global provider of authentication and endpoint protection solutions, today announced DigitalPersona® Pro Workgroup, a new line of software that makes enterprise-class security affordable and easy to deploy and manage for small and medium-size businesses (SMBs) and departments within larger organizations. The new suite of endpoint protection software provides central management ofsecurity applications that come factory-installed by a leading PC manufacturer that is announcing central management for security software on its notebooks today. DigitalPersona is demonstrating the new software this week at the RSA Conference in San Francisco (booth #2623).
DigitalPersona Pro Workgroup combines three of the most important security functions - Data Protection, Access Management and Secure Communications - into one, centrally-managed solution that is easy for administrators and end users alike. With the new solution,businesses can immediately reduce the burdens on IT staff that arise from installing and configuring security applications, managing passwords, rescuing remote users from PC lockouts and searching for ways to demonstrate compliance with regulations.
DigitalPersona Pro Workgroup gives IT administrators a Web browser-based console for defining and deploying security policies tailored to the needs of diverse groups of users. These policies control a suite of security applications on users' PCs that provide:
-- Data Protection - encryption of disk drives and files
-- Access Management - single sign-on with strong authentication to
computers, networks and applications
-- Secure Communications - digital signing of documents and encryption of
email
The new DigitalPersona Pro Workgroup software provides an out-of-the-box solution for centrally managing the endpoint protection tools that are now being factory-installed on many of the leading models of notebooks and desktop computers. DigitalPersona also provides software for other PCs that can be installed by customers with just a few clicks, enabling IT administrators to seamlessly manage new and old machines together.
With DigitalPersona Pro Workgroup, businesses can deploy strong security in a way that keeps costs low, both at purchase and over time. The software combines crucial security applications such as single sign-on and full disk encryption into a single, affordable solution. It automates the management of passwords, simplifying compliance with strong password policies without driving up helpdesk burdens. DigitalPersona Pro Workgroup also provides an efficient way to manage multiple strong authentication credentials, such as smart cards, fingerprint biometrics and facial recognition, in one place. To further savebusinesses time and money, DigitalPersona Pro Workgroup also enables IT administrators to prevent lockouts when remote users forget passwords or smart cards.
"Previously, organizations that wanted the simplicity and savings of using endpoint protection software that came with their new PCs often had to give up remote administration and consistency across brands of computers," said Jim Fulton, vice president of marketing at DigitalPersona. "Now, with DigitalPersona Pro Workgroup, organizations can have the best of both worlds: affordable central management of factory-installedsecurity applications along with strong, easy-to-use endpoint protection for their existing PCs."
Pricing
DigitalPersona Pro Workgroup provides endpoint protection for notebooks and desktop computers that run Microsoft Windows XP, Windows Vista or Windows 7. It may be purchased from digitalpersona.com, starting from $24.95 USD per machine; special discounts are available for brands of PCs that come with DigitalPersona Pro-compatiblesecurity software. It may also be downloaded from within compatible endpoint protection tools that are factory-installed on many of the world's leading models of notebooks anddesktop computers. For more information, visit www.digitalpersona.com/enterprise/products/pro.
Thanks SL, does it portend some activity on that front on the horizon?
Microsoft Partner/ Raytheon customer
Aren't those new items on the list? (first time I see that)
I know that Microsoft has been in the background for a while, but isn't that the first time they are so prominently displayed as a partner (maybe NAP partner)? Also, Raytheon for a customer is pretty large-scale no?
Just some passing thoughts.... Foam
AuthenTec Acquires SafeNet’s Embedded Security Solutions Division
(Wave Partners)
http://in.sys-con.com/node/1300130
AuthenTec (NASDAQ: AUTH), a leading provider of smart fingerprint sensors and solutions, announced today that it has acquired SafeNet, Inc.’s Embedded Security Solutions Division in a cash and stock transaction which further strengthens AuthenTec’s offering of security and identity management solutions.
SafeNet’s Embedded Security Solutions products are used in hundreds of millions of communication and network products to ensure data privacy for businesses and individuals, and are sold to a variety of brand name customers including HP, Samsung, LG, Ericsson, AMD, Cisco, Alcatel-Lucent, Juniper Networks, Nokia-Siemens and Texas Instruments among others. SafeNet’s Embedded Security Solutions recorded embedded IP and software revenues of $15.5 million in 2009 with gross margins exceeding 90 percent and operating income margins of over 20 percent (the unaudited results of the business are subject to adjustment during the audit process). AuthenTec will also become the exclusive worldwide supplier of SafeNet’s SafeXcel security processor ICs, representing over $3 million in incremental sales in 2009. The deal is expected to be accretive to AuthenTec’s non-GAAP earnings in 2010, after consideration of the Division’s deferred revenue.
Under terms of the transaction, AuthenTec paid $8.5 million in cash and issued 1.2 million shares (valued at $2.8 million at the closing) of its common stock. The transaction also calls for an earn-out of up to $2.5 million in cash based on the attainment of certain revenue goals for the remainder of 2010.
“This acquisition continues our transformation from a component supplier to a more comprehensive source of security, identity management and touch control solutions. The addition of SafeNet’s Embedded Security Solutions not only significantly strengthens our offerings in our existing markets, but also broadens our revenue base,” said AuthenTec CEO Scott Moody. “By leveraging the expertise of the SafeNet engineering team in software development, network security and secure communication, AuthenTec will have the ability to offer secure end-to-end solutions, from the individual PC or cell phone all the way to the network server in the cloud. This acquisition also helps drive additional revenue growth while improving gross margin and accelerating our return to profitability.”
Commenting on the acquisition, SafeNet CEO Mark Floyd stated, “This transaction offers compelling value to SafeNet’s existing embedded customers, allowing them the opportunity to extend a secure environment for managing data security needs beyond the server and network, and directly to the end-user on either a PC or mobile device. We are extremely pleased that an industry leader such as AuthenTec will continue to build on the success of our Embedded Security Solutions team, and we look forward to working closely with AuthenTec as a strategic supplier.”
AuthenTec will benefit from the addition of SafeNet’s highly qualified Embedded Security Solutions staff of encryption, algorithm, software and silicon design engineers and its expansive portfolio of software, IP and hardware products. These include SafeXcel IP Cores (i.e., protocol aware inline security processing, security packet processing, encryption, authentication/hashing, public key acceleration, true random number generation, etc.), QuickSec Embedded Security toolkits, Mobile VPN and Digital Rights Management (DRM) Fusion Solutions. It also includes the Division’s 23 U.S. patents as well as additional foreign patents, bringing AuthenTec’s U.S. portfolio to 144 issued and pending patents.
AuthenTec will also add SafeNet’s highly regarded security and encryption IP content and expertise, which aligns with AuthenTec’s longer term strategy to generate its own IP licensing revenue. These IP cores will also reduce the Company’s planned licensed IP expenses.
The Embedded Security Solutions’ team will continue to operate from engineering locations in the Netherlands and Finland, while also strengthening AuthenTec’s existing sales and support locations in Japan, Korea, Taiwan, the U.S., and Europe. Commenting on the transaction, former SafeNet Managing Director Dr. Simon Blake-Wilson, now AuthenTec Vice President of Embedded Security Solutions said, “In discussions last year we realized the power of combining the world class security technologies of SafeNet with the leading edge biometric products being introduced by AuthenTec. Our global team is energized and eager to pursue the unique opportunities that AuthenTec's strong combination of biometrics and encryption will enable.”
About AuthenTec
AuthenTec provides security, identity management and touch control solutions for enterprise and consumer applications. The Company’s smart sensor products and security solutions are used in virtually every aspect of life, from the PC on your desk to the mobile device in your hand to the server in the cloud. AuthenTec’s newest generation of TruePrint® smart sensors, TrueSuite™ identity management software and TrueProtect™ embedded security products (formerly SafeNet Embedded Security Solutions) provide developers and users secure and convenient ways to manage today’s rapidly evolving digital identities and security needs. For more information, visit www.authentec.com or follow us at twitter.com/authentecnews.
About SafeNet
SafeNet is a global leader in information security, founded more than 25 years ago. The Company protects identities, transactions, communications, data and software licensing through a full spectrum of encryption technologies, including hardware, software, and chips. More than 25,000 corporate and government customers in 100 countries including UBS, Nokia, Fujitsu, Hitachi, Bank of America, Adobe, Cisco, Microsoft, Samsung, Texas Instruments, the U.S. Departments of Defense and Homeland Security, the U.S. Internal Revenue Service, trust their security needs to SafeNet. In 2007, SafeNet was acquired by Vector Capital, a $2 billion private equity firm specializing in the technology sector.
Helpful -Hats off to you and Dabears.
Incredible stuff and as one of the HAP presentations says commercialization is, well I can't resist, HAPpening now
Wave is the default application pre-installed on Dell business line, but customer can select Credant upon purchase. Credant's software does manage self encrypting drives but not TPMS, as far as I can see (there will be competition, of course).
http://www.credant.com/dell
Steven Sprague keeping good company at HAP Conference
https://www.ncsi.com/hap10/speakers.shtml
Speakers
Mr. David Hunter
CTO, Public Sector, VMWare Inc.
Mr. Ian Pratt
Citrix
LTC John Armentrout
Division Chief/Project Manager, USSOCOM J6X
Dr. Ernie Brickell
Chief Security Architect, Intel Corporation
Mr. Ahment Gorowora, CISSP, ISSEP
Program Manager, Information Assurance Systems and Programs, General Dynamics C4 Systems
Mr. Alan Greenberg
Tech Director, Cyber and Information Solutions, Boeing
Mr. Dave Huff
Chief Technology Officer, FNMOC
Mr. Mark Moore
Fritz Technologies
Dr. Sanjai Narain
Telcordia
Mr. Ronald Perez
Fellow, Platform Security Architecture, Advanced Micro Devices (AMD)
Dr. John Rodell
Senior Product Manager - Security Products, Objective Interface Systems, Inc.
Mr. Stephen Sprague
Wave System
Mr. Erik Visnyak
BAE
HAP PARTNER PROGRAM
https://www.ncsi.com/hap10/agenda4.shtml
Looking Forward: HAP Partner Program, Opportunities Ahead
HAP has the potential to remake the whole computing infrastructure – but only as it's commercialized. Here's the big vision for HAP commercialization and how we're pursuing it. First big step - the HAP Tech Partner Program – launching now.
Lots of TC at HAP Conference in March
https://www.ncsi.com/hap10/agenda2.shtml
1) HAP Security 101
Trusted Computing Base & Chipset
* VTx, VTD
* Attestation
* SRTM & DRTM
* Measured Launch
* Mitigation
* TPM Basics
* RFI Connection
2) HAP Manageability/Infrastruture 101
Paints the high level view of HAP program goals for manageability, and explain benefits/use cases supported by HAP. Discuss progress to date, and problems still to be solved Provide a high level discussion of single wire, remote administration, lightweight operations, interoperability, peer to peer communication, on-demand secure launch.
3) Driving Protection Down Into the Hardware - How HAP beats Ring Attacks
Provide a HAP Technical Overview (present day, how is HAP constructed), Introduce the Ring concept and how HAP gets down to Ring -
4) Moving to a Trusted Enterprise
A HAP environment comprises components. The relative impact these components will have on your enterprise infrastructure. Different scenarios for rolling out HAP into an enterprise based on different assumptions on common refresh strategies. A way to start, proceed in a step-by step low risk way toward a broad deployment.
5)
On Demand Secure Launch for Your Desktop
On-demand: The ability to transition a platform from non-secure operation to secure operation and from secure operation to non-secure operation. What’s in place today. Challenges.
6)HAP Compatibility with Standards
1. What standards HAP is supporting/are applicable
2. TCG and DMTF standards addressed and what implication(s) does that have?
3. How HAP Reference Implementations comply
4. Why we're using these
5. Review of HAP Documents
6. Starter Kit
Low Power HDD offers self-encrypting feature.
http://news.thomasnet.com/fullstory/573154
Toshiba Introduces Industry's Highest-Capacity Small Form Factor Enterprise HDD
High-Performance, Low-Power 600GB 2.5-inch HDD is Toshiba's First SAS Self-Encrypting Enterprise Drive
IRVINE, Calif. -- Toshiba Storage Device Division (SDD), a division of Toshiba America Information Systems, Inc. and the industry pioneer in small form factor enterprise-class and mobile hard disk drives (HDDs), today announced a new high-capacity, high-performance, power-efficient small form factor product line for enterprise applications. With top capacity at 600GB(1), the new MBF family represents the industry's highest-capacity 2.5-inch enterprise-class HDD and features Toshiba's first enterprise-class self-encrypting drive (SED) offering.
The introduction of the MBF series demonstrates the successful integration of Toshiba and Fujitsu's HDD business last year and illustrates Toshiba's capability and commitment to building further leadership in the enterprise market. This series meets the exacting standards of the enterprise market with 10,025 RPM spin speed and a 6Gb/s SAS interface for use in mid-range volume servers, mainstream storage arrays, blade and rack-mount servers and other business-critical, power-conscious, data-intensive applications.
Building upon the inherent lower power consumption that comes with 2.5-inch HDDs, the MBF series reduces power consumption up to 28 percent, using a new enhanced power condition state, which enables the HDD to spin at a lower RPM when not in use.
"With a 600GB maximum capacity, lower power consumption and smaller footprint, Toshiba's small form factor enterprise HDDs further enable the growing trend of enterprise system migration from 3.5-inch to 2.5-inch HDDs," said Joel Hagberg, vice president of enterprise marketing at Toshiba Storage Device Division. "Optional inclusion of Toshiba's SED technology supports endpoint protection in data-sensitive environments. This total package offers an efficient and effective solution for enterprise storage system manufacturers and system builders."
Self-Encrypting Drives
Certain models of the MBF series offer an option of drive-based encryption designed to the Trusted Computing Group (TCG) Enterprise Security Subsystem Class specification. The TCG specifications provide standards-based protocols to promote industry-wide adoption by HDD vendors, security management independent software vendors (ISVs), independent hardware vendors (IHVs) and storage system designers. The transparency of encrypting data within the storage device simplifies the deployment and provides an easier path to compliance with regulatory mandates for stronger security practices. As such, SEDs have become an important component in the enterprise environment with features such as secure erase, which makes the repurpose and retire process easier for organizations that use these drives.
Availability
The MBF product line is available in 300GB, 450GB and 600GB capacities and will ship in volume in April 2010 with samples available now for design development. For more information on Toshiba's line of industry-leading enterprise-class small form factor hard drives, visit www.toshibastorage.com.
Interesting that HP has been added as a Channel Partner on the Wave site (used to be just a solutions partner).
http://www.wave.com/partners/
Also here as a lead in to RSA 2010
Events
AGC's 6th Annual West Coast Emerging Growth Conference
Monday, March 01, 2010 - San Francisco, CA
AGC will host its 6th Annual West Coast Emerging Growth Conference on Monday, March 1st and Tuesday, March 2nd in San Francisco. The agenda for Monday the 1st will focus on the information security sector and again serves as a kick-off for the week-long RSA Conference. The agenda for Tuesday the 2nd will focus on the other hottest sectors and companies in emerging growth, including clean tech, digital media/Internet, software, semis, comms, data center, FinTech and business services. The programs will include thought-provoking keynote addresses by industry leaders, panel discussions on the most relevant topics of the day and company presentations delivered by executives of leading public and private emerging growth companies.
http://www.americasgc.com/_downloads/AGC2010WestCoastAgenda.pdf
Consulting, Security Dominate IT Job Opportunities for 2010
http://soa.sys-con.com/node/1265970
By Dana Gardner
February 1, 2010 09:45 AM EST
The latest BriefingsDirect Analyst Insights Edition, Volume 48, centers on the IT job landscape for 2010. We interview David Foote, CEO and chief research officer, as well as co-founder, at Foote Partners LLC of Vero Beach, Fla.
David closely tracks the hiring and human resources trends across the IT landscape. He'll share his findings of where the recession has taken IT hiring and where the recovery will shape up. We'll also look at what skills are going to be in demand and which ones are not. David will help those in IT, or those seeking to enter IT, identify where the new job opportunities lie.
This periodic discussion and dissection of IT infrastructure related news and events, with a panel of industry analysts and guests, comes to you with the help of our charter sponsor, Active Endpoints, maker of the ActiveVOS business process management system, and through the support of TIBCO Software. I'm your host and moderator Dana Gardner, principal analyst at Interarbor Solutions.
Here are some excerpts:
CIO, CTO & Developer Resources
I co-founded this company with a former senior partner at McKinsey. We developed a number of products and took them out in 1997. We not only have that big IT executive and trends focus as analysts, but also very much a business focus.
We've also populated this company with people from the HR industry, because one of the products we are best known for is the tracking of pay and demand for IT salaries and skills.
We have a proprietary database -- which I'll be drawing from today -- of about 2,000 companies in the U.S. and Canada. It covers about 95,000 IT workers. We use this base to monitor trends and to collect information about compensation and attitudes and what executives are thinking about as they manage IT departments.
For many years, IT people were basically people with deep technical skills in a lot of areas of infrastructure, systems, network, and communications. Then, the Internet happened.
All of a sudden, huge chunks of the budget in IT moved into lines of business. That opened the door for a lot of IT talent that wasn't simply defined as technical, but also customer facing and with knowledge of the business, the industry, and solutions. We've been seeing a maturation of that all along.
What's happened in the last three years is that, when we talk about workforce issues and trends, the currency in IT is much more skills versus jobs, and part of what's inched that along has been outsourcing.
If you need to get something done, you can certainly purchase that and hire people full-time or you can rent it by going anywhere in the world, Vietnam, Southeast Asia, India, or many other places. Essentially, you are just purchasing a market basket of skills. Or, these days, you can give it over to somebody, and by that I mean managed services, which is the new form of what has been traditionally called outsourcing.
It's not so much about hiring, but about how we determine what skills we need, how we find those, and how we execute. What's really happened in two or three years is that the speed at which decisions are made and then implemented has gotten to the point where you have to make decisions in a matter of days and weeks, and not months.
Resisting the temptation
There have been some interesting behaviors during this recession that I haven't seen in prior recessions. That lead me to believe that people have really resisted the temptation to reduce cost at the expense of what the organization will look like in 2011 or 2012, when we are past this recession and are back into business as usual.
People have learned something. That's been a big difference in the last three years. ... Unemployment in IT is usually half of what it is in the general job market, if you look at Bureau of Labor Statistics (BLS) numbers. I can tell you right now that jobs, in terms of unemployment in IT, have really stabilized.
In the last three months [of 2009] there was a net gain of 11,200 jobs in these five [IT] categories. If you look at the previous eight months, prior to September, there was a loss of 31,000 jobs.
So going into 2010, the services industry will absolutely be looking for talent. There's going to be probably a greater need for consultants, and companies looking for help in a lot of the execution. That's because there are still a lot of hiring restrictions out there right now. Companies simply cannot go to the market to find bodies, even if they wanted to.
Companies are still very nervous about hiring, or to put it this way, investing in full-time talent, when the overhead on a full-time worker is usually 80-100 percent of their salaries. If they can find that talent somewhere else, they are going to hire it.
There are certain areas, for example, like security, where there is a tendency to not want to hire talent outside, because this is too important to a company. There are certain legacy skills that are important, but in terms of things like security, a lot of the managed services that have been purchased in 2009 were small- to medium-sized companies that simply don't have big IT staffs.
If you have 5,000, 6,000, or 7,000 people working in IT, you're probably going to do a lot of your own security, but small and medium size have not, and that's an extremely hot area right now to be working in.
We track the value of skills and premium pay for skills, and the only segment of IT that has actually gained value, since the recession started in 2007, is security, and it has been progressive. We haven't seen a downturn in its value in one quarter.
High demand for security certification
Since 2007, when this recession started, overall the market value of security certs is up 3 percent. But if you look at all 200 certified skills that we track in this survey that we do of 406 skills, overall skills have dropped about 6.5 percent in value, but security certifications are up 2.9.
It is a tremendous place to be right now. We've asked people exactly what skills they're hiring, and they have given us this list: forensics, identity and access management, intrusion detection and prevention systems, disk file-level encryption solutions, including removable media, data leakage prevention, biometrics, web content filters, VoIP security, some application security, particularly in small to medium sized companies (SMBs), and governance, compliance, and audit, of course.
The public sector has been on a real tear. As you do, we get a lot of privileged information. One of the things that we have heard from a number of sources, I can't tell you the reason why, is that a lot of recruiting is happening in the private sector right now with the National Security Agency and Homeland Security -- in-the-trenches people.
I think there was a feeling that there weren't enough real deep technical, in-the-trenches kind of talent, in security. There were a lot of policy people, but not enough actual talent. Because of the Cyber Security Initiative, particularly under the current administration, there has been a lot of hiring.
Managed services looks like one of the hottest areas right now, especially in networking and communication: Metro Ethernet, VPNs, IP voice, and wireless security. And if you look at the wireless security market right now, it’s a $9 billion market in Europe. It’s a $5.7 billion market in Asia-Pacific. But in North America it’s between $4 and 5 billion.
There's a lot of activity in wireless security. We have to go right down into every one of these segments. I could give you an idea of where the growth is spurting right now. North America is not leading a lot of this. Other parts of the world are leading this, which gives our companies opportunities to play in those markets as well.
For many years, as you know, Dana, it was everybody taking on America, but now America is taking on the rest of the world. They're looking at opportunities abroad, and that’s had a bigger impact on labor as well. If you're building products and forming alliances and partnerships with companies abroad, you're using their talent and you're using your talent in their countries. There is this global labor arbitrage, global workforce, that companies have right now, and not just the North American workforce.
Published February 1, 2010
TCG: Secure physical and logical access
http://www.trustedcomputinggroup.org/community/category/data_protection
27 January, 2010
PAC-NAC Convergence: Another Video Game or Security?
by TCG in Action,
We might all recall fondly the Pacman games of our youth. But today, PAC also means something else: physical access control. And physical access control, used in buildings and facilities worldwide to keep track of who is coming and going, is converging with network access control. In a nutshell, thanks to efforts by TCG and its members such as Hirsch Electronics and others, strangers tailgating into your building can't get into your network. How is TCG involved?
TCG's Trusted Network Connect interfaces enable: location, identity, endpoint health, and behavior- based access control decisions for users in an enterprise environment; detection and remediation of illicit activity, such as data leakage by an endpoint or unauthorized changes to network device configurations; and correlation of physical security with network access privileges. A demo at Interop 2009 showed how this works. For more details, see the Interop Las Vegas Press Kit.
This effort continues and is gaining traction. Next week, Bob Beliles, participant, TNC Work Group and VP of Enterprise Business Development, Hirsch Electronics, will speak on "Extending Trust and Security to Networked Physical Security" on February 2, 2010, Track 101 at 11.30 a.m at the TechSec Solutions conference. He will talk about integrating physical security with network security and how TCG specs enable this.
For more on this topic, consider attending a panel session at RSA, where Beliles will be part of the panel session PHYS-403, Does Physical Security on the Network Create New Vulnerabilities? This session is Friday, March 05 11:20 AM, Orange Room 304.
More info on this session: Physical security has only recently moved to IP implementation. Video (CCTV) and card-based access control have been "siloed" systems, communicating on a basis proprietary to their manufacturer. What new vulnerabilities to the network are created as these devices migrate to the network? Do manufacturers know how to preserve network integrity? Do they understand threats from the network? This session will examine issues such as these in the context of the leading systems in the industry. More info on RSA sessions can be found @ http://www.rsaconference.com/2010/usa/index.htm.
Authentication, Data Protection, Network Security, News & Events
LandWarNet-August, 2010
http://events.jspargo.com/lwn10/public/Content.aspx?ID=12650&sortMenu=104000&exp=1%2F7%2F2010+7%3A04%3A04+AM
Lots of interesting references to Trusted Computing (some quite explicit others seem to just imply such an approach to security)
2. New and emerging technologies on both the network and on the host side that can provide "revolutionary game changing" improvements to defense of our systems, networks and data.
ii. Comprehensive Endpoint Protection: Technology that ensures workstations and servers are not compromised. Looking at solutions that cover all aspects of end point protection (not point solutions like desktop firewalls, but comprehensive solutions with integrated, enterprise class management capabilities).
vii. PC Health & Integrated Network Access Control: Technology that enables validation and remediation of security and policy on workstations and services. Technology should check system state at network connect and periodically throughout the connection period. Automatic detection of security or policy violations, automatic quarantine, and compliance with standards (802.1x, Trusted Network connect, DoD Common Access Card …) are all desired. Must support management at the Army Enterprise level.
10. Web Services Enablement & Security: “Technologies that support the development of a standards-based architecture that allows for secure and interoperable machine-to-machine interaction/collaboration across platform standards and technologies, to include the operation of secure web portals/services.”
23. Trusted computing Initiative: Technology that leverages the various Trusted Computing Group initiatives including:
a. Trusted Platform Module
b. Trusted Network Connect
c. Status of COTS implementation
Hi Weets
I like the very targeted pitch of the two RSA presentations (methinks Wave sees some very concrete opportunities ahead) and by Thibadeau no less. Let's see how this thing screeches ahead as the rubber hits the pavement. Cheers
Other interesting RSA track
https://cm.rsaconference.com/US10/catalog/catalog/catalog.jsp
Session Detail
Session Code: LAW-401
Session Title: Digital Forensics vs. Security & Encryption
Scheduled Date/Time: Friday, March 05 09:00 AM
Green Room 132
Session Abstract: From self-encrypting drives to auto-wiping media, advances in data security present unique challenges to accurate and effective forensic evidentiary collection. Failure to anticipate the ramifications of encrypted or secured data can result in a complete breakdown of the digital forensic process. The panel will discuss current devices, legal challenges and capture solutions currently used in the field.
Panelist: Hoyt Kesterson Consultant
Terra Verde Services
Robert Thibadeau Technologist in the Office of the CEO
Wave Systems, Inc.
joel weise Principal Engineer and Chief Technologist
Sun Microsystems, Inc.
Joseph Burton Attorney
Duane Morris, LLP
Moderator: Serge Jorgensen CTO
Sylint Group
Interesting RSA Track (Hi and congrats to all)
https://cm.rsaconference.com/US10/catalog/catalog/catalog.jsp
Session Code: LAW-303
Session Title: Untangling the Legal and Technology Web of the State and Federal Data Breach Laws
Scheduled Date/Time: Thursday, March 04 10:40 AM
Green Room 132
Session Abstract: With health reform, the HITECH Act, and cybersecurity in the forefront, 2010 is the year security professionals get serious about preventing data breaches. Legal and encryption experts sort out the inconsistencies and complexities in the legal and technical data breach requirements that result in uncertainties for global business and among health providers. An insider’s view reveals how even though sensitive records were “encrypted,” massive data breaches occurred because of failed security.
Panelist: Eric Hibbard CTO, Security and Privacy
Hitachi Data Systems
Robert Thibadeau Technologist in the Office of the CEO
Wave Systems, Inc.
Thomas Smedinghoff Partner
Wildman Harrold
Moderator: Lucy Thomson Engineer and Attorney
CSC
Interesting Dell Presentation (Feb. 2009)
http://www.tietoturvatapahtuma.fi/pdf/David_Hall.pdf
Smartphone demonstrator from Escrypt??
http://www.elektroniknet.de/home/termine/foren/embedded-world-conference-2009/program/classes/
(Marko Wolf, Escrypt)
Thursday March 05, 2009
Trusted Computing for Embedded Devices
- Introduction to Trusted Computing
- When should we use Trusted Computing for embedded application?
- Smartphone Demonstrator
More from G.&D. and mobile secure execution
(Thursday, March 05, 2009)
http://www.elektroniknet.de/home/termine/foren/embedded-world-conference-2009/program/abstract/?ID=510
Future Mobile Device Security
- Technology overview
- Components in the ecosystem
- Device and system security
- Touch&Travel a German NFC-eTicketing Solution
Why is a secure execution environment in a mobile needed?
Enhanced handset security results in diverse new application potentials for handsets and other mobile systems:
- Enabling of payment and ticketing applications which require security critical functionalities in the handset, e.g. for key-management or a secure UI (User Interface); especially in conjunction with upcoming NFC (Near Field Communication)-enabled handsets
- Transfer of authorities and rights for DRM systems (super distribution) over secured areas between different embedded systems.
- Support of security tasks in the embedded operating system by means of a security functionality executed in the Secure-Runtime e.g. virus scanner, personal firewall or a HTTPS-gateway
- Secure keypad and display unit over the Secure-Runtime in combination with banking and payment transactions where user credentials are protected to unlock SIM security functionalities
How can such a secure execution environment be realized?
A Secure-Runtime isolates security critical processes by software and hardware based mechanisms e.g. the ARM Trust Zone with a G&D-Runtime. The concept of ARM Trust Zone involves two separate Runtime environments. This can be considered as a duplication of the two processor modes into the normal world and the secure world. The normal world executes a richOS such as Windows Mobile, Andreoid, Symbian/Series60, whereas the secure world hosts a G&D-Runtime
The Secure-Runtime guarantees that resources which were assigned to a secure handset application are never used or modified in an unauthorized manner e.g. by a malicious in the richOS. An erroneous or malicious code cannot cause damage beyond its memory boundaries. Therefore the basic protection mechanism between different programs is isolation provided by the G&D-Runtime and ARM Trust Zone technology.
S.Sprague talking encryption and NSA Suite B
http://www.ctst.com/CTST09/agenda.html
3:30 PM - 5:00 PM
D24: Cryptography
* The Movement Towards NSA's Suite B Cryptography
* Trusted Platform Module(TPM)in PKI and Non-PKI Environments
* ECC in Digital Device Communications: What's Next After HDMI?
* Intellectual Property Issues Around ECC
* Applications Using ECC
Matt Campagna
Director, Research
Certicom
Santosh Chokhani
President
CygnaCom Solutions
Mike Epstein
Director, Standardization, Philips Intellectual Property & Standards
Philips Electronics N.A. Corp.
Steven Sprague
President & CEO
Wave Systems Corp
Vodafone on MTM at Mobey Forum
http://www.mobeyforum.org/files/Mobey%20Forum%20programme%20Edinburgh%20Webbi.pdf.
Recent Infineon presentation on TC
They sure see the potential. Interesting part on embedded at the end.
www1.gi-ev.de/fileadmin/gliederungen/rg-rn/Vortraege/Brandl1.pdf
NFC and Trusted Execution
Trusted Logic
www.trusted-logic.com/2009_press_releases/TrustedNFC
Giesecke
http://ec.europa.eu/information_society/events/cf/document.cfm?doc_id=8550.
TC in Germany featuring all the heavyweights
http://conference.get2us.com/index.php/Program-overview.html
Mobile Trusted Module (MTM) Is Now One Step Closer To Reality
https://www.trustedcomputinggroup.org/blog/?p=42
By Janne Uusilehto, Nokia (February 13, 2009)
As you may remember, the Trusted Computing Group published the Mobile Trusted Module, or MTM, specification during the iX-Conference 2007 in Singapore. Since then there has not been much visible action outside of TCG, but inside the organization, the “engine” never stopped. In fact, “under the hood” the engine has been running at full speed. TCG’s Mobile Phone Work Group has been processing the facts and feedback regarding the MTM specification. We have been been planning how compliance of the different MTM implementations can be ensured and how the different conformance approaches can be practically accomplished.
Additionally, the Mobile Phone Work Group is completing practical work to test the MTM specification. You may remember the MTM open source implementation which was published last year. About a week ago, the Mobile Phone Work Group published our newest achievements in area of MTM specification analysis with selected use cases. This work has been done to ensure we understand how MTM can be utilized in practice. To access these documents, please visit our Mobile Phone Work Group specification page by clicking here. There you can see how MTM can enable security in practice for mobile applications.
A next step for the MTM is that it will be available for many new mobile applications, many of which have been waiting for standardized hardware security to be available through multiple platforms around the world. That will finally open a new era in the mobile applications and services industry for handheld devices such as smart phones, mobile phones and PDAs.
This entry was posted by Janne Uusilehto on Thursday, February 12th, 2009 at 10:24 am and is filed under Mobile. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
Fullmoon/Awk - Acer Veriton specs. mention TPM
http://global.acer.com/products/desktop/vtl670g.htm
The Intel® Core™2 processor with vPro™ technology features accelerated processing of multi-threaded applications with improved system manageability for reduced service calls and system downtime.
The Intel® Q45 Express Chipset -- designed specifically for the business world -- reinforces flexible security and manageability solutions, and new levels of performance and power efficiency.
Acer Client Manger simplifies company networking management, facilitating easy and remote management of common IT tasks.
Acer Security Suite utilizes Trusted Platform Module (TPM) 1.2 for total data security for system files, passwords and other vital information via high-level encryption and security key protection. It also features:
- Wave® EMBASSY® Trust Suite strengthens authentication, data encryption, one-stop security management and TPM security to several common applications.
- Acer eDataSecurity1 Management features embedded TPM enhancement for advanced data security and integrity.
Intel® Active Management Technology (Intel® AMT) 5.0 allows easy cataloging and management of hardware/software assets, remote heal and repair of damaged or corrupted systems, and protection of systems from outside attack.
Veriton ControlCenter, an exclusive help utility suite, enables trouble-free management of data, power, frequently used programs and other useful information in a central-control interface.
Green-certified by international standards with compliance to GS, and ENERGY STAR® 4.0.
Hawkshaw - Most are older postings, just two new ones in Engineering (there had been only 3 for quite a while, now there are five). Regards, Foam
New Engineering positions at Wave
(In this climate this bodes pretty well)
http://www.wave.com/about/employment.asp
NBC Sports on TVTonic
http://www.tvtonic.com/content/
Barclays talk sponsored by PGP
(Probably not Wave)
http://agendabuilder.gartner.com/sec9i/WebPages/SessionDetail.aspx?EventSessionId=893
ASISEEIT - Yearly reports to the best of my knowledge. What they are referring to is certification (not certificates) for their management solutions from government such as Common Criteria (CC) from NIST. If you look at Wave's potential the language is a bit underwhelming as Cliff puts it, but these kinds of reports measure mostly actual business deployment and the momentum going forward based on that traction. I think Q3 numbers and comments will give us a better idea if Wave is now starting to gain some of that significant traction and if Gartner's report a year from now will look any different. Regards, Foam