Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Business Roundtable Endorses Bipartisan "Cyber Intelligence Sharing and Protection Act" -- Praises Swift Committee Action
3:49 PM ET 12/2/11 | BusinessWire
Business Roundtable endorsed the Cyber Intelligence Sharing and Protection Act of 2011 (H.R. 3523), as introduced in the U.S. House of Representatives by Intelligence Committee Chairman Mike Rogers (R-MI) and Ranking Member Dutch Ruppersberger (D-MD), and praised the Intelligence Committee for its near unanimous approval of the important legislation.
"Protecting our cyber infrastructure is of vital importance to America's economic and national security," said Ajay Banga, President and CEO, MasterCard Incorporated, and Chairman, Business Roundtable Information and Technology Committee. "This legislation is an important first step towards updating and retooling our nation's cybersecurity capabilities to create a public-private foundation necessary to address dynamic cybersecurity threats. We are pleased that the House of Representatives acted in a swift, bipartisan manner to address this growing national problem."
In a letter to Chairman Rogers, BRT President John Engler praised the legislation as an essential component to a more robust and responsive cybersecurity infrastructure.
"Increasingly, well-funded cyber adversaries are targeting our government as well as the U.S. business community, threatening our national and economic security," Engler stated. "The legislation (H.R. 3523) authorizes the Director of National Intelligence to implement effective, collaborative real-time information sharing capabilities between the public and private sectors. Business Roundtable is encouraged that this approach could lead to the integration of the full resources of the U.S. government, including defense, intelligence, homeland security, diplomatic, economic and trade assets."
In BRT's recent policy paper, Mission Critical: A Public-Private Strategy for Effective Cybersecurity, the CEOs of America's leading companies presented a strategy to protect U.S. economic and national security from growing global cybersecurity threats through the development of a more modern, flexible and collaborative approach to protecting America's strategic information assets.
Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with over $6 trillion in annual revenues and more than 14 million employees. BRT member companies comprise nearly a third of the total value of the U.S. stock market and invest more than $150 billion annually in research and development -- nearly half of all private U.S. R&D spending. Our companies pay $163 billion in dividends to shareholders and generate an estimated $420 billion in sales for small and medium-sized businesses annually.
BRT companies give nearly $9 billion a year in combined charitable contributions.
There's are many reasons for the selling pressure of late, especially year end tax selling. Last Jan - Feb Wave traded a lot of shares over $4! Now we're at $2.16.
Watch what happens in January, I'm expecting an strong move up!
JMHO
Wavxmaster
Weby
Another recent hire!!
216 connections
Sung Lee's Experience
Sr. Research Scientist
Wave Systems Corporation
June 2011 – Present (7 months)
Senior Researcher
Fujitsu Laboratories of America
December 2001 – May 2011 (9 years 6 months)
December 2001 – May 2011 (9 years 6 months)
Senior System Architect
Signafor, Inc
October 2000 – November 2001 (1 year 2 months)
Senior Software Engineer
Inrange Technologies
July 1999 – October 2000 (1 year 4 months)
Senior Network Engineer
Mitre Corporation
January 1999 – July 1999 (7 months)
Software Engineer
Computer Sciences Corporation
June 1992 – January 1999 (6 years 8 months)
Programmer/Analyst
Arist Corporation
December 1991 – April 1992 (5 months)
http://www.linkedin.com/in/sylee
jd
Wrong guy highlighted!
Aidan Herbert, Wave Systems
Aidan Herbert's Summary
Technical and business management of network and computer security products. Interested in how emerging technologies will influence the enterprise IT security market and enable consumer and SMB confidence on online services.
Specialties
Market and technology analysis, business plan development, products strategies, product definition, go to market and business development.
Aidan Herbert's Experience
Product Manager
Wave Systems
Public Company; 51-200 employees; WAVX; Computer Software industry
2006 – Present (5 years)
Managed definition and market introduction of data protection and strong authentication products. Trusted Computing (hardware embedded security) based solutions which target the convergence of endpoint security and IDAM. Defining SAAS solutions that will enable enterprises to economically meet their security and compliance needs. Defining high assurance OpenID solutions for the enterprise, which provide a secure & scalable alternative to the complexity of full identity federation
Subject Matter expert
Crimson Consulting
Privately Held; 11-50 employees; Management Consulting industry
2005 – 2005 (less than a year)
Provided consulting services in the areas of Identity and acess management and virtualization security. Conducted competitive analysis on industry leading solutions for role based management and Web access security
Product strategy consultant
DigitalPersona
2004 – 2004 (less than a year)
Developed strategy for business transition form biometric sensor solution provider to Biometric Application Service Provider. Conducted analysis and definition of biometric product opportunities and biometric partner opportunities in the embedded solutions market.
Business Development
Network Virtual System
2002 – 2003 (1 year)
Defined product opportunities and cultivated business partnerships in the network security space. NVSys had a non-blocking flow-through processor architecture that was optimized for real-time, high bandwidth compute intensive applications (i.e. 10G IPsec)
Director of Marketing
Imodl
1999 – 2001 (2 years)
Product manager
IKOS Systems
Public Company; 201-500 employees; IKOS; Computer Software industry
1991 – 1997 (6 years)
Engineer
Trilogy Computer Systems
Privately Held; 51-200 employees; Information Technology and Services industry
1983 – 1984 (1 year)
'Taxi Vader'
It's good to have such powerful friends!!
"Growing threats and awareness, and changes in technology such as mobile devices and cloud computing are key drivers of spending growth in the cyber security market," added PwC's Jaber.
PwC firms help organizations and individuals create the value they're looking for. We're a network of firms in 158 countries with close to 169,000 people who are committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com.
Wavxmaster
"In addition, the Samsung mSATA SSDs feature an advanced hardware-based security solution including 256-bit Advanced Encryption Standard (AES) protection, which will prevent unauthorized access to data on a lost or stolen notebook PC.
Beginning this year, the market for Ultrabook-class mobile PCs has been growing rapidly and is expected to expand beyond that of tablet PCs as early as next year due to outstanding performance characteristics, more advanced processors and use of the Windows 8 operating system. According to market research firm IHS iSuppli, the Ultrabook share of global notebook shipments will exceed 40 percent in 2015."
Samsung Announces High-Performance mSATA SSDs for Ultra-Slim Notebook PCs
9:00 PM ET 11/30/11 | BusinessWire
Samsung Electronics Co., Ltd, a global leader in advanced semiconductor technology solutions, today announced volume production of SSDs (solid state drives) that support the Mini-Serial ATA (mSATA) interface. The drives are designed for use in ultra-slim notebooks such as Ultrabook(TM) PCs.
"Samsung's compact mSATA SSDs will provide performance of the highest quality in helping to deliver the advanced ultra-slim PCs that consumers have been wanting," said Myungho Kim, vice president of memory marketing, Device Solutions, Samsung Electronics. "Samsung plans to continue providing timely delivery of advanced SSD solutions, while preserving its leadership position in the SSD market for notebook PCs."
Combining Samsung's new high-performance mSATA SSDs with the latest multi-core processors will help PC manufacturers to substantially improve performance of their Ultrabook-class portable PCs up to that of notebook PCs, in meeting ever-increasing consumer needs.
The new Samsung mSATA SSDs* will be available in 256, 128 and 64 gigabyte (GB) densities as main storage devices, and also at 32GB for caching. They measure 50.95 x 30 x 3.8 millimeters and weigh a mere eight grams.
The new SSDs will be part of the highly popular Samsung PM830 product family that was introduced earlier this year. They make use of Samsung's advanced 20 nanometer class** NAND flash memory components which incorporate the toggle DDR interface.
Utilizing high-performance SATA 6Gb/s controllers based on Samsung's own technology, the new mSATA SSDs can operate at the industry's highest sequential read and write speeds of 500 megabytes per second (MB/s) and of 260MB/s respectively, under optimum conditions. This is, more than six times the speed of hard disk drives typically offering a data transfer rate of 80MB/s. The Samsung SSDs also enable faster system boot-ups (in the 10-second range) and will transmit five DVD files in about a minute.
In addition, the Samsung mSATA SSDs feature an advanced hardware-based security solution including 256-bit Advanced Encryption Standard (AES) protection, which will prevent unauthorized access to data on a lost or stolen notebook PC.
Beginning this year, the market for Ultrabook-class mobile PCs has been growing rapidly and is expected to expand beyond that of tablet PCs as early as next year due to outstanding performance characteristics, more advanced processors and use of the Windows 8 operating system. According to market research firm IHS iSuppli, the Ultrabook share of global notebook shipments will exceed 40 percent in 2015.
'jakes dad'
Another nice find! Thanks for all the DD you contribute, it's much appreciated!
Wavxmaster
Somebody was buying today!
Nov. 30, 2011 Market Close: $ 2.25 After Hours Last:
Net / % Change $ 2.25
unch (unch) After Hours High: $ 2.25
After Hours Volume: 58,268 After Hours Low: $ 2.161
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:50 $ 2.25 7,516
16:31 $ 2.25 50,352
16:13 $ 2.25 200
16:07 $ 2.161 200
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1fESdgW9g
'New Wave'
Add to that, the short interest increased by 1,040,000 shares between Nov 1st - Nov 15th!
11/15/2011 9,280,191 335,666 27.647099
10/31/2011 8,240,919 467,843 17.614710
10/14/2011 8,326,545 446,886 18.632369
http://www.nasdaq.com/symbol/wavx/short-interest
It's a wonder that we've been able to stay above $2.00!! I've done my part as has my brother!! ; )
Just trying to make it until 2012!!
Wavxmaster
'24601
How many shares does management hold? Not sure how accurate the number below is, but they really don't have many shares!
http://www.secform4.com/insider-trading/919013.htm
Total Insider Shares Held 492.65K?
Samsung beats Apple in Australian appeal
9:51 PM ET 11/29/11 | Marketwatch
SYDNEY (MarketWatch) -- Samsung Electronics Co. won a legal appeal Wednesday that will allow it to sell its latest tablet computer in Australia despite efforts by Apple Inc. to block the device. The ruling overturns a temporary ban on the sale of the Galaxy 10.1 Tab on the grounds that it infringed patents held by Apple's iPad. The lawsuit is part of a global legal battle between the two companies, with Apple alleging the Korean electronics maker has copied its designs.
http://regsho.finra.org/FNSQshvol20111129.txt
2011/11/29|WAVX|52852|0|161125|Q
Perhaps there's some tax loss selling & mrgin selling going on. Since Jan 2011's high of $5.31, Wave has traded downwards! Perhaps we may just have to wait for Jan 2012!
Wavxmaster
'Shiba'
Right you are!! I guess I was just trying to stretch the dollar, instead of having it shrink on me!!
Wavxmaster
'Escrow'
From your mouth to the market's ears!! I guess 2012 should be our year. I know Gov't's work slow, but when you read about all this talk out a potential cyber 9/11 and still glacial speed!
Between the NSA, the CESG, the SI's, you'd think we'd see more traction!
I wish Wave had Leaps, options just don't give enough time!
Wavxmaster
PS Thanks for the reply, it seems as if Ihub/Wave has been evacuated!
Last hour yesterday, Open @ $2.14 Close @ $2.22, 165,000 shares
This morning, open @ $2.21 after 15 minutes, $2.15 on 12,700 shares
jd
Ambitious! Operational by 2013!! I guess they want to make sure that there's nothing left to steal!! Then they can say that is a 100% success! LOL
Yeah, 2015, ambitious! They must be invested in Wave!
"The National Crime Agency is the U.K. equivalent of the Federal Bureau of Investigation. The new division is set to be fully operational by 2013.
The goals are ambitious. By 2015, the measures outlined in the strategy document will place the United Kingdom in a position "where law enforcement is tackling cyber-criminals, citizens know what to do to protect themselves, effective cyber-security is seen as a positive for U.K. business, a thriving cyber-security sector has been established, public services online are secure and resilient, and the threats to our national infrastructure and national security have been confronted," Maude wrote.
TPT
I thought this was of interest!! 178 April $5.00 calls @ $.15
The July $5.00 calls were only $.20
I thought I was an optimist buying more of the April $2.50's! I paid $.40 for them.
Remember what happened last December! ; )
http://bigcharts.marketwatch.com/advchart/frames/frames.asp?show=&insttype=Stock&symb=wavx&time=8&startdate=1%2F4%2F1999&enddate=11%2F28%2F2011&freq=1&compidx=aaaaa%3A0&comptemptext=&comp=none&ma=5&maval=10&uf=0&lf=1&lf2=4&lf3=32&type=2&style=320&size=3&timeFrameToggle=false&compareToToggle=false&indicatorsToggle=false&chartStyleToggle=false&state=11&x=33&y=12
WAVE SYSTEMS CORP COM NEW APR-12 $5.00 CALL
(WAVX Apr 21 '12 $5 Call)
Last Price Today's Change Bid (Size) Ask (Size) Day's Range Volume Trade
0.15 0.00 (0.00%) 0.10 x11 0.15 x160 0.15 - 0.15 178
Wavxmaster
Short Volume
20111128|WAVX|40343|0|142936|Q
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Nov. 28, 2011 Market Close: $ 2.22 After Hours Last:
Net / % Change $ 2.22
unch (unch) After Hours High: $ 2.22
After Hours Volume: 36,741 After Hours Low: $ 2.214
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
17:32 $ 2.22 1,663
17:29 $ 2.22 6,353
16:25 $ 2.22 26,125
16:12 $ 2.214 2,600
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1f2jPGRtI
'brant point'
Little AH action! 144,000 shares trade in the last 15 minutes!
Wave Systems Corp. (WAVX) After Hours Trading Pre-Market Charts | After Hours Charts Nov. 28, 2011 Market Close: $ 2.22 After Hours Last:
Net / % Change $ 2.22
unch (unch) After Hours High: $ 2.22
After Hours Volume: 28,725 After Hours Low: $ 2.214
Learn more about the After-Hours trading session. Trade DetailAfter Hours
Time (ET) After Hours
Price After Hours
Share Volume
16:25 $ 2.22 26,125
16:12 $ 2.214 2,600
Read more: http://www.nasdaq.com/symbol/wavx/after-hours#ixzz1f2VVXlLV
VH
Wave and LynuxWorks First to Demonstrate Management and Support for Self-Encrypting Drives in a Secure Virtual Environment
Lee, MA and San Jose, CA — September 14, 2010 — Wave Systems Corp. (NASDAQ:WAVX www.wave.com) and LynuxWorksTM today announced their collaboration on the use of a self-encrypting hard drive to provide data-at-rest protection alongside the LynxSecure separation kernel and hypervisor securely running multiple operating systems on a PC. This capability is significant because it solves the complexity and performance issues typically associated with encrypting data on virtual machines running different operating systems. The demonstration takes place this week at the National Security Agency’s (NSA) Trusted Computing Conference and Exposition (Orlando, September 14-16) and again at the Embedded Systems Conference (Boston, September 21-22).
At least Wave got a mention!
Engineers from LynuxWorks and Wave Systems Corp. in Lee, Mass., are collaborating on the use of a self-encrypting drive (SED) with the LynxSecure separation kernel and hypervisor for running multiple operating systems simultaneously on a single endpoint. The solution links individual encrypted disk bands to different secure virtual domains provided by LynxSecure running on a single device.
Portable and mobile
The use of portable and mobile endpoints increase the risk of data compromise; yet, the collaborative use of SEDs and secure virtualization on an endpoint offers protection, according to a LynuxWorks representative. “SEDs are a better option than traditional software encryption for protecting data when using virtualization on an endpoint, given that the encryption is ‘built in’ to the drive itself. Multi-banded SEDs feature separate bands on the disk, with each band separately encrypted that can be used for storing data with separate levels of security or sensitivity on a single system.”
At the same time, an end-point device linked to secure virtualization enables multiple virtual machines on a single physical machine, enabling different operating systems and applications to run simultaneously. The LynxSecure secure separation kernel and hypervisor maintains each virtual machine in its own secure partition, effectively splitting an endpoint device into multiple secure systems.
“Each OS and application set is held in their own secure partition, and the data for each is protected using encrypted drive bands with different encryption keys per partition,” Day explains. “This provides a true secure multi-use/ multi security level system housed in an industry standard endpoint.”
Separation kernel technology is one of the fundamental building blocks used by the defense industry for running multiple security levels on a single system, the company representative adds. “Secure virtualization can effectively separate traditionally unsecure environments from sensitive applications and data that are housed on the same endpoint.”
“Our collaboration with LynuxWorks and the LynxSecure separation kernel and hypervisor is helping to bring new levels of protection to sensitive data held on portable endpoint devices,” says Robert Thibadeau, chief scientist and senior vice president at Wave Corp.
Looks as if we're going to fill the mornings gap up!
Well, a few more options/calls today! When will I learn?
We need some PR's showing that there's still life @ Wave!
Quarterly CC's just won't cut it if we're looking for some continuation!
Perhaps 2012 will be the coming out party.
Wavxmaster
Good day for the market on Monday! Black Friday was strong &
8:43 PM ET 11/27/11 | Marketwatch
LOS ANGELES (MarketWatch) -- Hong Kong stocks rose sharply Monday morning on hope for progress in resolving the European debt crisis, with banks, resources and property among the leading advancers. The Hang Seng Index added 2.1% to 18,061.55, while the Hang Seng China Enterprises Index rose 2.6%, as the Shanghai Composite traded 0.5%higher. Reports of possible International Monetary Fund support for Italy and agreement on how to leverage the region's main rescue facility pushed banks higher. HSBC Holdings PLC rose 2.4%, Bank of Communications Co. climbed 2.7%, and Agricultural Bank of China Ltd. traded up 3.3%. Gains for commodities helped resource shares, with Jiangxi Copper Co. up 3.5%, Cnooc Ltd. rising 3.3%, and Angang Steel Co. ahead by 3.6%. Real-estate shares did particularly well too, with Agile Property Holdings Ltd. up 5%, China Overseas Land & Investment Ltd. rising 5.1%, and Henderson Land Development Co. improving by 3.4%.
In the News
[SC Magazine]
Nov 1, 2011
Debate: The recent arrests of cybercriminals will drive others to think twice before launching attacks.
Edy Almer, VP, marketing & business development, Safend
Cyberthreats are on the rise, and while security technology and policies have significantly improved, so have the attackers' focus and tools. Many organizations, including some of the leading security vendors, such as RSA, Kaspersky, Comodo and others, recently have been breached. To many it may appear that we are losing to the hackers, as defense lines fall one after the other. However, the success of defense contractor Northrop-Grumman to withstand continuous attacks, as well as the recent arrests of international hackers, point out that even if attackers manage to get through a company's defenses, they inevitably leave behind a forensically acceptable digital trail. If one has a decent forensic collection tool in place, law enforcement and governments around the world are cooperating more fully to track attackers and bring them to justice. Highly publicized cases, like TJX and others, should serve as a deterrent, and remind would-be hackers that cybercrime, in the end, does not pay.
http://www.safend.com/49-3200-en/In%20the%20News.aspx
http://www.safend.com/49-3192-en/In%20the%20News.aspx
Safend Data Protection Suite v3.4SP4
Michael Lipinski
10/3/2011
Product Information
Vendor:Safend
Product: Safend Data Protection Suite
Version:3.4SP4
http://www.safend.com
Price:$25+ per seat
Product Rating
Features
Ease of Use
Performance
Documentation
Support
Value for Money
Overall Rating
For:Full control over fixed, removable media, and system ports and devices. Easy to use and deploy.
Against:Sharing of encrypted data on non-client devices can be done, but is clunky.
Verdict:Full featured and a great price.
Safend Data Protection Suite (DPS) v3.4SP4 protects against data leakage by providing centrally managed desktop and laptop hard disk encryption. DPS is a hard disk encryption solution that leverages the security of full-disk encryption and the flexibility of file-based encryption to protect sensitive data. By encrypting data files - but not OS or executable files - multiple users' data can be protected and segregated. User logout or standby instantly removes encryption keys for that user and protects against cold boot attacks. DPS is completely transparent - it does not require users to activate the encryption/decryption process or select or recover keys. Administrators can fix machines and install software without access to encrypted data.
Internal hard disk encryption's effectiveness is multiplied by using removable media encryption running on the same agent and enabled with a server license.
Server prep necessitated us installing .Net 3.5 and IIS. Everything else installed for us with the Data Protection Suite Management Server implementation. The install offers a choice between using MS SQL or the embedded database, a nice deployment feature. Once up and running, user management is done through Active Directory (AD) integration. One has to open Windows Management Instrumentation (WMI) ports on Windows Firewall for the management system to poll devices, but this allows one to not only manage them but also detect hardware.
Admins can install the user agents manually or via a group policy object (GPO). There was also a MAC client available, which we did not test. Security is set via policies and applied to AD groups, users or machines. One has full control over fixed and removable media encryption, including port and device control.
"The proliferation of mobile devices in the enterprise -- and workers' tendency to use them for both business and play -- is causing significant shifts in the way IT manages endpoints," said Russell Zientek, chief executive officer of COMPUTERLINKS North America. "As a value-added distributor, we want to make sure that our partners can offer their customers the most effective, comprehensive endpoint security solutions available. We looked at the leading security products on the market and found that Safend offers a superior overall solution for our VARs and solution providers."
http://www.safend.com/81-2973-en/Press%20Releases.aspx
Mar 1, 2011
Safend Partners With COMPUTERLINKS to Expand Distribution Throughout North America
Channel Distribution Agreement to Support Growing Demand for Safend's Endpoint Data Protection Solutions
PHILADELPHIA, PA and AUSTIN, TX -- 03/01/11 -- Safend, a leading provider of endpoint data protection solutions, and COMPUTERLINKS, a global value-add distributor, today announced that COMPUTERLINKS will distribute Safend's products throughout North America. Under the terms of the agreement, COMPUTERLINKS will be an additional support alternative for Safend's existing channel partners and will offer Safend's complete suite of award-winning security solutions to its customer base of value-added resellers, OEMs and system builders. The distribution agreement covers Safend's entire Data Protection Suite of products, including Safend Auditor, Safend Encryptor, Safend Protector, Safend Inspector, Safend Discoverer and the recently-released Safend Protector for Mac.
"The proliferation of mobile devices in the enterprise -- and workers' tendency to use them for both business and play -- is causing significant shifts in the way IT manages endpoints," said Russell Zientek, chief executive officer of COMPUTERLINKS North America. "As a value-added distributor, we want to make sure that our partners can offer their customers the most effective, comprehensive endpoint security solutions available. We looked at the leading security products on the market and found that Safend offers a superior overall solution for our VARs and solution providers."
Industry statistics consistently show that the most significant security threat to the organization comes from within. With over 60 percent of corporate data residing on endpoints, gateway solutions and written security policies alone cannot mitigate the risk. The award-winning Safend Data Protection Suite delivers complete visibility, control and protection of enterprise endpoints. Tamper resistant and operating transparently on each endpoint, the Safend Data Protection suite discovers, classifies, protects, alerts, logs, blocks and encrypts organizations' most vital data whether devices are on or off line.
"COMPUTERLINKS is a highly respected player in the technology distribution business and we are very excited to be working with them," said Clay Rogers, vice president of Channel Sales at Safend. "Not only will COMPUTERLINKS greatly expand our reach in the channel and provide comprehensive marketing and technical support to our reseller partners, but Safend's products fill COMPUTERLINKS' need for an endpoint and DLP offering and helps ensure greater protection for enterprises. With the global demand for endpoint data protection solutions growing rapidly, this partnership is a strategic win-win."
http://www.safend.com/81-3087-en/PR%202011%20Best%20Deployment%20Scenario%20Awards.aspx
Jun 14, 2011
Info Security Products Guide awards Safend winner of the 2011 Best Deployment Scenario Awards
Leading Endpoint DLP Provider Honored in the Encryption Solution
and Information Leak Prevention Categories
Philadelphia and Tel Aviv – June 14, 2011 – Safend, a leading provider of endpoint data protection solutions, announced today that Info Security Products Guide, the industry's leading information security research and advisory guide, has named Safend a winner of the 2011 Best Deployment Scenario Awards in the Encryption Solution and Information Leak Prevention categories. This prestigious award recognizes security vendors with advanced, ground-breaking security solutions that are helping set the bar higher for others in all areas of information security. Safend was selected based on real-world solution deployments that are making the most positive impact on security in today’s highly sophisticated and blended attacks environment.
Safend was honored for its ability to help one of the largest financial institutions in South Africa safeguard their intellectual property and customers’ critical data persistently, as well as meet new regulatory requirements. The bank chose Safend’s Data Protection Suite – which is comprised of Safend Inspector, Safend Discoverer, Safend Encryptor, Safend Protector, Safend Protector for Mac and Safend Discoverer for Mac – to meet the bank’s greatest security threat of information leaks through endpoints that include USB, RW DVD, external hard drives and SD cards.
Safend was also recognized for its work with a large U.S.-based healthcare insurer who services more than 550,000 individuals in 13 counties. The insurer looked to Safend to deploy its Data Protection Suite, including its Safend Encryptor solution, in order to protect and secure sensitive customer data from internal and external threats. Safend Encryptor was able to seamlessly protect the insurer’s data, without changing any of its existing end-user or helpdesk workflows, and the deployment was over in less than a month with little to no overhead.
To read more about these winning case studies, please visit http://www.infosecurityproductsguide.com/casestudies/
“The most powerful message security vendors can give to prove their capabilities and continued commitment in solving customers’ security needs is through successful deployments,” says Rake Narang, editor-in-chief, Info Security Products Guide. “Safend's successful deployments at two large enterprises facing significant security and regulatory challenges show that its technology is setting the standard in endpoint data leak prevention.”
“Info Security Products Guide’s recognition of Safend’s Data Protection Suite further validates our commitment to our customers that our products and solutions can be successfully deployed,” said Edy Almer, VP Marketing and Business Development for Safend. “Safend offers the most comprehensive data security solution available, and customer trust is of the utmost importance to everyone in our company as we believe customer satisfaction is the key to our success.”
About Info Security Products Guide Awards
Info Security Products Guide sponsors leading conferences and expos worldwide and plays a vital role in keeping end-users informed of the choices they can make when it comes to protecting their digital resources. It is written expressly for those who are adamant on staying informed of security threats and the preventive measure they can take. You will discover a wealth of information in this guide including tomorrow's technology today, best deployment scenarios, people and technologies shaping info security and independent product evaluations that facilitate in making the most pertinent security decisions. The Info Security Products Guide Awards recognize and honor excellence in all areas of information security. To learn more, visit http://www.infosecurityproductsguide.com/ and stay secured.
http://www.safend.com/81-3009-en/Press%20Releases.aspx
Jay Smilyk
Vice President, Sales Americas
Prior to joining Safend, Jay Smilyk spent seven years at Check Point Software Technologies, an internet security software company, in various sales management roles. In his most recent position, Mr. Smilyk established and managed the System Integrators and Major Accounts teams responsible for enterprises such as IBM, Unisys, CSC, SunMicrosystems, HP, Lockheed Martin as well as Fortune 100 companies. Prior to joining Check Point, Mr. Smilyk held executive and sales positions with companies such as Intermedia communications, Reiter Associates and InPower. Mr Smilyk holds a Bachelor of Science Degree from University of Delaware.
http://www.safend.com/88-en/Executive%20Team.aspx#member_1518
Adam Carmi
Vice President, Research and Development
Mr. Carmi built Safend’s R&D Server team from the ground up as early team member at Safend. Prior to joining the Safend management team, Mr. Carmi led Safend’s engineering department, where he drove the infrastructure and architecture for Safend’s flagship products and defined the technical requirements and solutions for major OEM partners worldwide. Prior to joining Safend, Mr. Carmi worked in the IBM research group, where he participated in various research initiatives such as the product definition for innovative application generation prototypes. As a member of Microsoft’s Research group, Mr. Carmi also conducted programming language and compiler related research. Prior to this position, Mr. Carmi was a Software Engineer at Intel, responsible for numerous software development projects. Mr. Carmi holds a B.Sc and M.Sc degrees in Computer Science from Technion University.
For those who think that size is all that matters!
“To be named a top DLP solution provider highlights Safend’s commitment to have best of breed components for the most comprehensive, cohesive endpoint and DLP offering available. It was a special pleasure for us to win when up against Symantec, McAfee, Trustwave and Lumension”.
Apr 20, 2011
Safend wins the European SC Magazine Award for Best DLP Solution
Safend Data Protection Suite recognised for unprecedented level of enterprise data protection against corporate data loss and theft.
London and Tel Aviv - April 20th, 2011 - Safend, a leading provider of endpoint data protection solutions, announced today that SC Magazine Europe, the industry's leading information security magazine has named the Safend Data Protection Suite a winner of the 2011 DLP category. Winners were announced during the awards dinner and presentation on April 19, 2011 at Hilton Park Lane in London.
Safend’s Data Protection Suite provides Port and Device Control, Hard Disk Encryption, Removable Content Encryption, Content Inspection and Content Discovery in a single agent, singe console comprehensive solution for Windows and Mac OS/X. This innovative concept adheres to stringent security requirements, is transparent to end-users and facilitates the highest level of performance and productivity.
Safend’s Data Protections Suite is comprised of Safend Inspector, Safend Discoverer, Safend Encryptor, Safend Protector, Safend Protector for Mac and the recently-announced Safend Discoverer for Mac. The combined suite is designed to offer an unprecedented level of enterprise data protection against corporate data loss and theft while ensuring compliance with HIPAA, PCI, SOX, CoCo, BASEL II and other regulatory data security and privacy standards.
“We couldn't be more pleased to receive this honor from SC Magazine Europe, which further validates our product as excellence-in-class and ahead of the curve,” said Edy Almer, VP Marketing and Business Development for Safend. “To be named a top DLP solution provider highlights Safend’s commitment to have best of breed components for the most comprehensive, cohesive endpoint and DLP offering available. It was a special pleasure for us to win when up against Symantec, McAfee, Trustwave and Lumension”.
The SC Awards Europe are universally recognised as the most coveted and prestigious awards for the European information security industry. The SC Awards honour professionals working to secure enterprises and the vendor and channel communities that deliver innovative security technologies.
Mig
Haven't seen you around lately. I know you're planing on buying a jet when/if Wave becomes wildly successful!
No need to wait!
http://gma.yahoo.com/video/news-26797925/the-jetman-amazes-again-27400620.html
Wavxmaster
rc
"There are people at the NSA who love Wave and who included Wave in a huge way at the September conference focusing on trusted identities and trusted computing in networked environments."
This is also true on the other side of the pond with NSA's counterpart in Great Britan, the CESG. I don't think these conferences are held to just pass the time and have tea & crumpets, I know Waves' management prefer coffee & doughnuts! ; )
Wave Systems to Play Host to Leading Information Security Experts at the Trusted Computing Seminar in London
Discussion will centre on developments in trusted computing solutions and their use in government and industry
London, UK — October 3, 2011 — Wave Systems Corp. (NASDAQ:WAVX www.wave.com) will play host to leading authorities on data protection at the Trusted Computing Seminar on 20th October in London. The event, to be held at the Royal Aeronautical Society, is focused on Chief Information Officers, Heads of IT Security and Risk Managers, and will feature government advisors and some of the world’s foremost experts on information security. The discussion will focus on current and future practices and policy, and the emerging role of hardware security built on open standards set forth by the Trusted Computing Group (TCG).
Joseph Souren, Vice President and General Manager, Wave Systems EMEA, will lead the day-long seminar, introducing a highly accomplished panel of experts that includes David Smith, the Deputy Commissioner and Director of Data Protection of the Information Commissioner’s Office; Ian White, the Deputy Technical Director of CESG; Owen Pengelly, Deputy Director (Policy) of the Office for Cyber Security & Information Assurance, Cabinet Office; Steven Sprague, CEO of Wave Systems; David Lacey, Director of Research of the ISSA-UK; Boudewijn Kiljan, Solution Architect Global IT, PricewaterhouseCoopers; Stuart Aston, the Chief Security Advisor of Microsoft UK; Robert Thibadeau, the Chief Scientist of Wave Systems, and inventor of SEDs, and James Stevenson, EMEA technical Lead from Netwitness.
Open to senior IT professionals, the seminar comes at a time when hacking and data loss stories continue to make the headlines, and as governments and enterprises are realising the need to re-examine their data security protocols.
Agenda highlights include:
•An overview of data protection regulations from the Information Commissioner’s Office, and the role that managed hardware encryption plays in achieving compliance.
•An update from the National Security Agency (NSA) 2nd Annual Trusted Computing Conference held last month, with Mr. Sprague discussing techniques and technologies to enhance security and the end user experience. He will also provide details on a new approach to detect the presence of Advanced Persistent Threats using open standards hardware. APTs can elude conventional anti-virus software on the market.
•The best practices from CESG, the UK’s Communications Electronics Security Group, for using trusted computing to secure the corporate infrastructure. CESG is the UK Government’s technical authority on Information Assurance.
•How PwC (PricewaterhouseCoopers), one of the world’s leading accounting and tax advisory services, utilized industry standard embedded security (the Trusted Platform Module) for authentication, realizing greater security and a lower total cost of ownership.
•Microsoft UK’s Stuart Aston, Chief Security Advisor, will share the software firm’s views on trusted computing and provides a glimpse into how Windows 8 leverages the TPM.
•A roundtable discussion that addresses the future of trusted computing for mobile devices.
“This year we’ve assembled a group of government officials, leading security experts and representatives from global brands to explore how trusted computing can address some of the most pressing security issues of the day,” Mr. Souren said. “We’re experiencing a growth in support from across industry and government, from Microsoft’s recent discussion on the expanded use of TPM in Windows 8 to CESG’s endorsement of trusted computing and the benefits it can bring for securing networks and locking down data. Attendees are going to gain the practical knowledge to incorporate the latest advancements in hardware security for their own organizations.”
'Taxi Vader'
Edy Almer
Vice President, Marketing and Business Development
Prior to joining Safend, Edy Almer managed the Encryption and Endpoint DLP products in the Endpoint Security Group at Symantec (SYMC). Mr Almer managed the memory cards product line at M-Systems, prior to its acquisition by Sandisk (SNDK). Mr. Almer previously drove the launch of several flagship projects at Orange (PTNR), Israel’s fastest growing cellular operator, resulting in 100,000 new 3G customers one year after launch. As the CTO of Partner Future Comm, Mr. Almer charted the product and company strategy for potential venture capital recipient companies. Mr. Almer holds a Bachelor’s degree in Electrical Engineering from Technion, and his MBA from Tel Aviv University.
http://www.safend.com/49-3143-en/In%20the%20News.aspx
http://www.zdnet.com/news/how-to-keep-your-data-secure/262243?tag=search-results-rivers;item0
Awk
"The reason Wave SP is falling...
.... that a new and better system has been developed:"
I never expected you, of all posters, of trying to pull the wool over our eyes!
Priceless! I hope the Gov't doesn't get any ideas!
Wavxmaster
DD
Surprising #'s!!
If the share volume is double counted, 3.6 million for the period under examination(Nov 1st - Nov 15th), then about 1.8 million shares traded and the short #'s increased by over 1 million!
60% of the trades were the shorts as you posted!
You said:
"It's just a matter of time WAVX SP will break through the short ceiling/control, and I can't wait for that day to come."
I wonder if that day will occur in 2011? I was buying shares & a few April $2.50 calls last week. This week I will add once again. I guess there aren't many selling, just shorts digging a deeper hole for their potential tomb, perhaps too deep to cover before they're really buried! Every share that is accumulated should help with their funeral!
Wavxmaster
11/15/2011 71% shorts!!!
20111115|WAVX|105085|0|146820|Q
Date|Symbol|ShortVolume|ShortExemptVolume|TotalVolume|
http://regsho.finra.org/FNSQshvol20111115.txt
11/14/2011 66% shorts
20111114|WAVX|91491|0|138674|Q
'jakes dad'
What we need is for Wave to announce some deals, with $$$ attached!!!
Nov 26,2010 Closing price $2.54
Nov 25,2011 Closing price $2.10
Another year goes by!
11/1 356,100 Shares/ close $2.62
11/2 345,100
11/3 340,800
11/4 193,600
11/7 258,900
11/8 200,900
11/9 451,900
11/10 303,500
11/11 331,800
11/14 386,600
11/15 488,900 shares/ close $2.54
Total shares traded 3,658,200
Total Shares shorted 1,039,272
11/15/2011 9,280,191 335,666 27.647099
10/31/2011 8,240,919 467,843 17.614710
'awk'
From the last CC:
<A – Steven Sprague>: I think what we’ve seen in the TPM market is that we needed a new catalyst to drive the adoption of TPM and we’re seeing the BIOS integrity work as that catalyst today. The fact that Microsoft has made that part of Windows 8 software boot, the fact that the U.S. government has mandated a NIST 800-147, the requirements for bio security on these are all really healthy things to drive the world’s attention to the fact that we have absolutely no idea what’s running underneath our PCs and this is where Stuxnet can get you and turn off your water supply, your electrical supply, affect your aviation industry, etcetera. And maybe we should get that under control."
Wavxmaster
'Alea'
I had missed the quote you posted when I read Taxi's posted article. Thank you for pointing it out, but now you might have to answer to Mrs W!! ; )
Wavxmaster
oops, Mrs Wavxmaster is going to be upset with me! Then again, it's Black Friday and I consider $2.115 a special deal!!
Hopefully we stay above $2.00!
Wavxmaster