Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Windows 8 makes TPM hardware security easy.
Windows 8 makes TPM hardware based security easy by automatically provisioning the TPM and providing new APIs and features. This session describes how customers benefit from having a system with a TPM and how to build Windows 8 apps that work with different TPM hardware. http://channel9.msdn.com/Events/BUILD/BUILD2011/HW-462T
Small Business Looking for Easy Road to Cloud
ComputingPosted March 19th, 2012
Cloud technology is supposed to simplify the IT environment, so it should not be a surprise that SMBs also seek simplicity in how their cloud solutions are delivered. According to results of a new Dell-sponsored survey of 400 companies with 50 to999 employees, 69 percent of SMBs prefer to purchase cloud solutions from a single, trusted provider.
Fifty percent of SMBs say there are significant challenges in keeping track of multiple service level agreements (SLAs), while 48 percent say explaining their business to each vendor is tedious and time-consuming.
Integration Flexibility, Efficiency Important
SMBs desire a high degree of integration flexibility with their cloud implementations. Currently 74 percent of SMBs are using in-house staff to integrate cloud technology with existing applications and 61 percent are writing software code to integrate cloud solutions. Sixty-three percent want the ability to modify cloud integrations based on business process changes.
Overall, SMBs state that the key benefits of adopting cloud applications include a low total cost of ownership (TCO), fast deployment time, simplified access from a browser, single sign-on, and automated feature and functionality upgrades. And SMBs that currently use cloud applications plan to add an average of three new cloud business applications in 2012, proving there is a substantial business opportunity in healing SMBs’ cloud-related pain.
MSPs Can Offer Perfect Solution to SMB Cloud Problem
MSPs are in a great position to assist SMBs with their cloud problems. By its very nature, the managed services model is a “turnkey” model, as the user essentially turns IT applications on and off as needed, without worrying about any management or hosting issues. MSPs also offer SMBs the benefits of both best-of-breed and enterprise implementations.
An MSP can mix and match cloud solutions from different vendors to get the exact mix of features of functions that will best suit an SMB’s specific needs, but deliver them through one point of contact and under a single agreement, taking care of all the multivendor issues on the back end.
Furthermore, MSPs can take the responsibility for integration, coding, upgrading, and other IT management functions, freeing SMB IT staff for other important tasks and possibly even allowing SMBs to reduce IT headcount.
MSPs already know how much easier they can make the lives of SMB cloud users, the trick is to share this information with your SMB client base. Whether your SMBs currently use cloud technology or are considering an implementation, make sure they understand exactly how much simpler and more productive you can make their journey through the cloud.
4 Digital Companies Reaping Rewards From Cloud Computing
November 30, 2011. The cloud computing trend is gaining steam as more and more companies are looking to become more efficient and lower their cost structures. Especially in a slow economy as we are in now, companies that are providing cloud computing services are being looked at more and more by CIOs and CTOs.
And this trend is showing up in the numbers. In a report published just last week, GIA predicted that the global cloud computing services market will reach $127 billion by 2017. One of the factors the firm sighted was that cloud computing can potentially slash IT costs by over 35%. Here are four companies that stand to benefit from the growth in cloud computing.
Wave Systems (WAVX) is a provider of client and server software for hardware-based digital security. Wave’s core products are based around the Trusted Platform Module (TPM), the industry-standard hardware security chip that is included as standard equipment on most enterprise-class PCs shipping today. A TPM is a highly secure cryptographic support system. It generates, stores and processes keys, which can be used to encrypt information and harden identities. Even in a down economy, the company has continued growing its topline. For its recently reported Q3, Wave Systems was able to grow revenues nearly 42% y/y.
CACI International (CACI) has been around for 50 years and provides services and IT solutions needed in the areas of defense, intelligence, homeland security, and IT modernization and government transformation. CACI solutions help federal clients provide for national security, improve communications and collaboration, secure information systems and networks, enhance data collection and analysis, and increase efficiency and mission effectiveness.
Because CACI works closely with the government, revenue growth is a bit slower than for the whole cloud computing space. For its recently completed Q1'12, the company reported revenue growth of 10.8% with a jump in EPS of 53.3%. CACI is trading for less than 0.4x sales and less than 10x FY12 estimated earnings.
Amwest Imaging (AMWI.OB) provides relationship-building tools and processes that help any business cultivate profitable relationships with customers, all through web based solutions. The company has been expanding into new technology with its recent acquisition of Zipclik Technologies, which has 256 AES encryption software. This software is essential and necessary for clients wanting to protect and privatize financial data, medical information, enterprise research, sensitive corporate directives, passwords, and all other confidential, and sensitive information. This software has the potential of changing the landscape of how any and all sensitive data or communication is conducted.
VSE Corporation (VSEC) is another government contractor and is based right outside of Washington D.C. It is a diversified company focused on creating, sustaining, and improving the systems, equipment, and processes of government through core competencies in legacy systems sustainment, obsolescence management, prototyping, reverse engineering, technology insertion, supply chain management, foreign military sales, management consulting, and process improvement.
The company has seen a bit of a slowdown as government budget issues are impacting the flow of orders. Despite a drop in revenues y/y for its Q3, the company was able to cut costs and increase operating margins by 150 basis points. Surprisingly for a tech company, it pays a dividend which currently yields 1.2%.
Intel Creates $100 Million Cloud Computing Connected Cars Fund.
Thursday, March 1 2012.
Arvind Sodhani, executive vice president of Intel Corporation and president of Intel Capital.
Intel Capital Connected Car Fund targeted at technologies that will deliver new in-vehicle infotainment solutions, seamless mobile connectivity, compelling applications and advanced driver assistance systems.
Intel Capital announced a $100 million investment fund to help accelerate innovation and the adoption of new technology and services in the automotive industry. Intel Capital is the first global technology investment organization headquartered in Silicon Valley to announce a dedicated focus on automotive technology innovation.
"The car is the ultimate mobile device," said Staci Palmer, general manager of Intel's Automotive Solutions Division. "By 2014, automobiles will be among the top three fastest-growing areas for connected devices and Internet content. Intel's experience in developing personal computing, software, security and cloud computing technologies will bring a new level of innovation to the car to enhance the driving experience for both drivers and passengers."
The Intel Capital Connected Car Fund will be invested globally over the next 4 to 5 years in hardware, software and services companies developing technologies to promote new, compelling in-vehicle applications and enable the seamless connection between vehicles and any connected device, including mobile devices and sensors.
"Technology has become an integral component of everyday life, with consumers demanding uninterrupted access to the Internet and the constant flow of information, news, entertainment, and social media," said Arvind Sodhani, president of Intel Capital and Intel executive vice president. "Automobiles must be able to provide these same consistent and engaging computing experiences, but in a safe manner. The Intel Capital Connected Car Fund will drive the development of technologies to enhance the in-vehicle experience of the future."
To help realize that vision, areas of investment for the Intel Capital Connected Car Fund will include technologies that advance the next generation of in-vehicle infotainment, advanced driver assistance systems and seamless mobile connectivity. This includes new in-vehicle applications and development tools, next-generation ADAS technologies and multimodal capabilities such as speech recognition, gesture recognition and eye tracking optimized for the connected car.
The announcement is part of Intel's ongoing work with automakers and in-vehicle infotainment suppliers to help integrate advanced technologies into cars. Ultimately, the connected car will have the intelligence and context awareness to offer the right information, at the right time and in the right way to keep drivers and passengers informed, entertained and productive while maintaining optimal safety. Once the car becomes connected, it can also communicate with the cloud, the transportation infrastructure and even other vehicles to provide additional services such as advanced driver assistance and real-time traffic information to optimize the flow of traffic.
RSA: Your Next Car Might Just Steal Itself
Mar 02, 2012
"Your next car might just steal itself." That was the tag line that convinced me to meet with Covisint at the 2012 RSA Conference. Covisint's Chief Security Officer Dave Miller filled me in on how a connected car might be hacked, and how Covisint works to prevent such a hack.
Covisint started out as a service company connecting automakers with parts suppliers. With the emergence of just-in-time shipping in the nineties, the responsibility for keeping parts in stock moved to the suppliers. Each supplier needed secure access to inventory data at multiple automakers; Covisint supplied single sign-on authentication to manage these relationships.
More recently Covisint began mediating the connection between drivers and the OnStar safety system. "You've seen that ad where the businesswoman starts the family car remotely?," asked Miller. "Right—that was us making it happen." The Web portal for OnStar is likewise managed by Covisint.
Millier likened the modern connected auto to a printer. You can send documents to the printer, sure, but you can also log in to check ink levels and otherwise manage the printer. It's the same with a car; you can check tire pressure, oil life, and so on. "The car is the same, just a lot faster," quipped Miller.
You can already unlock or start a car remotely. Some cars can parallel park themselves. Miller mentioned several coming enhancements including the ability to reconfigure the car for fast-starting "sport mode" or switch instead to maximum gas-saving for long trips. So, if it's possible to start a car and control the steering, acceleration, and braking, what's to stop a malicious car hacker or app from stealing the car remotely and auto-driving it to the nearest chop shop?
Covisint is ready with technology to keep that car in your driveway. A security certificate in the on-board software uniquely identifies the car, and each app developer also registers for a certificate. On registration, the car, the app, and the mobile device are all linked in Covisint's cloud database. Only the user who knows the PIN and owns the mobile device can send commands to the car.
That's not all. Commands are sent as encrypted action tokens which can be set to expire anywhere from immediately on use to months later. In theory, there should be no way for a hacker to break this security, but even if he did, he'd gain control of one car. "Hackers don't attack one system," noted Miller. "They'll attack a million computers in hopes of infecting a thousand. Hacking into one car isn't cost-effective."
My car doesn't respond to anything but the occasional swift kick, but I know I'll eventually have a car that's fully connected. I'm encouraged to know that deep thinkers like Dave Miller are already prepared to ensure that car responds to me and only me.
Toyota joins embedded security effort
3/15/2012 SAN JOSE, Calif. – Toyota Motor Corp. joined the Trusted Computing Group to help drive future security standard as part of a new embedded initiative.
The Trusted Computing Group has created a handful of standards for hardware-backed security on computers, hard drives and networks already used in some embedded systems. It formed its embedded working group last September to look deeper into specific scenarios in machine-to-machine communications broadly in the emerging Internet of Things field, including automotive.
The new group aims to define embedded-specific standards by the end of 2013. Infineon is co-chair of the group that includes members from Fujitsu, Ricoh, Panasonic, Samsung and Sony as well as Toyota.
“Currently Toyota is the only car maker [in the group], but we hope other car manufactures will join TCG in near future,” said Seigo Kotani, a TCG board member and co-chair of the embedded group.
Car makers could use TCG techniques to secure remote maintenance tasks, such as software updates, the group said. Stacy Cannady, a veteran member of TCG, will present a session on embedded security at the Design West conference.
Fujitsu lifts Toyota into the cloud
Mission critical Dealer Management System trusted to the cloud to deliver high quality services throughout Australia
Sydney, 21 February 2011 — Fujitsu, a leading provider of ICT business solutions, today announced that Toyota Motor Corporation Australia Limited has selected Fujitsu to provide Cloud Services for one of its critical information technology operations.
After an extensive evaluation, Toyota Australia will move its TUNE Dealership Management System (DMS) which is used by Toyota dealerships across Australia, to a managed service hosted by Fujitsu.
Fujitsu’s winning Cloud Services bid is a fully configurable, Pay-Per-Use solution, which allows Toyota to control the consumption of IT resources. The flexible three year agreement enables use of the Service on a monthly basis, with no ‘lock in’ term or contract fees if Toyota wishes to realign its technology strategy.
The new technology environment will ensure far greater levels of availability, reliability and Dealer data security that will enable all TUNE dealers, including multi-franchisees, to be confident that their TUNE DMS operates efficiently and effectively. Provisioning of processing power is able to start as small as one server, and can expand on demand as each Dealer’s TUNE application requires more resources to support increasing use.
James Scott, Divisional Manager Information Systems Division, Toyota Australia said: “TUNE is critical to our business performance. We needed a trusted leader in cloud services for this project and Fujitsu’s Cloud Services will provide us with a robust and secure IT strategy for this expanding application,” Scott said.Moving TUNE to the cloud will see Toyota dealers experience faster software response times and increased data stability and security, which will boost their user experience of the dealership management system.
Cameron McNaught, Group Executive Director, Solutions and Cloud Services, for Fujitsu Australia and New Zealand said: “We congratulate Toyota on its new strategic direction for the TUNE DMS. Their move to the cloud for this key business platform is a highly intelligent way to capitalise on their investment in TUNE and build in total flexibility to meet the growth demands as more Dealers register to use the system.”
Rod Vawdrey, Chief Executive Officer, Fujitsu Australia and New Zealand, said: “Fujitsu’s 32 year history with Toyota Australia showcases the levels of trust and security that a successful IT partnership provides. Fujitsu is honoured to continue our relationship with one of the leading automotive companies in the nation.”
TCG Director, Promoter Board Member
Senior Director, Convergance Services Biz Group, Fujitsu Limited
Dr. Seigo Kotani is the Senior Director of Convergence Services Business Group, Fujitsu Ltd. Dr. Kotani joined Fujitsu Laboratories Ltd. in 1982 and conducted research on superconductivity and LSI devices, including cryptographic chips and authored numerous papers. In 2001, he transitioned to Fujitsu Ltd. and led the research and business development of security devices, systems and services including DRM, TCPA/TCG, biometrics, time-stamps, secure storage and secure network infrastructure.
In November 2006, the TCG membership elected Dr. Kotani to the position of Director, Contributor Board Member for 2007. At that time, he transitioned to Fujitsu Labs of America, and proceeded to lead many TCG activities to success as a representative of Japan. In June 2008, he secured the position of Director, Promoter Board Member. In April 2011, he transitioned again to Fujitsu Ltd. and now he is leading the trusted computing infrastructure and convergence businesses based on TCG technologies.
Dr. Kotani's strong motivation and enthusiasm for providing a trusted social infrastructure has prompted him to lead Fujitsu to adopt TCG technologies. As a Board member, Dr. Kotani is actively furthering his mission and commitment to create a safer and more secure future.
http://www.trustedcomputinggroup.org/about_tcg/board_of_directors/dr_seigo_kotani
Wave Launches Premier Cloud-based Encryption Management Service for Centralized Data Protection
Easily deployed and managed, Wave Encryption Service delivers a class of data protection once reserved only for large corporations
Lee, MA — January 30, 2012 — Wave Systems Corp. (NASDAQ:WAVX www.wave.com) has launched Wave Encryption Service (WES), a scalable, yet powerful subscription-based service for data protection. Able to be deployed quickly and managed efficiently on demand, Wave's new service allows organizations to centrally enforce strong data encryption policies on laptops across the organization to secure data and meet compliance regulations—without the complexity and cost associated with an on-premise solution. WES manages a variety of client encryption solutions, including folder-level software encryption and Microsoft Bitlocker®. Notably, WES is the only Cloud-based service for managing Opal self-encrypting drives (SEDs), which offer security and performance benefits over other forms of encryption.
The service has earned favorable marks from one of its first customers. Salisbury Bank deployed the service in late 2011 for laptops used by the sales force and executive team. Salisbury Bank is a full-service community bank headquartered in Northwestern Connecticut, with locations in Western Massachusetts and in New York.
"What we really like about Wave Encryption Service is the simplicity it brings to protecting data on our laptops. It's easy to set up, use and administer," said Todd Clinton, Salisbury Bank's Senior Vice President and Chief Technology Officer.
Clinton noted the easy-to-navigate console, which lets him set up alerts and run monthly reports on noteworthy events, such as the encryption status for specific computers by location. He also noted that the WES implementation helped the bank earn favorable marks during a recent independent security audit.
In addition to cost, scalability was important to Clinton.
"We evaluated solutions from other vendors," he said, "but most had strict minimum seat requirements that we just didn't meet. So the choice was pretty easy — plus Wave gave us the flexibility to manage multiple types of encryption as our needs change."
Clinton is using WES to manage file and folder encryption for now, but he anticipates adding SEDs on new platforms in the future.
Brian Berger, Wave's Executive Vice President of Marketing and Sales, noted that WES is an option for both small and medium businesses and the enterprise.
"Some data protection laws on the state and federal level mandate encryption at the endpoint, no matter how big or small the business or the size of its IT budget," Berger said. "The Wave Encryption Service is designed to provide the same compliance-grade security of an on-premise solution, without the complexity or cost. It can eliminate the need to install or maintain third-party software and can be implemented securely in the Cloud. We believe it is an ideal alternative for the cost-conscious SMB and the enterprise."
Fujitsu and Wave Systems Debut Full Disk Encryption Solution at the Network World IT Roadmap Conference & Expo
New Security Solution First to Meet the Trusted Computing Group’s Upcoming Opal Security Subsystem Class Specification
Sunnyvale, CA, November 17, 2008 — Fujitsu Computer Products of America, Inc., a leading supplier of innovative computer products including hard disk drives, peripherals and biometric security solutions, today announced that it will be showcasing its full disk encryption (FDE) hard disk drive (HDD) at the Network World IT Roadmap Conference & Expo in San Francisco on November 17. The 2.5-inch HDD is the first technology in the world that will meet the Opal Security Subsystem Class (SSC) specification that will be published by the Trusted Computing Group (TCG) Storage Work Group (SWG) in January of 2009. The Fujitsu FDE HDD that will be demonstrated at the conference will feature encryption functions and advanced security features built directly into the hardware of the HDD, providing the following significant benefits to users and corporations needing strong data protection:
Hardware based security. There are no dependencies on operating system software for security of the encryption keys and access credentials, as is the case for software encryption alternatives.
High performance encryption. FDE drives operate at the same speed as non-encryption HDDs with no impact to host CPU performance.
Ease of use. Single sign-on and password synchronization makes the solution invisible to users.
Minimum IT support. For IT administrators there are no alterations to the operating system so all system tools and applications process normally. As an additional benefit, FDE drives can be completely set up, operated and audited remotely.
For the past year, Fujitsu has been working closely with independent software vendors like Wave Systems Corp. (NASDAQ:WAVX) to build sophisticated features into its FDE solution. The TCG-based Fujitsu HDD provides system administrators the capabilities of remote configuration, feature rich authentication, lost password recovery, multi-user support and separation of administrative and user roles. Fujitsu and Wave Systems will be showcasing the complete security solution at the conference.
"What makes the Fujitsu FDE solution special is that the product leverages a stronger 256-bit AES key, whereas competitive offerings only support a 128-bit key," said David James, vice president, advanced product engineering, Fujitsu Computer Products of America, Inc. "By combining our hardware-based encryption technology with the Wave Systems Embassy Trust Suite management software, we are able to deliver an incredibly secure, managed mobile-computing solution."
The Fujitsu FDE HDD addresses organizations’ needs to securely and instantly make data on the drive inaccessible when redeploying or disposing of the physical hardware. The "advanced secure erase" feature immediately invalidates every piece of data by changing the in-drive encryption key. The process takes less than a second and provides the same level of data invalidation as physically destroying the hard disk drive. Whether the laptop is lost or stolen, or an IT administrator uses the advanced secure erase feature, the data on the drive is not recoverable.
"Hundreds of thousands of laptops are lost or stolen every year in the United States alone, so it is easy to see why data security for these devices continues to be a concern for businesses and consumers alike," said Lark Allen, executive vice president, business development, Wave Systems Corp. "To address this growing vulnerability, we are working closely with storage providers like Fujitsu to deliver comprehensive encryption technologies for mobile devices, which are designed to lock down any and all data on stolen or misplaced machines and to provide the audit logs needed for claiming compliance to the increasingly stringent data protection laws and regulations worldwide."
The Fujitsu MHZ2 CJ series FDE model announced this past April, that uses the ATA Security feature set for authentication, was recently recognized as the first HDD in the world to be granted the JIS X 19790 security certification in Japan. This certification validates that the entire disk drive, not just the underlying AES algorithm, meets the security requirements of JIS X 19790. The Fujitsu TCG-based HDD that will be demonstrated at the conference uses the same hardware, and supports the ATA Security feature set in addition to the new features introduced by Opal.
Safend errors.
Some feel Wave should have caught these errors sooner.
What about the venture capital investors?
Prior to the acquisition, Safend was backed by prominent technology venture capital investors including Elron Electronics Industries Ltd. (TELAVIV: ELRN), Intel Capital and Walden Israel Venture Capital.
Windows 8 Consumer Preview Could Launch Feb 29
Microsoft may launch the Consumer Preview (read: "open beta") of Windows in on Feburary 29th. Members of the press recently recieved an invitation to a special Windows 8 Customer Preview event in Barcelona as part of the Mobile World Congress trade show. The event is on the 29th, and it is assumed that the Customer Preview will be made available to the public in conjuction with it.
To be clear: Microsoft has confirmed with us that is did not announce the launch of the Consumer Preview on the 29th. The only thing communicated from Microsoft is an invitation to a press event. Still, the safe money is on the Consumer Preview launching at the same time, or at least very close, to the Barcelona event.
Note the precise nomenclature here. It is a “Consumer Preview”, rather than a “public beta”. Perhaps the shift from “public beta” to “Consumer Preview” is a function of a transition in the role of the program.
.The very idea of a “beta” is that it is incomplete, and the software vendor is soliciting feedback from real-world users through the beta program. Microsoft has switched to releasing a “preview” that is more or less feature complete and ready to go as a means of generating some anticipation for the actual product launch, but it isn’t necessarily expecting the consumer preview community to identify and report bugs. The software will undoubtedly be tweaked based on feedback, but Microsoft wants to get the public involved, and straying away from the scary "beta" word may be an attempt to do that.
It’s not an accident that the event is being hosted in Barcelona. Interestingly, the Microsoft launch of its next generation flagship operating system is being held at the Mobile World Congress which is going on that week. Much of the excitement around Windows 8 has centered around Windows 8-based tablets and the touch-centric Metro UI, so it makes sense for Microsoft to unveil Windows 8 at an event focused on mobile devices.
Aside from Windows 8 tablets, Windows 8 will also bring a variety of changes and updates for Windows users. The ribbon interface that has been slowly spreading throughout the Microsoft ecosystem will play a more prominent role in some desktop applications – although, Microsoft is apparently scaling back the ribbon as a result of some preemptive backlash.
Windows 8 may also do away with the iconic Start button Windows users are familiar with. Also, despite rumors and overt statements to the effect that the Windows 8 desktop OS will not run on ARM-based tablets, there are now hints that ARM-based tablets will, in fact, be able to run the full OS.
The biggest change will come in the form of the full-screen "Start Screen", with live tiles and a "Metro" design that is very similar to Windows Phone 7 and the lastest Xbox 360 software update. Apps for this Start Screen will focus on touch, and be availalbe through a built-in marketplace called the Store.
So, get ready. On February 29, or thereabouts, you will probably be able to acquire the Windows 8 Consumer Preview and find out for yourself what the new OS is all about. Do you plan to check it out? What features are you looking forward to most? Are there any aspects of Windows 8 that you find concerning? Let us know in the comments.
http://www.pcworld.com/article/249533/windows_8_consumer_preview_could_launch_feb_29.html
Wave Announces Windows 8 Readiness
Wave to Extend Windows 8 Security Features for Malware Detection, Access Control and Encryption
LEE, MA--(Marketwire - Feb 24, 2012) - Wave Systems Corp. (NASDAQ: WAVX) today announced future Wave development of value-added security solutions for Windows 8. Windows 8 has innovative security features for better malware protection and takes an integrated approach to strong authentication and encryption.
"Business users and consumers are facing a host of unprecedented challenges in maintaining their security," said Tony Mangefeste, Senior Program Manager for Microsoft Corp. "Hardware-based security is one of the best methods for ensuring platform integrity, encrypting data or mitigating malware that targets the boot path. Wave's product expertise aligns with Microsoft on achieving our goals for security."
Wave plans to provide Windows 8 support for its solutions that utilize hardware-based security components such as the Trusted Platform Module (TPM), Unified Extensible Firmware Interface (UEFI) and Encrypted Drives (eDrives). As part of the roadmap, Wave will develop attestation capabilities using the TPM that increase the trust level for online transactions and confirm the reliability of computer health metrics. Wave software enhances deployment scenarios for TPM-based features while extending the capabilities to previous Windows operating systems.
"Wave is honored to support Microsoft in its launch of Windows 8 by delivering some of the most innovative security solutions on the market," said Steven Sprague, Wave's CEO and President. "Through our technical collaborations with Microsoft, we can offer organizations a more secure infrastructure that builds on Windows 8."
Enterprises with the earlier versions of Windows Vista or Windows 7 operating systems can also benefit from hardware-security available on the market today. Wave manages more SED seats in the enterprise than any other independent software vendor. The single largest TPM deployment in the world -- with over 80,000 machines activated -- is also a Wave customer.
Wave is a founding member of the Trusted Computing Group (TCG), a not-for-profit consortium committed to developing, defining and promoting open industry standards.
About Wave Systems
Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group.
Safe Harbor for Forward-Looking Statements
This press release may contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995 and Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends.
The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors. Wave assumes no duty to and does not undertake to update forward-looking statements.
All brands are the property of their respective owners.
Forensics vendor warns Mac OS X FileVault vulnerable to decryption.
Passware, a vendor of forensics tools for recovering data for law enforcement, has issued a warning that its forensics tools can bypass the security of FileVault disk encryption in Mac OS X if the computer is left powered on, recovering decryption keys from memory.
While catering to law enforcement, the company issued a warning to home users "of the vulnerabilities of Mac encryption solutions and advises users to shut down their computers especially when working with confidential data."
When a system using full disk encryption is powered on, even if the disk is later left encrypted its contents can reportedly be recovered by analyzing the data stored in memory, which Passware notes includes the keys to decrypt FileVault.
The company says its process for decrypting a FileVault disk "takes no more than 40 minutes – regardless of the length or complexity of the password."
Passware's president Dmitry Sumin stated in a release that "live memory analysis opens up great possibilities to password recovery and decryption. Every user should be aware that even full disk encryption is insecure while the data rests in computer memory."
The company earlier explained that the security risk is easy to overcome by simply turning off the computer instead of putting it to sleep, and disabling the "Automatic Login" setting. This way, passwords will not be present in memory and cannot be recovered.
Sumin wrote last summer, "I am a Mac user myself, but it's important to understand the limitations of your computer's security, even if you are not a computer forensics expert. If data stored is confidential, it is important to ensure physical security of the computer. One might also consider using additional encryption software."
Obtaining Mac passwords costs more
In addition to Mac OS X Lion's FileVault, the company says its forensics tools can decrypt Microsoft's Windows 7 BitLocker and the cross platform TrueCrypt full disk encryption solution, indicating that the problem isn't unique to Apple.
The company, based in Moscow Russia with offices in Mountain View, California, sells its Passware Kit Forensic for $995 with a year's worth of updates. It says the product can recover hashed passwords with Rainbow Tables, extract passwords from the Mac Keychain, and build a password list from words detected in computer memory to perform a Dictionary attack.
The company describes the product as being "the first and only commercial software that decrypts BitLocker and TrueCrypt hard disks, and instantly recovers or bypasses Mac and Windows login passwords of seized computers."
The company also sells a $39 tool to "quickly and easily reset Windows login passwords in a matter of minutes," as well as a $79 package that "recovers passwords for Microsoft Office files, Acrobat documents, email accounts, network connections, Zip and Rar archives and local Windows Administrator" accounts on workstations and servers running Windows 7/vista/SP/2000/NT.
VEGA Space uses software from Wave Systems to Ensure data security of sensitive corporate data
Lee (Massachusetts), USA (BUSINESS WIRE) - VEGA Space GmbH, a provider of support services in the fields of aerospace and defense, was looking for a hard disk encryption, data security on 300 laptops of consultants and managers of the company in Europe should guarantee. Lee (Massachusetts), USA (BUSINESS WIRE) - VEGA Space GmbH, a provider of support services in the fields of aerospace and defense, was looking for A hard disk encryption, data security on 300 laptops of consultants and managers of the company in Europe should guarantee. For more than 30 years, the company offers support services for aerospace, and places great importance to the protection of sensitive and secret corporate information. For more than 30 years, the company offers support services for aerospace, and places great importance to the protection of sensitive and secret corporate information.
VEGA Space employs more than 400 employees in Germany, the United Kingdom, France, the Netherlands and Spain on their laptops are customer data. VEGA space Employs more than 400 employees in Germany, the United Kingdom, France, the Netherlands and Spain on their laptops are customer data. Privacy has priority for the company, and in recent decades it has acquired, among other things due to his prudent handling of sensitive data a good reputation. Privacy has priority for the company, and in recent decades it has acquired, among other things due to his prudent handling of sensitive data a good reputation. Could go even the loss of a single laptop or a vulnerability, which lost by secret data, would have serious consequences for VEGA Space. Could go even the loss of a single laptop or a vulnerability, Which lost by secret data, would have serious consequences for VEGA Space.
"To ensure the security of sensitive corporate data, ranging from software-based solutions are not," says Christian Schmidt, Head of ICT at VEGA Space. "To ensure you the security of sensitive corporate data, ranging from software-based solutions are not," says Christian Schmidt, Head of ICT at VEGA Space. "That's why we have opted for a hardware-based disk encryption of Wave Systems. This protects all data on our laptops by only authorized users granted access to the data." "That's why we have opted for a hardware-based disk encryption of Wave Systems. This protects all data on our laptops only by authorized users granted access to the data."
Since the software from Wave Systems EMBASSY does not depend on the performance and the operating system of the laptop, no adverse effects occur in relation to other software applications. Since the software from Wave Systems EMBASSY does not depend on the performance and the operating system of the laptop, no adverse effects occur in relation to other software applications. Other advantages are the cost of software installation, ease of administration and support. Other advantages are the cost of software installation, ease of administration and support. The creation of secure audit logs through the ERAS software from Wave Systems, such as safety profiles following specific drives, both internal directives to VEGA Space as well as international data protection regulations, including ISO / IEC 27002 The creation of secure audit logs through the ERAS software from Wave Systems, such as safety profiles following specific drives, both internal directives to VEGA Space as well as international data protection regulations, including ISO / IEC 27002 These standards disk encryption mentioned as an important method to protect confidential data on laptops. These standards call for hard disk encryption to protect confidential method as important data on laptops.
"We are very satisfied with the products of Wave Systems," said Christian Schmidt. "We are very satisfied with the products of Wave Systems," said Christian Schmidt. "The hard disk encryption solution is easy to install, reduces the administrative overhead and is more secure than software-based solutions." "The hard disk encryption solution is easy to install, reduces the administrative overhead and is more secure than software-based solutions."
SOURCE: Wave Systems CONTACT: http://www.presseportal.de/pm/102792 press kits via RSS: http://www.presseportal.de/rss/pm_102792.rss2 SOURCE: Wave Systems CONTACT: http://www .presseportal.de/pm/102792 press kits via RSS: http://www.presseportal.de/rss/pm_102792.rss2
Press Contact for press contact for Wave
Ursula Kafka / Kafka Caroline Court Communications GmbH & Co KG Phone: +49 89 747470 580 ukafka@kafka-kommunikation.de chof@kafka-kommunikation.de Ursula Kafka / Kafka Caroline Court Communications GmbH & Co KG Phone: +49 89 747470 580 ukafka@kafka-kommunikation.de chof@kafka-kommunikation.de
http://www.kafka-kommunikation.de/ http://www.kafka-kommunikation.de/
NSA Wants Top-Secret Smartphones
BY SANDY FITZGERALD | MON SEP 26, 2011 4:17 PM
The National Security Agency's secret agents may soon use smartphones to access classified data, but developing a secure portable device has proven a major challenge.
Troy Lange, the NSA's mobility mission manager, said he is developing a smartphone secure enough for spies to use, but akin to user-friendly iPhones and Android models.
"I want to get this into everybody's hands," said Lange, alluding to hopes that the device could be used throughout the government. However, Lange knows his plans make "the security people's heads pop off." The new device will have to pass muster by security agents to make sure it can't be hacked or transfer dangerous information.
The concerns about hacking are valid ones, as hackers are becoming more successful in their efforts to breach systems. For example, hacktivist group Anonymous hit a FBI cyber-security contractor just last month, posting nearly 400 megabytes of files from ManTech, an online security contractor for the FBI, NATO, and U.S. Defense, State and Justice Departments. U.S. Army personnel files and e-mails were among the items publicized.
The U.S. government already has secure cell phones, according to Reuters, but they can only make calls to top-secret levels by connecting with the Secret Internet Protocol Router Network. Lange said the current system is not sufficient to handle mobile traffic, however, given the transient lifestyle of many NSA agents.
Agent Lange said if he wants to check email on the NSA's stand-alone computer, he has to sit at a wired, desktop computer because even laptops can't access the system.
"I still don't have that connectivity to a network, which means that the only way I can get to any of my data -- email, calendar invites, you name it -- I have to sit down at a wired station to get to it," Lange said.
The trick will be in the NSA's ability to create a phone that is useful enough for the personnel's mobile needs, but still encrypted enough to protect the often classified data the agents manage. As hackers' methods prove increasingly sophisticated and cybercriminals become more audacious, the NSA faces major challenges in developing a mobile device fit for its needs but still secure enough to withstand attack.
Symantec to offer DLP solution for iPads
October 4, 2011
By Liam Lahey
Security vendor’s Data Loss Prevention for Tablet solution will monitor, protect the transmission of corporate data
Symantec says it’ll offer the world’s first comprehensive Data Loss Prevention (DLP) solution for tablets in early 2012.
The Symantec Data Loss Prevention for Tablet solution will only be available for Apple iPads initially. It’s designed to monitor and protect the transmission of sensitive corporate data whether the user is connected to a public Wi-Fi or a 3G network. Support for Android-based tablets will be introduced at some point thereafter.
“Symantec has been selling data loss prevention solutions for a number of years now. This is the technology that helps companies prevent inadvertent or even malicious data leaks or breaches,” explained Tim Matthews, senior director of product marketing at Symantec. “The issue now is people are really in love with their iPads; they’re wanting to bring them into work to connect to the corporate network or they’re using them on the road and this simply brings more risk for the company.”
Thus the product enables organizations to support work and personal use concurrently across corporate and personal email, Web communications, and common applications available for the iPad. Current Symantec DLP customers can leverage their existing investment by utilizing the same policies and management infrastructure.
DLP is at the top of the list for security teams, he added; it’s a hot topic for the IT channel.
“The nice thing about it is it provides an immediate view of risk to companies so there’s a quick payback for the investment,” he remarked. “The partner becomes strategic (for the customer) because you’re helping them uncover their greatest areas of risk . . . and there’s ongoing tuning of detection technology in their workflows.”
But Symantec DLP for Tablet doesn’t cover smartphones.
“The reason why tablets are a primary concern is they’re typically used to view sensitive documents and to edit these documents so it was thought to be a higher risk area than mobile phones,” he said. “We’ll keep an eye on the smartphone space but we’re beginning with tablets because they seem to be the bigger risk according to the customers we’ve talked to.”
To that end, the security vendor did its homework before making the announcement. Symantec’s latest “State of Security Survey” found organizations worldwide are grappling with the new security challenges posed by iPads and tablets. Of the survey’s respondents, 47 per cent said mobile computing was making it more difficult to provide online security, and 45 per cent said the “consumerization of IT” was a concern.
There are similarities between Symantec’s DLP for Tablet solution and the concept of mobile device management (MDM), Matthews acknowledged, but what Symantec’s product does that MDM doesn’t is monitor the content mailed, sent, or stored in the cloud from the iPad.
“If that content is sensitive, this product will detect that that information is being sent, and it will either notify the user, block it, or potentially encrypt it. We call it ‘content awareness’ to differentiate between the two,” he said. “Even if you provision and manage your phones and you can zap it if it’s lost, that still leaves you wide open to someone storing a document in the cloud with sensitive customer data or Gmailing [sic] something off of their iPad to somewhere that’s not controlled by the company.
“They’re both related (MDM and DLP) and have to do with putting more work on the IT and security teams by this crush of devices.”
The company also offers encryption solutions ranging from full disk encryption and removable storage to email and server solutions that include the recently announced Symantec PGP Viewer for iOS. Viewer enables employees of organizations with Symantec PGP Universal Server to read encrypted messages on iOS devices including the iPad and iPhone.
Symantec DLP for Tablet will be priced per tablet, the company said. Symantec PGP Viewer for iOS is an Apple iOS application currently available for download from the Apple App Store.
Safend offers endpoint protection for Macs, iPads and iPhones
10 Jan 2011, Dave Neal, V3
Safend has extended the capabilities of its data protection tool for enterprises, adding support for Apple Mac, iPad and iPhone devices.
The security firm said that additions to the Safend Data Protection Suite will protect data on Leopard and Snow Leopard computers.
Safend Protector for Mac controls and generates activity logs relating to physical port access and removable device access.
This means that administrators can trace a data leak directly to its source, if not spot it as it is occurring, the firm said.
The Data Protection Suite's Inspector tool now inspects and filters data in motion.
This relates to email or web traffic, for example, as well as data taken through physical ports. The latest release can also block and log data leaked through smartphone and tablet synchronisation software such as iTunes.
As such it could help IT teams secure the growing numbers of iPhones and iPads which staff are demanding they be allowed to use in the corporate sphere.
"The rise in the use of Macs and other Apple products allows increased productivity within organisations, but also brings new security concerns," said Edy Almer, vice president of product management at Safend.
"With the Data Protection Suite's ability to protect Macs and manage the content-aware application control channel, organisations no longer have to prohibit the use of devices previously deemed risky for the enterprise."
Weby,
I think you are correct.
Thur 29th April 13:00 - 15:00
Deployment of an Endpoint Data Protection and Leakage Prevention system - real life experience
The panel will discuss the problem of endpoint data protection and leakage prevention in two types of organizations:
Andre Janse will describe the data protection challenges his 30K seats global bank based in South Africa was facing, he will describe his selection process and his results 24 month later.
Robert Newburn, a solution manager with Trustmarque Solutions will describe the data protection challenges his public sector customers are facing and discuss a deployment process he performed on behalf of one of them including initial compliance requirements, competitive analysis, selection and deployment and will discuss status 12 month after implementation.
Panellists:
Edy Almer, VP Product Management, Safend
Mony Bulocinic, VP Channels and Sales EMEA, Safend
Andre Jansen, Information Security Director, Nedbank South Africa
Robert Newburn MCP, Solutions Manager - Information Security, Trustmarque Solutions
http://www.infosec.co.uk/page.cfm/link=654
Safend and large world bank.
Perhaps Citi?
Safend helps secure one of the world’s largest banks and meets all security regulations
The Organization.
This top 100 developing world bank has a strong deposit franchise, the second largest retail deposit base, a client-centric wholesale and retail franchise and a substantial and growing wealth management offering. The group offers a wide range of wholesale and retail banking and works in more than 550 locations.
The Challenge.
Working with the bank – one of the largest financial institutions in South Africa – involved an extensive design implementation and deployment of its enterprise-wide security strategy and framework solutions. During implementation and deployment, Safend had to ensure that the organization was kept abreast of global threats and vulnerabilities. Focused on southern Africa, but with an aspiration to grow its business reach across the whole African continent, the bank is positioned as a bank for all – from both a retail and a wholesale banking perspective.
In 2009, the bank employed more than 22,000 people. Having multiple businesses in multiple countries, it was met with regulatory challenges. With the goal to be ready for the 2011 South African mandatory enforcement on regulations, including the 7th Principle, as well as comply with US and UK regulations, the bank needed to design, implement and deploy an enterprise-wide security strategy and framework solution.
The bank looked to products that could help organizations safeguard their intellectual property and customers’ critical data persistently – both inside and outside the company – and meet the new regulations. The challenges that the bank faced for endpoint threats in particular included: hardware key loggers, dual homing of endpoint (network bridging), port management and monitoring of USB, RW DVD, external hard drives and SD cards. Not only did their removable media (USB, VDC and external hard drives) lack encryption, but they also faced the threat of malicious code spreading via autorun. Finally, the biggest threat was information leakage at the endpoint.
The Solution.
The bank chose Safend’s Data Protection Suite for their security needs – particularly for information leakage protection. Safend was able to provide key logger notification for the bank. It also prevented network bridging by blocking WiFi, Bluetooth, modems or IrDA. The Safend Data Protection Suite delivers a comprehensive solution that allows for complete visibility, control and protection of enterprise endpoints throughout the bank. Safend Data Protection Suite is intuitive to manage, almost impossible to circumvent, and guarantees connectivity and productivity, without sacrificing security or performance. Safend provides a comprehensive data protection solution in a single product, with a single management server and a single, lightweight agent.
The Results.
By implementing the Safend Data Protection Suite, the bank was able to maintain secure files without the threat of a data breach. Safend solutions were rolled out to a total endpoint base of 30,000+ PCs across the South African bank. In the African subsidiaries, Safend is in the process of rolling out to an additional endpoint base of over 2,500 PCs.
http://www.safend.com/1240-en/Finance%20case%20study.aspx
Info Security Products Guide awards Safend winner of the 2011 Best Deployment Scenario Awards.
Jun 14, 2011.
Safend was honored for its ability to help one of the largest financial institutions in South Africa safeguard their intellectual property and customers’ critical data persistently, as well as meet new regulatory requirements. The bank chose Safend’s Data Protection Suite – which is comprised of Safend Inspector, Safend Discoverer, Safend Encryptor, Safend Protector, Safend Protector for Mac and Safend Discoverer for Mac – to meet the bank’s greatest security threat of information leaks through endpoints that include USB, RW DVD, external hard drives and SD cards.
http://www.safend.com/81-3087-en/PR%202011%20Best%20Deployment%20Scenario%20Awards.aspx
The Best Emerging Markets Banks
CITIBANK
Best in the World
Best in the Middle East and Africa
Best in Latin America
The bank is located in 24 countries, with assets of $50 billion, 2,900 distribution points, and 22,000 employees. It has $46 billion in assets under custody, $33 billion under management, and raised more than $23 billion in capital for its customers in 1999.And it completed the largest amount in M&A deals-$29.8 billion."We also own 100% of our franchises, which is something not a lot of other international banks in the region do," says Michael Contreras, executive vice-president for Latin America Global Corporate & Investment Banking. In addition, Citibank remains the most profitable foreign bank in Brazil, the major Latin market, with the highest return on eqcity at 44%, according to Paulo Ribeiro, analyst at Standard & Poor's.
http://findarticles.com/p/articles/mi_qa3715/is_200005/ai_n8893739/
Citi Rolls Out Its Version of the Apple Store
January 25, 2011.
If you wanted to build banking’s version of Apple’s stores, you could bumble around trying to reverse-engineer the concept. Or you could go straight to the source, like Citibank did. Citi retained the services of Eight Inc., the architectural and strategic design firm behind the revolutionary Apple Store design, to create a new retail prototype for the global bank’s branch of the future.
“We’re knee deep in everything Apple,” Debby Hopkins, Citibank’s Chief Innovation Officer, told Fox News. “We’re huge believers in their capabilities, approach and philosophy, which is about really strong design backed by extraordinary systems.”
Three years in the making, the result of Citi’s partnership with Eight is a series of flagship “Smart Banking” branch locations opened around the world. The first prototype debuted in Singapore in 2008, followed by locations in Japan, Hong Kong and, most recently, New York. While developing the concept, Eight says over 100 branch-level processes were reengineered. There are even four patents pending.
In an interview with BAI, Citi’s US head of retail banking, Brad Dinsmore, said the bank plans to roll out ideas pioneered at its prototype locations. “We will build a handful of flagship branches in key metropolitan cities, but most of the branches will be much smaller in design. While they will include elements of the flagship design and some of the technology, they won’t be nearly as large.”
Manuel Medina-Mora, head of Citi’s U.S. consumer banking division, said the bank’s strategy is to “invest in retail banking with a focus on customer-centric innovations and an eye towards growth in our key markets, drawing on smart banking technologies and best practices developed by Citi in Asia.”
At the centerpiece of the Citi’s branch of the future is a huge, interactive media wall displaying local weather, news and financial updates. There is also a touchscreen “Planning Table,” a series of interactive “Work Benches” and a digital “Service Browser” where customers can cruise Citi’s products and services (think: Tom Cruise in “Minority Report”). If a customer needs service, they can head over to the “360 Station,” a concierge-style rotunda (basically a greeter station). Customers can also opt for a live video conference with a remote Citi specialist.
http://thefinancialbrand.com/16452/citibank-new-york-hong-kong-flaship-branches-of-the-future
Solving today's key security challenges.
http://www.wavesystems-events.com/speaker.htm
Don't see this on Wave's site but it's on Safend.
Thursday, September 22, 2011
Philly & Tel Aviv-based Safend acquired
Lee, Massachusetts-based Wave Systems Corp announced today it has acquired Safend Ltd., a Tel Aviv-based company with US headquarters in Philadelphia. Safend provides endpoint security and data loss protection solutions.
The price was $12.8 million, of which $1.1 million was in cash and the rest in Wave stock. Wave says Safend has about 70 employees. Wave says it "will retain Safend's experienced executive team", including founder Gil Sever.
Safend VC backers have included Intel Capital, Elron Electronics Industries Ltd., and Walden Israel Venture Capital. Safend had raised at least $16.4 million, according to Crunchbase, so presumably this is not a good exit for its investors.
Green Dot - Wave Systems Client.
Looks like WalMart accounts for most of Green Dots business and has a stake.
Walmart Banks on Green Dot
Takes stake in prepaid company seeking to acquire bank; also offering gas discount
BENTONVILLE, Ark. -- Wal-Mart Stores Inc. has taken an equity stake in prepaid card company Green Dot in a move that may also give retail behemoth an indirect link to a small commercial bank, said The Financial Times. Green Dot said this month that it had issued more than 2 million shares to Walmart, following an agreement in May that extended the existing alliance between the companies until 2015.
Green Dot is also seeking federal and state approval to acquire its own bank, having reached agreement in February to acquire Bonneville Bank, a small Utah-based commercial bank, for $15.7million.
The company said in a regulatory filing that it expected to focus the bank on issuing its cards, "and initially, on a pilot basis, savings accounts to our core customer base."
Green Dot prepaid cards are also available at many retailers, including 7-Eleven, Walgreens, Kroger, Rite Aid, CVS and more.
Walmart abandoned a bid to acquire a banking license in 2007, amid a storm of opposition from the banking industry and political opponents, said the report. It has subsequently focused on developing financial services with partners including Green Dot.
The holding will give Walmart less than 1% of Green Dot's voting shares after a planned initial public offering by the prepaid operator that is expected to raise up to $150 million, according to regulatory filings cited by the newspaper.
The stake reflects the growing importance of Walmart's prepaid, reloadable MoneyCard business, which it uses largely to build customer loyalty among its primarily low-income core customers, many of whom lack bank accounts, the report said.
The cards, issued by GE Money's bank and launched in June 2007, are linked to Green Dot's web-based network. Customers can use the network to add cash to their cards, which they can then use for card-based purchases, without the risks of crime or loss associated with cash.
The retailer also now uses direct deposits to the prepaid cards, rather than checks, to deliver weekly wages to more than 90% of its 1.4 million employees.
Walmart said this month that "billions of dollars" had been loaded on to its prepaid cards since the launch.
Green Dot said in a regulatory filing this month that its card business through Walmart accounted for 63% of its $92.8 million in revenues in its most recent quarter. It said it had about 3.4 million active cards. Its Walmart business doubled in size in its second full year of operation, to $131 million, and was growing in the eight months ending March 30 at a rate of about 50%.
In mid-May, Walmart announced the first cash-back incentive for consumers using a prepaid debit card. When customers use the Walmart MoneyCard to buy gasoline for their vehicles, they will receive 1% cash back on their gasoline purchases nationwide through Dec. 31, 2010, the Bentonville, Ark.-based company said in a press statement.
The Walmart MoneyCard is a reloadable prepaid Visa debit card that costs $3 to purchase, does not require a bank account or credit check and does not incur overdraft fees. Customers buying new Walmart MoneyCards will be automatically enrolled in the cash-back program, while customers who already have Walmart MoneyCards can enroll. The cash back will be added to the Walmart MoneyCard balance.
The Walmart MoneyCard is issued by GE MoneyBank with additional services provided by Green Dot. The Walmart MoneyCards are available at U.S. Walmart stores and can be used everywhere Visa debit cards are accepted. The Walmart MoneyCards are protected by the Visa Zero Liability Policy, which protects the cardholder from unauthorized purchases, fraud and theft if the card is lost or stolen.
The Walmart MoneyCard can be used for many purposes, including:
Shop everywhere Visa is accepted, including online and at walmart.com.
Direct deposit your paycheck to the card.
Get cash from millions of ATMs worldwide.
Pay bills including cable, cell phone and others.
Pay for gas, groceries and more.
Use at restaurants, make hotel reservations, buy airline tickets.
Budget and track spending online with E-Mail/SMS Balance Alerts.
Walmart is a leading provider of affordable money services that help customers manage their money and keep their finances on track. The company estimates that last year customers saved $450 million in fees by using Walmart money services. These services include:
Check Cashing: With Walmart check cashing, customers can conveniently cash payroll or government checks, including tax-refund checks, starting at $3.
Bill Payment: Walmart offers three-day, next-day and same-day bill payment delivery options, with prices starting at 88 cents.
Money Transfers: Customers can use MoneyGram to send money to friends and family around the world in minutes, for a great low fee.
New Customers.
Are these new?
Green Dot
Green Dot is the largest issuer of reloadable prepaid VISA and MasterCard debit cards. Green Dot created reloadable prepaid cards to serve the more than 50 million Americans who can’t get or don’t want credit cards. They can load and reload their signature debit card conveniently where they shop, without the hassle of a credit check or bank account. They can shop wherever VISA/MasterCard debit cards are accepted and control their spending with a “pay now, buy later, without interest” premise.
http://www.sequoiacap.com/us/green-dot
https://www.greendotonline.com/greendot
Jet Aviation, a wholly owned subsidiary of General Dynamics (NYSE: GD), was founded in Switzerland in 1967 and is one of the leading business aviation services companies in the world. Close to 5,100 employees cater to client needs from 25 airport facilities throughout Europe, the Middle East, Asia and North and South America. The company provides maintenance, completions and refurbishment, engineering, fixed base operations, along with aircraft management, charter services, aircraft sales and personnel services. Jet Aviation's European and U.S. aircraft management and charter divisions jointly operate a fleet of more than 200 aircraft.
http://www.jetaviation.com/
Seven Stocks To Invest In Software And Programming
By: iStockAnalyst | Jun 23, 2011 | Stocks: ADBE, EBIX, IGTE, MSFT, MSTR, WAVX,
Yesterday, markets were engulfed in a bear grip. All the major indices and sectors logged sizable losses.
Out of the 214 communication equipment stocks that are generally tracked, prices of 73 stocks increased, 133 decreased end eight remained unchanged. So, the breadth was not so encouraging. Out of those 214 stocks, we will pick seven stocks that can be fairly termed ‘bullish' in the next three to twelve months.
Percentage change in share prices ranged from a gain of15.06 percent - Sky mobi Ltd (ADR) (Nasdaq :MOBI) to a loss of 10.07 percent - Wave Systems Corp. (Nasdaq:WAVX). Absolute change in price ranged from a loss of $2 - Adobe Systems Inc. (Nasdaq:ADBE) - to a gain of $4.38 (MicroStrategy Inc. (Nasdaq:MSTR).
Red Hat Inc. (NYSE:RHT) is an automatic choice (kindly look at ‘Should you invest in Red Hat, Inc. (NYSE:RHT)' article). We will examine the outliers (MOBI, WAVX, ADBE, and MSTR) to see if they present any investment or trading opportunities. MOBI doesn't pass the cut as it is a micro cap company.
Wave Systems Corp.
Yesterday WAVX closed trading at $2.68, compared with a 52-week range of $1.76 to $5.31.
Wave Systems Corp. provides client and server software for hardware-based digital security. The company reduces the complexity, cost and uncertainly of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a leading expert in this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group.
I favor this stock for three reasons. One, the company continues to invest aggressively in both sales and marketing and R&D initiatives aimed at building Wave's product portfolio and sales pipeline while also growing global awareness of the benefits of trusted computing solutions. Second, the company can play a key role in the implementation of the Obama administration's ‘National Strategy for Trusted Identities in Cyberspace'. Three, in the next few months I expect the stock to beat analysts' consensus one year target price of $6
http://www.istockanalyst.com/finance/story/5250084/seven-stocks-to-invest-in-software-and-programming#
Special report: Government in cyber fight but can't keep up
By Phil Stewart, Diane Bartz, Jim Wolf and Jeff Mason
WASHINGTON | Thu Jun 16, 2011 12:19pm EDT
(Reuters) - The Pentagon is about to roll out an expanded effort to safeguard its contractors from hackers and is building a virtual firing range in cyberspace to test new technologies, according to officials familiar with the plans, as a recent wave of cyber attacks boosts concerns about U.S. vulnerability to digital warfare.
The twin efforts show how President Barack Obama's administration is racing on multiple fronts to plug the holes in U.S. cyber defenses.
Notwithstanding the military's efforts, however, the overall gap appears to be widening, as adversaries and criminals move faster than government and corporations, and technologies such as mobile applications for smart phones proliferate more rapidly than policymakers can respond, officials and analysts said.
A Reuters examination of American cyber readiness produced the following findings:
* Spin-offs of the malicious code dubbed "agent.btz" used to attack the military's U.S. Central Command in 2008 are still roiling U.S. networks today. People inside and outside the U.S. government strongly suspect Russia was behind the attack, which was the most significant known breach of military networks.
* There are serious questions about the security of "cloud computing," even as the U.S. government prepares to embrace that technology in a big way for its cost savings.
* The U.S. electrical grid and other critical nodes are still vulnerable to cyber attack, 13 years after then-President Bill Clinton declared that protecting critical infrastructure was a national priority.
* While some progress has been made in coordinating among government agencies with different missions, and across the public-private sector gap, much remains to be done.
* Government officials say one of the things they fear most is a so-called "zero-day attack," exploiting a vulnerability unknown to the software developer until the strike hits.
That's the technique that was used by the Stuxnet worm that snarled Iran's enriched uranium-producing centrifuges last summer, and which many experts say may have been created by the United States or Israel. A mere 12 months later, would-be hackers can readily find digital tool kits for building Stuxnet-like weapons on the Internet, according to a private-sector expert who requested anonymity.
"We're much better off (technologically) than we were a few years ago, but we have not kept pace with opponents," said Jim Lewis, a cyber expert with the Center for Strategic and International Studies think tank. "The network is so deeply flawed that it can't be secured."
"IT'S LIKE AN INSECT INFESTATION"
In recent months hackers have broken into the SecurID tokens used by millions of people, targeting data from defense contractors Lockheed Martin, L3 and almost certainly others; launched a sophisticated strike on the International Monetary Fund; and breached digital barriers to grab account information from Sony, Google, Citigroup and a long list of others.
The latest high-profile victims were the public websites of the CIA and the U.S. Senate - whose committees are drafting legislation to improve coordination of cyber defenses.
Terabytes of data are flying out the door, and billions of dollars are lost in remediation costs and reputational harm, government and private security experts said in interviews. The head of the U.S. military's Cyber Command, General Keith Alexander, has estimated that Pentagon computer systems are probed by would-be assailants 250,000 times each hour.
Cyber intrusions are now a fact of life, and a widely accepted cost of doing business.
"We don't treat it as if it's here today, gone tomorrow," said Jay Opperman, Comcast Corp.'s senior director of security and privacy. "It's like an insect infestation. Once you've got it, you never get rid of it."
The private-sector expert who requested anonymity said a top official at a major Internet service provider told him that he knew his network had been infiltrated by elite hackers. He could digitally kick them out - but that would risk provoking a debilitating counter-attack.
"THE THING ... THAT KEEPS ME UP AT NIGHT"
The idea behind the soon-to-be-announced Pentagon program for defense contractors is to boost information-sharing with the Defense Department on cyber threats. It also aims to speed reporting of attacks on firms that make up what the Pentagon calls the Defense Industrial Base.
The DIB, as it is sometimes known, provides the Defense Department some $400 billion a year in arms, supplies and other services. The new program is voluntary and builds on a smaller pilot, reflecting the persistent challenge of regulating private firms that traditionally shield proprietary data and often downplay cyber setbacks.
Ultimately, the new program may lead to agreement to put at least some Pentagon contractors behind military-grade network perimeter defenses, such as those that protect the Pentagon's own classified networks.
On another front, the Pentagon's far-out research arm, the Defense Advanced Research Projects Agency, is expected to launch by mid-2012 the National Cyber Range, a kind of replica of the Internet costing an estimated $130 million that would be used to test cutting-edge cyber defense technologies and help train cyber warriors.
The Obama administration has made cyber security a national priority, and tried to fashion an "all-government response" that imposes order on the competing domains and priorities of the Pentagon, FBI, Department of Homeland Security, the super-secret National Security Agency and the private sector.
"We're far better prepared than we've ever been before," said White House cybersecurity coordinator Howard Schmidt.
"Notwithstanding all the threats that we see out there, the things that are making news on a regular basis about a company that's been intruded upon ... (look at) how much the system still runs," Schmidt told Reuters in an interview.
The key, Schmidt said, is resiliency, "to make sure that we're better prepared, to make sure that the disruptions when they do occur are minimum - we're able to recover from them."
Still, he said major worries remain. "The thing that I worry about that keeps me up at night is the unknown vulnerability that may exist out there."
Some officials are even less sanguine.
The Pentagon's computer systems are widely considered to be better protected than other U.S. government agencies', and far safer than the private sector's. Still, a U.S. defense official told Reuters he would give the Pentagon just a "C+" grade overall for its cyber defenses. "We're not impervious to attack by any stretch, but nor are we 'open kimono'," the official said. He added: "And we're getting better."
WHAT IS 'CYBER'?
Experts say that one of the toughest challenges of cyber defense is, oddly, definitions. What constitutes "cyber"? Computers and digital networks, certainly. But how about digitized pictures or video streams from a pilotless Predator drone flying over Pakistan?
Who is responsible for protecting what? Where does national security begin and privacy end?
"The other big problem is lack of policy," said one former U.S. official. "(We) lack policy because we lack consensus. We lack consensus because we haven't had an informed debate. We lack an informed debate because we don't have a common pool of data. And we don't have a common pool of data because we don't share it."
Nowhere is the problem more acute than in thinking about cyber warfare. What constitutes an act of war in cyberspace? And how do you determine who it was that fired the shot?
U.S. military officials, eager to talk about how the Pentagon has boosted computer defenses, clam up when the topic turns to offensive capabilities.
The Pentagon has put together a classified list of its cyber capabilities so policymakers know their options - just as it does for more conventional weapons.
Offensive actions against foreign systems would require White House authorization. But the Pentagon does not need special approval to do the kind of cyber surveillance work that can identify vulnerabilities in foreign networks, a U.S. official told Reuters, speaking on condition of anonymity.
That includes leaving hidden digital "beacons" inside adversaries' networks that could be used to pinpoint future targets. The beacons can phone home to tell U.S. military computers that they are still operational, the official said.
While the United States is trying to apply conventional military logic to the cyber realm, there is no global consensus about the rules of cyber war. A Pentagon report due out toward the end of the month is not expected to articulate case-by-case possibilities of when a cyber war could turn into a real one.
INTO THE CLOUD
Even as such policy debates rage, the technological landscape is being remade, seemingly by the month, posing new challenges - and opportunities. Tens of thousands of mobile applications for smartphones and tablet computers represent new vectors for hacks and attacks.
"The quick answer is we haven't been doing enough and we're semi-late to the game" on protecting mobile applications, said Rear Admiral Mike Brown, a senior Department of Homeland Security cyber security official.
U.S. government agencies are working with major commercial vendors "to start looking together at how to address the issues of mobile vulnerabilities," Brown said at a symposium sponsored by Symantec Corp.
Meanwhile, the U.S. federal government is planning to move in a big way into "cloud computing," in which off-site providers offer network and storage resources accessible remotely from a variety of computing platforms.
Potential cost savings are significant. Handled correctly, computing clouds could offer added security, specialists say. But there are also risks.
A study released in April by CA Technologies and the Michigan-based Ponemon Institute contained alarming findings. Based on a survey of 103 U.S. and 24 European cloud computing providers, it found that a majority did not view security of their services as a competitive advantage, and believed that security was their customers' responsibility, not theirs.
Most did not have dedicated security personnel on staff.
Deputy Defense Secretary William Lynn met Google executives in California in mid-February to discuss cloud computing. On May 19, Lynn instructed the Pentagon's Defense Science Board to study the benefits and risks of cloud computing, "paying particular attention to attacks on communications that would destroy or delay delivery of services and information for time-critical uses."
Lynn told Reuters that "cloud computing has the potential to offer greater capability at equal or lesser costs." He added: "I want to make sure we are taking full advantage of these advanced technologies."
The Pentagon is preparing a cloud computing strategy, which it expects to complete by the end of the summer, a U.S. defense official told Reuters.
"We're trying to get to the place where warfighters or any of us can get to our information from anywhere on the planet, with any device," the official said.
Schmidt, the White House coordinator, said as many as 170 security controls are being built into government cloud computing projects from the start. "It's not deploying something and securing it later. We're setting the requirements at the outset."
"I'M NOT CONFIDENT THAT WE WOULD KNOW..."
So how safe are the computer networks of the United States, which perhaps more than any nation relies on them for banking, electric power and other basics of modern civilization?
In May 1998, then-President Clinton signed Presidential Decision Directive 63, calling for a "reliable, interconnected, and secure" network by 2003, and establishing a national coordinator for protecting critical infrastructure.
The Department of Homeland Security now has lead responsibility for protecting the power grid. Yet, as with almost everything involving cyber, it's not quite that simple.
If there were a cyber attack on the power grid today, "I'm not confident that we would know what parts of the government should respond," said one former U.S. official, who asked not to be identified. "Who jumps in there? DHS, DoD, Cyber Command, NSA, the intelligence community?"
"So nothing's really happened." said former Pentagon general counsel Judith Miller, talking about grid vulnerability at a cyber event in Washington this month.
"This is a discussion we had in the 1990s. We're having it right now. Nothing really has changed, although perhaps the ability of attackers, whether they're nation states or just kids, has grown apace," she said.
A central conundrum is that the Pentagon's National Security Agency, which specializes in electronic eavesdropping, has personnel with the best cyber skills, but has been until recently mostly shut out of protecting domestic networks. That's due to the highly classified nature of the NSA's work, and fears that it will stray into domestic spying.
Another complicating factor: the 1878 Posse Comitatus Act, which generally bars federal military personnel from acting in a law-enforcement capacity within the United States, except where expressly authorized by Congress.
"NSA has a long history in cyber security, on both the offensive and the defensive sides. It has great resources and expertise. But it makes privacy advocates nervous," said Stewart Baker, a former DHS official now at the law firm Steptoe and Johnson LLP.
Last October, the Defense Department and Homeland Security - responsible for protecting civilian U.S. government networks - signed a memorandum to cooperate, with the NSA sharing technology and the agencies swapping personnel.
The effort has gotten mixed reviews. Schmidt said that early reports of inter-agency tension have dissipated, and Representative James Langevin, a member of the House intelligence committee, said DHS is improving. "I don't think that they're there yet but we're moving in the right direction," he said.
However other experts, who would not be quoted for the record, said the gap between the two agencies remains wide.
Even if the NSA, DHS and other agencies worked together seamlessly, the problem remains of coaxing industries in critical infrastructure to accept more government regulation.
"There's absolutely no question that the power companies and indeed state regulators have been unenthusiastic about a federal role," Baker said. He added this warning: "The regulation that would pass after a disaster is a lot worse than they would get right now."
And then there's the Stuxnet-like "zero day" attack, exploiting a flaw no one knew existed, perhaps tucked into some off-the-shelf software like that purchased daily by federal agencies.
"Our largest fear ... is the zero day attack," said Sherrill Nicely, the CIA's deputy chief information officer. "It's very, very, very difficult to protect oneself from an attack that you did not know was coming or the vulnerability that you did not know existed."
Wave Releases Beta Version of id.wave.com, a Hardware-Secured, Single Sign-on Identity Service for the Web
Lee, MA & Las Vegas, NV (Digital ID World, Booth #11) — September 15, 2009 — Wave Systems Corp. (NASDAQ: WAVX; www.wave.com) announced today the launch of id.wave.com, a new identity service that enables strong authentication and single sign-on to Web services and applications in the “cloud.” The service is available in beta form and will be demonstrated to prospective partners and industry insiders at this week’s Digital ID World Conference in Las Vegas, Sept. 15-16.
As Web-based applications and services increase in both number and importance, knowing who is on the other end of the cloud in a secure and private way is increasingly vital. Wave’s online identity service is designed to allow users to create a single, secure, user-friendly identity that is accepted at many websites including Facebook, Google and salesforce.com using OpenID and SAML. The id.wave.com service takes full advantage of the Trusted Platform Module (TPM) security chip to secure users’ authentication identities with keys held in the TPM.
To date, tens of millions of TPMs have shipped on enterprise-class PCs. Combining this installed base with the many sites that support OpenID and SAML has the potential to significantly improve Web service authentication. Users will benefit by not having to remember multiple passwords. IT benefits from an open standards solution to secure authentication credentials on the TPM, and by significantly reducing the ability for a user to lose control of his or her identity. The CIO benefits by knowing that only authorized users and authorized devices are connected to the organization’s cloud computing services, whether internal or external. Finally, users can log into their PC and the PC securely logs them into the sites where they have relationships.
“Wave is pleased to announce this new service, enabling the installed base of millions of TPMs to be able to access the websites that accept Open ID,” commented Steven Sprague, President and CEO of Wave Systems. “We believe id.wave.com is what many enterprises and consumers have been looking for—an open identity provisioning service that brings ease of use, privacy and takes advantage of the strong authentication and single sign-on hardware they already own.”
With an Open ID, a visited website (relying party) communicates with an identity provider and that provider then confirms the visitor’s identity to the website. Many sites participate in OpenID as an identity provider, relying party or both. Wave’s id.wave.com service integrates the OpenID standard with the TPM chip on the user’s machine to safely protect the user’s authentication credentials in hardware. The result is that the PC internally provides stronger, multi-factor authentication between the user and service providers—providing secure digital identities across the Web.
Wave’s EMBASSY® Remote Administration Server (ERAS) already provides enterprises with central policy control of remote TPMs. Should an employee be terminated, this control is designed to enable the enterprise to immediately revoke the employee’s OpenID or SAML access credentials to sensitive Websites.
Wave Positioned to Offer Hardware-Secured Identity Service
As one of the leading providers of TPM management software, Wave’s extensive software offerings work with the TPMs from the leading vendors and with all the TPMs on PCs that have shipped to date (an estimated 300 million and counting). Since early spring of this year, Wave has been working with TrustBearer Labs, an authentication solutions provider, in developing the id.wave.com service.
Last week, the government announced the “Open Identity for Open Government” initiative (see news release), with several government agencies agreeing to pilot the acceptance of industry identity credentials from a number of providers. Wave has agreed to participate in these pilots and has committed to demonstrating the value of implementing stronger authentication to more sensitive Web services.
In addition to demonstrating id.wave.com at this week’s conference, Wave will also be participating in the following sessions at Digital ID World:
•“Securing OpenID with Built-In Hardware Security” and “Device Authentication to the Network” – Wave Executive Vice President Lark Allen and CEO Steven Sprague will host two separate “Lunch ‘n Learn” sessions, one addressing each topic. [Tuesday, Sept. 15 at 11:30 a.m. -1:00 p.m.]• “Trends in Identity Management Solutions”—Wave CEO Steven Sprague will join Eric Olden, CEO of Symplified, in a break out session moderated by Eric Norlin, Conference Content Co-Chair. [Wednesday, Sept. 16, 2:05-2:55 p.m.]
•“Open, Secure Machine Identities for Clouds (and Brick and Mortar!) – Wave CEO Steven Sprague will lead an informational seminar on how a laptop or PC can be individually provisioned for access to sensitive services and data on the Web, offering ease of use and unparalleled security for the new models of SaaS and Cloud computing. [Wednesday, Sept. 16, 3:00-3:50 p.m.]For demonstration and meeting appointments at Digital ID World, contact Wave’s Executive Vice President Lark Allen at lallen@wavesys.com.
OpenID Built In Google Chrome OS?
ReadWriteWeb speculates that “Google Chrome OS [will] Feature Single Sign-On for Chrome Browser”. They cite some evidence in the source code. Some excerpts of the post:
In the code, a line references something being called the “Chrome OS login manager.” Essentially, this login manager will function as a single sign-on (SSO) cookie which will simultaneously log you into all Google services including things like Gmail, Calendar, Docs, Reader, etc…
That’s as much as we know for sure, but what is not clear is exactly how this SSO option will be presented to the user. We wouldn’t be a bit surprised to see you logging into your computer with your Google account the way you log into your Mac or Windows PC using a set of credentials you create during the setup process. However, in Google’s case, it’s easy to imagine a more web service like prompt on the login screen. For example: “Create a Google account” / “Already have a Google account? Sign in here.” Perhaps there will even be a “Remember Me” option so you don’t have to log in again, you just flip the netbook’s lid open. Of course that’s all speculation, but it seems logical.
Well, if this turned out to be true, this would be a major, major win for OpenID and the entire internet identity movement. Because guess what all the other browser manufacturers will do? Feature parity. It always works that way. And if implemented well, most criticisms of OpenID will have a chance to fall by the way side.
Even if Google’s browser implemented a clear preference towards Google as identity provider, as ReadWriteWeb thinks, at least some of the other browsers won’t, for competitive reasons, and feature parity works the other way, too.
http://upon2020.com/2009/09/openid-built-in-google-chrome-os/
Wave releases TPM-secured OpenID beta
Posted by Ken Y-N on September 14th, 2009 at 03:26pm
Wave Systems recently announced the release of a beta version on id.wave.com, a system that secures the OpenID identity management service using a Trusted Platform Module. OpenID is used by many services from Facebook to Google as a means of having a single global identity and single global password. By adding a TPM into the mix, from a consumer’s point of view they now have a more secure login procedure, reducing the risk of identity theft. For corporate intranets, they too can use the id.wave.com system for:
The CIO benefits by knowing that only authorized users and authorized devices are connected to the organization’s cloud computing services, whether internal or external.
This now fits in very well with the recent announcement on Open Identity for Open Government.http://blogoftrust.com/wave-releases-tpm-secured-openid-beta/402
Yahoo!, PayPal, Google, Equifax, AOL, VeriSign, Acxiom, Citi, Privo, Wave Systems Pilot Open Identity for Open Government
Posted at 4:10 am on September 9, 2009 by Don Thibeau
Gov 2.0 Conference - Washington, D.C. — September 9, 2009 — Ten industry leaders — Yahoo!, PayPal, Google, Equifax, AOL, VeriSign, Acxiom, Citi, Privo and Wave Systems — announced today they will support the first pilot programs designed for the American public to engage in open government — government that is transparent, participatory, and collaborative. This open identity initiative is a key step in President Obama’s memorandum to make it easy for individuals to register and participate in government websites — without having to create new usernames and passwords. Additionally, members of the public will be able to fully control how much or how little personal information they share with the government at all times.
These companies will act as digital identity providers using OpenID and Information Card technologies. The pilot programs are being conducted by the Center for Information Technology (CIT), National Institutes of Health (NIH), U.S. Department of Health and Human Services (HHS), and related agencies. The participating companies are being certified under non-discriminatory open trust frameworks developed under collaboration between the OpenID Foundation (OIDF) and the Information Card Foundation (ICF) and reviewed by the federal government.
http://openid.net/2009/09/09/yahoo-paypal-google-equifax-aol-verisign-acxiom-citi-privo-wave-systems-pilot-open-identity-for-open-government-2/
Wave Systems Collaborates on Open Identity Initiative for Federal Government
Government Unveiling Pilot Program to Encourage Federal Agencies to Utilize Open Identity Technologies in Response to President Obama’s Mandate for Greater Citizen Participation
Lee, MA — September 9, 2009 — Wave Systems Corp. (NASDAQ: WAVX; www.wave.com) announced today its support of the first open identity pilot program aimed at enabling members of the public and businesses to register and participate in government websites without creating new user names and passwords. Wave joins Yahoo!, PayPal, Google, Equifax, AOL, VeriSign, Acxiom, Citi and Privo in supporting this new pilot program as digital identity providers offering solutions based on OpenID and Information Card technologies.
The Center for Information Technology, National Institutes of Health, U.S. Department of Health and Human Services and related agencies will participate in the pilot program. Wave and the other participating companies are being certified under the open trust frameworks developed by the OpenID Foundation and the Information Card Foundation
and reviewed by the federal government. A joint announcement by both foundations was issued earlier today to coincide with the first day of the Gov 2.0 Summit in Washington, D.C.
“The Open Identity for Open Government Initiative, a joint mission of the Information Card Foundation and OpenID Foundation with the U.S. government, is one of the most significant steps in making government more transparent and participatory,” said Drummond Reed, Executive Director of the Information Card Foundation. “But with open access comes the need for greater security and privacy. Wave Systems is developing the ability to tie open identity technology into the trusted computing infrastructure. This will provide the basis for stronger security and privacy, and would pave the way for a whole new class of trusted applications.”
Wave has been developing a service which combines hardware security and open identities for secure, single sign-on for accessing Web services. It utilizes OpenID and SAML, open standards that allow the use of an existing identity to sign into multiple websites without creating new passwords. With OpenID, a visited website (relying party) communicates with an identity provider and that provider then confirms the visitor’s identity to the website. To date many sites including Google, FaceBook and SalesForce participate in OpenID as an identity provider, relying party or both.
Join Wave Systems for full demonstrations of the strongly authenticated identity service at the Digital ID World Conference in Las Vegas Sept. 14-16, 2009
Wave’s service is unique because it is designed to bring strong, second-factor authentication security to OpenID. By integrating its service with the industry standard Trusted Platform Module (TPM) security chip on individual PCs, user names are replaced by unique, user-protected digital certificates for stronger, multi-factor authentication between the user and service providers—ensuring secure digital identities across the Web. This integration with the TPM will also provide easier management for small- and medium-sized businesses whose employees access government websites.
“We applaud President Obama’s mandate to make government websites more user friendly, and we’re especially pleased by the decision to follow the framework of trust established by the OpenID and Information Card Foundation,” said Steven Sprague, President and CEO of Wave Systems. “The security of OpenID and Information Card technologies relates to how well authentication keys and credentials are protected. Using a Trusted Platform Module, Wave can now enable strong authentication for open identity technologies, designed to ensure that users have fast, easy access to government services with heightened security and privacy.”
http://www.wave.com/news/press_archive/09/090909_OpenID.asp
Chrome OS Comes This Year, Business Version in 2011
recent cyber attacks made against Google likely prompted the company to further increase its focus on security and now it seems that even the upcoming highly anticipated wonder known as the Chrome OS will come with advanced security features. Described by Will Drewry, a Google software security engineer, as a “hardened” operating system, the Chrome will provide defense against threats, as well as allow developers to experiment.
The Google Chrome OS is generally thought of as an upcoming operating system that will have netbooks running faster, safer and more efficiently. The OS has been in development for some time and netbook makers such as Acer and Samsung are already devising their respective devices.
Network World reports that the Chrome OS will reassure purchasers of Google Netbooks through the fact that the OS itself is an open source project that enables constant feedback from developers, as far as security design is concerned. All platforms will ship with the trusted platform module (TMP), an industry-standard hardware module based on an architecture from the industry forum Trusted Computing Group. In addition, all netbooks will boast a “trusted bootpath.”
In order to make sure that malware threats are kept to a minimum, the OS and the browser will monitor the condition of websites through sandbox and auto-updating features that will warn when users are about to access malware-infected websites. Of course, some of these specialized security features can be disabled. This is easily done through the press of a button located under the battery, which will activate the “developer mode.” When in this mode, developers will be able to experiment, although security risks will be higher.
The consumer-oriented version of the Google Chrome OS will debut later this year, along with the first netbooks running it. This version will be followed by an enterprise one in 2011.
http://news.softpedia.com/news/Google-Chrome-Comes-This-year-Business-Version-in-2011-136840.shtml
Director McConnaughy.
I noticed this the other day and asked Wave. Was told "he has a personal issue that is unrelated to Wave he still holds all his options." If I’m reading the filings correctly he has filed to sell 42,415 Shs.
Seagate to Buy Samsung Disk Drive Unit
Seagate Technology, the hard disk drive maker, said on Tuesday that it would enter a strategic partnership with Samsung Electronics, purchasing the South Korean company’s hard disk drive unit for $1.375 billion in cash and shares.
The deal is another major consolidation in the sector, after Western Digital’s announcement last month that it would buy Hitachi Global Storage Technologies for $4.3 billion.
That acquisition gave Western Digital almost half the market in hard disk drives, double Seagate’s share, according to iSuppli.
Now Seagate is trying to catch up, by adding Samsung’s 10 percent share of the market to the nearly 30 percent it already holds.
Under the terms of the deal, Seagate and Samsung will deepen their cross-licensing and research and development collaboration, and Samsung will place an executive on Seagate’s board.
Samsung will supply Seagate with its semiconductor products, and Seagate will in turn supply Samsung with hard disk drives for the personal computers, notebooks and other devices made by the South Korean company.
“The transactions and agreements significantly expand Seagate’s customer access in China and Southeast Asia,” the companies said in a joint statement.Seagate will give Samsung $687.5 million worth of its own shares, amounting to a 9.6 percent stake in the company, and pay the rest in cash.
The deal is expected to close by the end of the year, pending regulatory approval, and Seagate predicts it will be accretive to cash flow within a year.
Seagate hired Morgan Stanley as financial adviser and Wilson Sonsini Goodrich & Rosati as legal counsel, while Samsung hired Allen & Company as its adviser and the law firm Paul, Hastings, Janofsky & Walker.
Self-encrypting hard disks with integrated deletion feature
18 April 2011,
Toshiba's self-encrypting drives are designed to securely delete their data when they are a connected to an unknown computer.
Toshiba has extended its range of 2.5-inch drives with hardware data encryption – also called Self-Encrypting Drives ("SEDs") – to include models with an automatic deletion feature ("wipe"). Developed to comply with the Trusted Computing Group's (TCG) Opal specification, Toshiba's series MKxx61GSYD drives encrypt all written data via AES-256 without causing performance loss. They can be associated with the hardware of a specific computer via a Trusted Platform Module (TPM). If an unauthorised person attempts to access the drive, the integrated firmware will automatically delete the cryptographic key.
The mechanism can be set to be triggered by various different events: by a control command, by the supply voltage having been switched off, or by the drive being connected to an "unknown host" or different computer. Unavailable in other self-encrypting drives, this new feature is designed to provide extra protection for sensitive data if, rather than stealing a whole computer such as a notebook, an attacker only steals the drive – for instance from a printer or photocopier, where hard disks are used for buffer storage.
The drives operate at 7,200 rpm via a Serial ATA II interface (3 GBits/s), and offer 16 MB of cache; Toshiba plans to deliver them in several variants, with storage capacities from 160 to 640 GB. Accessing the hard disk controller's integrated encryption features requires additional software.
Toshiba Unveils Advanced Self-Encrypting Hard Drives
April 12, 2011 09:04pm EST
When it comes to protecting hard drive data, standard encryption is usually the first—and often the last—thing most people think of. But Toshiba has just announced its own expansion of that idea with the release of its first family of self-encrypting hard drives, the MKxx61GSYG models, that automatically invalidate protected data when connected to an unfamiliar system.
Self-encrypting drives in the MKxx61GSYG-family drives use 256-bit AES encryption, but may also be configured with data invalidation attributes that can scramble or deny access to protected data via user command, when the machine's power cycles, or even when a host authentication error occurs.
According to Toshiba, the drives are intended primarily for professional use, in situations where specific privacy requirements and data security requirements must be met. In addition to traditional PCs, the company also cited copiers and multifunction printers and point-of-sale systems in government, financial, and medical fields as among target applications.
The new drive family's technology builds on the Trusted Computing Group (TCG) "Opal" specification, which per the TCG Web site "provides a secure boot capability (pre-boot authentication) as well as protection of user data from compromise due to the loss, theft, repurposing or end of life of the storage device. Furthermore Opal SSC provides administrative capabilities that allow administrative functions such as user enrollment and media management."
In a statement, Toshiba Storage Device Division Product Manager Scott White said, "Digital systems vendors recognize the need to help their customers protect sensitive data from leakage or theft. Toshiba's security technologies provide designers of copiers, printers, PCs, and other systems with new capabilities to help address these important security concerns."
Toshiba did not provide pricing information for the drives in the MKxx61GSYG family, but did reveal that they will be available in capacities ranging from 160GB to 640GB, have rotational speeds of 7,200 rpm, and use the 3-Gbps SATA II interface. The drives are being demonstrated at Toshiba's Tokyo headquarters this week; volume production and distribution will occur later this quarter. pcmag.com
TOSHIBA DEBUTS SELF-ENCRYPTING DRIVE TECHNOLOGY
AT RSA CONFERENCE 2009
Demonstration Highlights Support for Trusted Computing Group Storage Specifications through Integration with Wave Systems’ Trusted Drive Manager Application
13 Small - Micro Cap Stocks Turning Profitable
There are few events as exciting as when a company stems the bleeding from a losing operation and begins to turn a profit.
Often, a company will have an increase in investor interest since growth ratios look very high when you begin to earn pennies towards an annual EPS. One cent to two cents EPS creates triple digit growth which will make great headlines and will also show up on many high-growth screeners.
To find companies first entering or re-emerging into the world of
profitability since last year, we will screen for the following:
• Market Cap < 2 Billion
• EPS = -0.32 - 0
• 1 Year Earnings Growth > 38%
• Revenue % Change YOY > 35%
• Analyst Recommendation Moderate Buy or Better
We are looking for growth that emerging or returning to profitability. We want these small cap companies to be increasing their earnings on the back of increasing revenue. Although earnings can be boosted by stock repurchases or tax credits, we want to anticipate a more stable increase in earnings over time based on revenue.
'Crossing the Profitable Hump' Small - Micro Caps Stock List
1. Xueda Education Group (XUE)
2. Constant Contact (CTCT)
3. CytRx Corp. (CYTR)
4. Endologix Inc (ELGX)
5. EnerNOC Inc. (ENOC)
6. Jazz Pharmaceuticals, Inc. (JAZZ)
7. PLX Technology (PLXT)
8. Real Goods Solar (RSOL)
9. VirtualScopics, Inc. (VSCP)
10. Wave Systems Corp. (WAVX)
11. Great Basin Gold Ltd. (GBG)
12. Park City Group (PCYG)
13. Procera Networks, Inc. (PKT)
Caution is Necessary
Keep in mind that many of the above stock picks will be quite volatile when compared to the market. The market has a beta of 1. Stocks witha beta of 1.3 or higher will amplify market movements: CYTR, ELGX, JAZZ, PYCG, and PKT. The market is wanting to make a pull-back right now. It might be prudent to see how far it does so before climbing aboard some of the more volatile picks.
Low price to sales is considered a value picking criteria by some. These stocks have a P/S ratio of 1.4 or less: PLXT and RSOI.
Also, be aware that the very small market capitalization stocks can prove very volatile over a long period of time, especially when you are attempting to pick up a sizeable amount of shares. These stocks have a market cap under 150 million: PCYG, PKT, VSCP, RSOL, and CYTR.
The industries represented are education and training services, marketing services, biotech, medical instruments, business services, semiconductors, general building materials, staffing and outsourcing, computer peripherals, gold, and business software and services.
As always, carefully check each small to micro cap stock and look over the fundamentals and growth rates very carefully. Stock screening is good for generating ideas, but you should never screen and buy solely based on the stocks you find. Do your due diligence!
Disclosure: I have no positions in any stocks mentioned, and no plans to initiate any positions within the next 72 hours
http://seekingalpha.com/article/249932-13-small-micro-cap-stocks-turning-profitable
Boston Medical Center.
Speaker Biographies
Mark Mulvaney Jr.
Network Security Engineer
Boston Medical Center
Mark Mulvaney is a Security Engineer for Boston Medical Center, a 639-bed licensed academic medical center located in Boston’s historic South End. The hospital is the primary teaching affiliate for the Boston University School of Medicine. BMC is the largest 24-hour level 1 trauma center in New England, and is the largest safety-net hospital in the region. Mark started at BMC in 2004 as a Desktop Support Analyst, tackling a range of issues regarding the client hardware and software base. It’s here that Mark got the bug for security, realizing the potential threats that the clients were facing every day. Mark was brought into the network group as a Network Security Engineer in 2007, and immediately took ownership of the management of all client software rollouts and imaging. Since then Mark’s responsibilities have grown to include VPN security, AV/Malware, 2-factor authentication, wireless security, and hardware encryption. Along with just one other employee, Mark is responsible for the security of the infrastructure and client base for over 10,000 devices. Mark’s credentials include: MCP, MCSE, CCNA, Security+
Sessions Featuring This Speaker
September 16, 2010
3:00-3:30 p.m.
Guest Executive Forum With Trusted Computing Group: Encryption: Hardware or Software? Lessons from the Field
http://www.forrester.co.jp/Speaker_Bio/0,9010,2451,00.html?speakerID=2074&speakerType=Outside
MICO AWARD.
More from one of the other five.
Health Discovery receives MICO Award from MDB Capital at Bright Lights Conference
18. May 2010 01:20
Health Discovery Corporation (OTCBB: HDVY) announced today it received the prestigious MICO Award presented by MDB Capital Group, San Francisco, Calif., at its invitation-only Bright Lights Conference held May 11-12, 2010. Health Discovery Corporation was chosen from among 1,600 publicly traded, small cap companies.
“MDB Capital built PatentVest to help investors easily assign a tangible value to patents, and we've proven that market leading IP is predictive of superior business performance. Companies like Health Discovery Corporation typify the market leading IP presented at our Bright Lights Conference”
The MICO Award is Latin for "to shine." The award was presented to the Top 5 companies across all industries with the most potentially disruptive or market changing intellectual property. "Disruptive technologies" is a term used in business and technology to describe innovations that improve a product or service in ways that the market does not expect.
According to PatentVest, MDB Capital's proprietary intellectual property (IP) analytical tool, "Among public companies in the healthcare industry, our IP metrics found that Health Discovery Corporation is a leading innovator of game-changing IP," said Christopher Marlett, Co-Founder, Chairman & CEO, MDB Capital Group.
Intellectual property is no longer an intangible asset class," said Marlett. "MDB Capital built PatentVest to help investors easily assign a tangible value to patents, and we've proven that market leading IP is predictive of superior business performance. Companies like Health Discovery Corporation typify the market leading IP presented at our Bright Lights Conference," said Marlett.
"Health Discovery Corporation ranks as a market leader in each of the quantitative metrics across the entire health care sector," said Marlett.
"We are honored to receive the MICO Award from MDB Capital and this independent validation of our market changing intellectual property," said Stephen D. Barnhill, Chairman and CEO, Health Discovery Corporation.
"The resources invested by MDB Capital in the creation of its rigorous PatentVest analytic tool and applied to our patent portfolio further confirms the value of Health Discovery Corporation's intellectual property portfolio," said Dr. Barnhill.
"Companies like Quest Diagnostics, Incorporated (NYSE: DGX) and Abbott Labs (NYSE: ABT) understand the value of Health Discovery Corporation's patent protected technology and have entered into significant development and commercialization contracts with us," said Dr. Barnhill. "Our patented technology also attracts world-class scientist-inventors like Isabelle Guyon, Ph.D. and Maher Albitar, M.D. to our company," said Dr. Barnhill.
"An unsung hero in all of this is our long-time intellectual property lawyer, Eleanor Musick, a partner at the law firm, Procopio, Cory, Hargreaves & Savitch LLP in San Diego, California," said Dr. Barnhill. "Eleanor's vast knowledge of patent law, her scientific expertise and strategic thinking and planning have been invaluable in creating the value in our intellectual property portfolio that was recognized publicly by MDB Capital Group selecting HDC for their prestigious MICO Award," he said.
"I am thrilled to see Health Discovery Corporation receive this honor in recognition of its vision for SVM technology and am happy to have had the opportunity to participate in designing and carrying out a strategy for patent protection of this versatile technology and the valuable discoveries it has produced," said patent lawyer Eleanor Musick.
"It has been a pleasure working with Health Discovery's impressive inventors and with Dr. Barnhill and his team over the past ten years," said Musick. "I look forward to working with Health Discovery as it continues its tradition of innovation and to securing additional intellectual property protections for Health Discovery's future inventions and discoveries," said Musick.
Wave Systems - MICO Award.
MDB Capital’s Bright Lights Conferences.
Wave was one of five companies to win a MICO. May 2010.
MICO - Latin for “to shine” this award is presented to the top five companies across all industries with the most potentially disruptive or market changing IP, as voted on by institutional investors and other registered attendees to the Bright Lights Conference. The MICO recognizes the investors choice for the most promising innovations of the future.
http://www.mdb.com/bright-light-award-winners.html
Who Attended?
• Fund managers
• Analysts
• Venture capitalists
• M&A and private equity professionals
• IP professionals
• Corporate executives
http://www.mdb.com/bright-lights-conference.html
Wave Juniper UAC.
Wave to Showcase Hardware-based Validation of Endpoint Data Integrity for Network Access Control at Interop Las Vegas 2008
Wave Software Extends Juniper Networks’ Unified Access Control (UAC) Machine Authentication and Health Status Verification; Limits Data Access Based on Proof of Encryption on Seagate FDE Hard Drives
Las Vegas (Interop) and Lee, MA — April 29, 2008 — Wave Systems Corp. (NASDAQ: WAVX; www.wave.com ) today announced that it will demonstrate a Network Access Control (NAC) solution that verifies the presence and state of a full disk encryption hard drive as a prerequisite for network access, assuring that only computers that comply with an organization’s encryption policy are allowed on the network. Wave will also show how standards-based, client PC security hardware can ensure the integrity of the machines on a corporate network, thus extending the capabilities of traditional NAC solutions. The demonstrations will take place at the Trusted Computing Group’s booth (#421) at Interop Las Vegas 2008, located at the Mandalay Bay Convention Center, from April 29-May 2.
Wave’s software extends the security of commercially available NAC solutions by using the Trusted Platform Module (TPM) security chip to measure, sign and store endpoint integrity metrics. Specifically, Wave will demonstrate how its EMBASSY® Endpoint Enforcer software interoperates with Juniper Networks’ Unified Access Control (UAC) to enforce a policy that requires a Seagate Momentus® full disk encryption hard drive to be present on a laptop requesting access to a network—and that its security settings, such as pre-boot authentication, be enabled and active.
"Seagate and Wave are continuing to enhance PC security solutions based on our strong, fast always-on hard drive-based encryption technology,” said Michael Wingert, executive vice president and general manager of Seagate’s Personal Compute business unit. “With the addition of Network Access Control solutions from industry leaders like Juniper and the TPM authentication from Wave, the Seagate Momentus 5400 FDE.2 hard drive clearly addresses the data at rest and network access encryption policy key criteria for enterprises.”
In addition, this joint solution provides strong platform authentication and robust protection against software attacks that create “lying endpoints.” Specifically, Wave's EMBASSY Endpoint Enforcer measures, validates and reports on the integrity of the Juniper UAC client components, providing a high level of assurance that the endpoint integrity data collected is not compromised or otherwise altered.
“Data protection capabilities such as the presence of FDE drives represent an area of increased interest from security-conscious organizations, and a logical extension of Network Access Control,” said Jay Kelley, product marketing manager, Access Solutions, Juniper Networks. “Wave provides the secure hardware authentication, data protection, and the necessary measurement data to Juniper’s UAC to facilitate a combined, hardware enabled end-to-end NAC solution. Juniper is pleased to demonstrate our complementary capabilities through this NAC demonstration with Wave.”
“We believe that the ability to verify the health and data protection capabilities of PCs before granting access to networks and confidential data is a critical step for protecting enterprises,” said Brian Berger, executive vice president of marketing and sales at Wave Systems. “We look forward to providing attendees at Interop 2008 with multiple demonstrations of how Wave’s hardware-based security solutions can make this process a reality for their organizations.”
Hardware Security Verification for Web Services
In addition to the aforementioned demos, Wave will show a proof-of-concept solution that depicts how a Web service such as a corporate intranet can use Wave’s EMBASSY Remote Administration Server to interrogate computers requesting access to sensitive data to verify the presence and state of their Seagate full disk encryption hard drive.
TheTrust-and-Verify demonstration pairs Wave’s EMBASSY Remote Administration Server (ERAS) on the server side, with Wave’s EMBASSY Trust Suite and Seagate full disk encryption hard drives on the client. When the client attempts to access pages from a local network, ERAS polls the client to confirm the presence of a Seagate FDE drive, and whether or not the drive’s hardware encryptionand strong access control are enabled and active.
By leveraging “built in” hardware security, enterprises can better prove that a PC is in compliance with data protection policies and regulations, make better network access decisions and ensure that sensitive data on a laptop computer is protected in the event the computer is lost or stolen.
Aruba Juniper and UAC 2.
Juniper Networks to Acquire Funk Software
Acquisition Will Extend Leadership in Delivering Standards-based Security Solutions
SUNNYVALE, CA - November 14, 2005 - Juniper Networks, Inc. (Nasdaq: JNPR) today announced it has signed a definitive agreement to acquire Funk Software, a leading provider of standards-based network access security solutions, in a cash transaction valued at approximately $122 million. This acquisition will bring key technology to enhance Juniper Networks' recently announced unified access control solution and further its strategy to secure and assure the delivery and performance of applications over an IP network. The move also reinforces Juniper's commitment to delivering standards-based solutions that protect customers' current investments, enabling them to secure the infrastructure they have today and overlay additional functionality as their needs evolve. With the addition of Funk Software's technology, Juniper will be delivering the most comprehensive, open and broadly deployed network access solution available.
"Juniper is committed to delivering standards-based solutions that enable customers to secure the infrastructure they already have, allowing them to protect their technical and financial investments. The addition of Funk Software's technology to Juniper's security products portfolio will reinforce that commitment. Once again Juniper Networks is taking a leadership role as we continue to add value and intelligence to the network," commented Rob Sturgeon, executive vice president and general manager, Security Products Group, Juniper Networks.
Funk Software develops products and technologies that protect the integrity of the network by ensuring both the user and the device meet an organization's security policies before they are granted access. These solutions include market leading products such as its RADIUS/AAA server, Steel-Belted Radius, Odyssey Client, an 802.1X client for wireless and wired networks and its recently introduced Endpoint Assurance Product suite for network-based enforcement of endpoint integrity.
Built on open standards, including those developed by the Trusted Computing Group's Trusted Network Connect (TNC) subgroup, Funk Software's products are interoperable with products from a broad range of security and infrastructure vendors and are in widespread use on every type of network, public and private, wired and wireless. These solutions complement Juniper Networks' existing endpoint intelligence, policy control and enforcement capabilities with Layer 2 support, thereby ensuring comprehensive security across both wired and wireless networks.
Aruba Networks Teams with Juniper Networks to Deliver Secure Enterprise Mobility Solutions
Sunnyvale, Calif., June 19, 2006 - Aruba Networks, the Mobile Edge Company, today announced it has joined the Juniper Networks, Inc. (Nasdaq: JNPR) J-Partner Solutions Alliances program, enabling joint customers to extend their investment in Juniper's security products across their mobile workforces. The joint collaboration ensures that Aruba mobility controllers are pre-tested for interoperability with Juniper's firewall/VPN devices and AAA/802.1X solutions to save enterprises the operational costs of integrating multiple systems.
The key beneficiaries of the joint effort are:
Mobile Enterprises that require secure, standards-based access to networks and resources: With 802.11i now established as the proven security standard for a wireless LAN deployment, Aruba and Juniper deliver a secure standards-based enterprise WLAN solution. Aruba mobility controllers interoperate with Juniper Steel-Belted Radius Server and with Odyssey 802.1X Access Clients to create the joint solution.
• Distributed Enterprises that have mission-critical wireless networks in branches: Wireless is quickly becoming the primary connectivity method for enterprise branch offices where multiple mission-critical applications including data, voice, barcode scanning, inventory management, active RFID and asset tracking need to be supported. The Aruba 200 series mobility controller is purpose-built for such deployments and controls up to six access points and can be deployed as the sole network services device for a retail outlet by setting up a secure IPSEC VPN tunnel to any Juniper firewall/VPN device.
• Government Organizations: The Department of Defense's directive 8100.2 requires Layer 2 encryption for wireless deployments and Aruba and Juniper can deliver a complete FIPS 140-2 validated 802.11i solution today. Additionally, xSec, a FIPS 140-2 validated security protocol provides 802.1X and AES encryption as an interim step to enable 802.11i class security for wired and legacy wireless clients.
• Healthcare and Educational Institutions that need to provide open access (i.e., no encryption) for unmanaged wireless clients: Enterprises can protect information assets and defend against malware, worms or viruses entering the open access wireless infrastructure by ensuring that all unsecured traffic passes through Juniper's deep packet inspection firewall capabilities.
Juniper Networks Launches New Unified Access Control Solution With Expanded Interoperability And Functionality
Published January 1st, 2007
Juniper Networks, Inc. (Nasdaq: JNPR) today launched the new Unified Access Control (UAC) 2.0 solution, helping enterprises more effectively manage user access to critical business assets from a wide range of network endpoints. With UAC 2.0, Juniper Networks has completed integration of its market-leading 802.1X components with existing UAC functionality, including elements of the Odyssey® Access Client (OAC) and Steel-Belted Radius® (SBR). UAC 2.0 is an open standards-based Layer 2 and Layer 3 access control solution that can be rolled out in a flexible array of deployment scenarios to give enterprises real-time visibility and granular policy control throughout the network. The UAC 2.0 solution supports current and future interoperability within multi-vendor environments via support for both the IEEE 802.1X standard and Trusted Computing Group’s Trusted Network Connect (TNC), a set of non-proprietary specifications that enables open standards-based access control.
“Juniper has delivered on the promise it made less than a year ago when we acquired Funk Software, combining Funk’s market-leading 802.1X components and Radius technologies with our existing UAC solution,” said Hitesh Sheth, vice president of security products at Juniper Networks. “With UAC 2.0, we have set the bar in the network access control market for deployment flexibility and interoperability, enabling customers to use Juniper’s firewalls and/or any 802.1X-enabled switch or wireless access point as enforcement points to secure access to applications and resources across distributed networks.”
“Enterprise networks are increasingly complex and distributed, with a multitude of users including employees, partners and contractors requiring access to critical business information from network endpoints that may be poorly managed, unmanaged, or in many cases, completely unmanageable. The threat from dangerous and vulnerable endpoints has made network access control a critical security process for enterprises,” said Lawrence Orans, research director at Gartner. “As the access control market evolves and access control deployments increase in scale and scope, enterprises will require solutions that enable them to leverage existing investments in network and security infrastructure, and are capable of interoperating seamlessly within heterogeneous IT environments.”
UAC Balances Access and Security Controls for Customers
Juniper Networks’ UAC solution helps customers solve the problem of balancing access and security controls by binding user identity, endpoint integrity and location information with access controls for dynamic policy management that is enforced in real-time throughout the network. Some of Juniper Networks’ UAC customers include China Mobile, one of China’s leading mobile services providers; Fredrikstad Kommun, a municipal authority in Norway; and KAMO Electric Cooperative, Inc. (KAMO Power), an Oklahoma-based Generation and Transmission cooperative.
“Juniper understands access control. With the new UAC 2.0 solution, they’ve given our organization complete flexibility with regard to our IT and network infrastructure, and a method to provide very granular control using open standards,” said Robert Lemm, IS supervisor at KAMO Power. “The Juniper UAC solution allows us to not only ensure policy compliance of devices and users prior to login and issuance of an IP address, but also to dynamically control access to resources and applications during the entire duration of the user session for meaningful access control. This approach has the potential to meet a wide range of challenges related to controlling our network.”
Integration of Funk’s 802.1X and Radius Technologies into UAC 2.0
Juniper Networks’ UAC solution is comprised of several elements, including the Infranet Controller, which serves as a centralized policy manager; the UAC Agent, which is dynamically downloadable endpoint software; and a flexible array of policy enforcement points which include Juniper Networks firewalls and any 802.1X-enabled switch or wireless access points. In UAC 2.0, both the Infranet Controller and the UAC Agent contain integrated features from Juniper’s acquisition of Funk Software, including the OAC 802.1X supplicant and SBR. Both OAC and SBR are also available as standalone products.
Flexible Access Control and Security to Support All Enterprise Environments
Juniper Networks is introducing a solution that offers dynamic access control from the start of the session, before the issuance of an IP address, all the way through to very granular resource-level controls. The UAC solution’s flexible enforcement options allow customers to instantly support access control across wired and wireless campus, data center and branch office locations. Customers can choose to use firewalls, integrated content security and intrusion detection capabilities as an overlay on existing networks to protect mission critical LAN assets, and over scale the solution to support 802.1X enforcement at Layer 2. Alternatively, customers can immediately roll out the UAC solution to leverage their existing 802.1X infrastructure, and use the overlay deployment scenario to provide more granular access over time. Customers can seamlessly add to their deployment without having to redeploy new UAC Agents or a new Infranet Controller.
Intelligent and Adaptive Security Policy Assessment, Enforcement and Remediation
Juniper Networks’ UAC solution delivers a unified agent that can support user identity and endpoint verification at both Layer 2 and Layer 3 across an 802.1X infrastructure. A comprehensive set of endpoint assessment checks, both native functionality as well as pre-defined checks for antivirus, spyware, firewall, patch management, configuration management, OS and malware checks, can be leveraged as part of the access control policies. The agent is capable of initiating remediation actions to bring the endpoint into compliance prior to granting access. Access control can also be provided in agentless mode if required.
Aruba Juniper and FIPS 140-2.
Solution
This combination of Aruba’s powerful mobility controllers with Juniper Networks Odyssey Access Client FIPS Edition delivers a complete FIPS 140-2 validated secure mobile solution that meets the governments’ most stringent requirements, while addressing both 802.11i and non-802.11i compliant devices.
The Juniper Networks and Aruba Networks FIPS Validated 802.11i Security Solution Through the Juniper enterprise alliance technology partnership program, Juniper and Aruba have co-developed solutions that provide a comprehensive, validated offering that meets strict government IT and network security requirements.
Aruba and Juniper are the only partners that can offer a comprehensive FIPS validated 802.11i solution today. A modified driver is needed to run 802.11i in a FIPS-compliant configuration, but these drivers are not available for all devices and platforms.
Juniper and Aruba have jointly developed the xSec protocol to address this problem. xSec is a standards-based, Layer 2 protocol that can provide FIPS-compliant Advanced Encryption Standard (AES) encryption over off-the-shelf 802.11 adapters and drivers. The selected adapter does not need to support 802.11i; xSec also provides AES encryption over 802.1X wired connections.
Because of its centralized architecture, Aruba’s mobility controller delivers unmatched encryption processing power and a design where no encryption keys are stored anywhere outside the controller. Only Aruba’s mobility controller needs to be FIPS validated. Juniper Networks Odyssey Access Client FIPS Edition is compatible with the Department of Defense (DoD) Common Access Card (CAC) standard, and supports both the Aruba/Juniper jointly developed xSec and 802.11 standards through its own embedded FIPS 140-2 Level 1, which has been validated by the National Institute of Standards and Technology (NIST) cryptographic module and meets the most rigorous government encryption standards. OAC FIPS Edition also offers the advanced management features needed by large government organizations with multiple facilities and sites.http://www.juniper.net/us/en/local/pdf/solutionbriefs/3510208-en.pdf
Dell to sell Aruba's wireless solutions
More Alerts >> Aug 17, 2010 (TELECOMWORLDWIRE via COMTEX) --
IT company Dell (NASDAQ: DELL said today that it has signed a multi-year agreement with networking company Aruba Networks (NASDAQ: ARUN | PowerRating) under which Dell will deliver Aruba's wireless solutions under its PowerConnect W-Series networking portfolio.
The terms of the agreement were not disclosed.
Dell's new PowerConnect W-Series is designed to help customers efficiently deploy and manage wireless networking solutions, allowing them to dynamically scale their networks using enterprise-class connectivity and offering security to mobile workers. The solutions include a centralised management allowing IT professionals to manage a large number of wireless access points. The products are designed to prioritise bandwidth based on application demands in a rapidly changing network, according to the company
The Dell PowerConnect W-Series of wireless networking products are expected to be available through Dell and its PartnerDirect channel partners to customers in the US, Canada, Denmark, France, Germany, Greece, Ireland, Italy, the Netherlands, Norway, Spain, Sweden, Switzerland and the UK this quarter, with other countries in the near future. No pricing information was provided.
From an older post:
Posted by: Countryboy
Date: Tuesday, April 22, 2008 1:04:16 PM
In reply to: goepling who wrote msg# 163085
Post # of 197462
Goepling.
I was told by Wave that "We are the guys who turn on those TPMs for aruba. We worked with them to verify the solution. This is the kind of announcement that continues to drive TPM turn on."
Microsoft Sniffs Out Aruba
JUNE 02, 2004
Microsoft Corp. is undertaking a major security upgrade on its worldwide wireless LAN network -- using an intrusion detection system from 802.11 switch startup Aruba Wireless Networks to try and stop unauthorized use of access points (APs) across its campuses.
For those of you who don't know, Microsoft runs one of the largest corporate wireless LAN networks in the world. The software giant has an installed base of 4,505 APs in its offices around the globe. Up to 18,000 users log on to this network daily.
Aruba Wins Microsoft Deal
JUNE 13, 2005
Enterprise wireless LAN startup Aruba Wireless Networks has won the hotly contested contract to supply Microsoft Corp. with 802.11 gear for its 277 buildings worldwide.
Microsoft will use Aruba software and controllers to manage 5,000 of its slimline access points. The deployment will cover more than 17 million square feet and replace Microsoft's original deployment of Cisco Systems Inc. Aironet standalone APs. A spokesman for Cisco told Unstrung that he couldn't comment on the deal.
Aruba started working with Microsoft on wireless LAN last June with a security overlay for its WiFi network (see Microsoft Sniffs Out Aruba ). Keerti Melkote, VP of product management for Aruba, says that security remains a key factor in Redmond chosing his firm, along with the scaleability of the Aruba system.
Melkote also suggests that the deal could mean more work between the companies in other areas. "You'll see better integration with Microsoft," he says, particularly around security, RF issues, and wireless LAN roaming capabilities in Microsoft's Longhorn client software.
Microsoft Puts Aruba Networks on The Map
June 13, 2005
UPDATED: Putting one vendor on its heels and another on the map, Microsoft will replace its Cisco wireless local area network (define) gear with equipment from Aruba Networks.
With more than 25,000 users on the network at any given time in 60 countries, Microsoft's WLAN is one of the world's largest. It is deployed in 277 buildings comprising more than 17 million square feet.
Aruba, which was chosen after independent labs tested its equipment against better-known rivals, will supply Microsoft with mobile controllers, software and 5,000 wireless access points.
The system will reduce the equipment needed and will eliminate the need for Microsoft to deploy overlay networks for voice-over-wireless, guest services, security and wireless location services, the companies said. Financial terms were not disclosed.
"It's a big win for Aruba, since Microsoft is a very visible, influential and sophisticated company, and made this decision after an extensive evaluation," Craig J. Mathias, principal with the Farpoint Group, told internetnews.com.
Mathias said Cisco is "undoubtedly disappointed," but its industry position won't be jeopardized by losing Microsoft's corporate WLAN business.
Ken Dulaney, an analyst with Gartner, agreed that the win means more for Aruba than the loss does for Cisco.
"This kind of deal is extremely important for Aruba," Dulaney said. "Since Cisco was in there on the first round, it is slightly negative for Cisco, but probably won't impact them all that much."
Cisco spokesman Charles Sommerhauser said Cisco cannot comment on customer decisions but said the company is very pleased with the state of the WLAN business. "Cisco has many satisfied customers; we are continuous market share leaders per analysts and are seeing strong business."
Aruba is based in Sunnyvale, Calif. It is privately held and has raised $59 million in three rounds from Matrix Partners, Sequoia Capital, TrinityVentures and the WK Technology Fund.
It counts German software giant SAP among its enterprise customers and also works with several colleges and universities, including Dartmouth and Yale.
Relatively High Gross Margin Detected in Shares of Wave Systems in the Systems Software Industry (WAVX, CHKP, ROVI, PVSW, CA)
Written on Wed, 08/11/2010 - 7:29am
Below are the top five companies in the Systems Software industry as ranked by gross margin. Gross Margin tells you how many of your sales dollars are profit. If efficiency is improved, more profits will result.
Wave Systems (NASDAQ:WAVX) has gross margin of 94%, a sales growth of 45.5%, and trailing 12 months sales of $20.7 million.
Check Point Software Technologies (NASDAQ:CHKP) has gross margin of 88.6%, a sales growth of 16.7%, and trailing 12 months sales of $1 billion.
Rovi (NASDAQ:ROVI) has gross margin of 88.1%, a sales growth of 12.8%, and trailing 12 months sales of $518.1 million.
Pervasive Software (NASDAQ:PVSW) has gross margin of 87.2%, a sales growth of 5.6%, and trailing 12 months sales of $47.2 million.
CA Inc (NASDAQ:CA) has gross margin of 86.4%, a sales growth of 4.5%, and trailing 12 months sales of $4.4 billion.
SmarTrend is bullish on shares of ROVI and our subscribers were alerted to Buy on February 12, 2010 at $30.05. The stock has risen 45.4% since the alert was issued.
Identity ecosystem to replace passwords, draft strategy suggests.
June 25, 2010.
White house plan would base authentication on trusted digital identities
Imagine signing on to your computer, logging onto a secure Web site or handling a sensitive document electronically -- all without needing a user name or password.
The draft national strategy for building a new “identity ecosystem” that the Obama administration released June 25 would accomplish that, according to its developers. The ecosystem would base authentication on trusted digital identities instead.
The plan, named the National Strategy for Trusted Identities in Cyberspace, would lay a blueprint for an online environment in which online transactions for both the public and private sectors are more secure and trusted. The strategy identifies the federal government as “primary enabler, first adopter and key supporter” of the identity ecosystem.
In the language of the strategy, "In the envisioned identity ecosystem individuals, organizations, services, and devices would be able to trust each other because authoritative sources establish and authenticate their digital identities." What that means in real terms is that trusted providers such as a bank would issue security credentials that would then be accepted by other online resources such as social networking sites and e-mail providers. Rather than using a user name and password, the person would have the crediential on a device that would authenticate his or her identity to the computer and, by extension, to services that accept the credential. The strategy includes references to smart cards, USB drives, mobile devices, software certificates and trusted computing modules as possible authentication technologies.
The strategy provides a hypothetical case of of a woman whose husband has recently been in the hospital. She is able to access his medical information using her cell phone because everyone involved in the information exchange uses a "trustmark" that signifies they adhere to the identity ecosystem framework.
Related stories
White House plans strategy for better cyber authentication
The urgency behind solving the cyber identity problem
The woman would have established her digital identity when she subscribed to a cell phone service plan, and the phone carrier would have verified her identity based on defined standards and issued her a credential on her cell phone that she could use within the ecosystem. The hospital and her husband's primary care provider, in turn, would have validated and maintained the appropriate attributes needed to release the information. And at the very beginning of the process, her husband would have provided her name and phone number to the hospital and signed the needed documents to authorize release of his information.
“No longer should individuals have to remember an ever-expanding and potentially insecure list of usernames and passwords to log into various online services,” White House Cybersecurity Coordinator Howard Schmidt said in a post on the White House blog. “Through the strategy we seek to enable a future where individuals can voluntarily choose to obtain a secure, interoperable, and privacy-enhancing credential…from a variety of service providers – both public and private – to authenticate themselves online for different types of transactions.”
Schmidt’s office has been led the effort and will continue to do so. The Homeland Security Department is collecting public comments on the plan through July 19. Schmidt said the strategy will be finalized this fall.
Officials say participation in the identity ecosystem must be voluntary. The draft document breaks the ecosystem down into execution, governance and management layers and explains how individuals, companies, and government would benefit from that online environment. For example, the document says individuals would get more security, efficiency, privacy and choice.
The document says goals for the strategy are to:
• Develop a comprehensive identity ecosystem framework.
• Put in place an interoperable identity infrastructure aligned with the identity ecosystem framework.
• Bolster willingness to participate in that ecosystem.
• Ensure the long-term success of the ecosystem.
The strategy also lays out high-level priority actions:
• Designate a federal agency to lead the public/private sector efforts.
• Develop a shared, comprehensive public/private sector omplementation plan.
• Accelerate the expansion of federal services and policies that align with ecosystem.
• Work among industry and government to put enhanced privacy protections in place.
• Coordinate the development of risk models and interoperability standards.
• Deal with liability worries of people and service providers.
• Perform outreach and awareness activities.
• Continue collaborating in international efforts.
• Identify other ways to push for adoption of the identity ecosystem nationwide.
“There is a compelling need to address these problems as soon as is practical, making progress in the short term and planning for the long-term,” the document concludes. “For the nation to realize the vision of this strategy and associated benefits, all stakeholders must come together in a collaborative partnership.”
http://gcn.com/articles/2010/06/25/national-strategy-for-trusted-identities-in-cyberspace.aspx
Vacationhouse.
My thought is it would make more sense for other companies to negotiate an fair equitable deal with Wave rather than spend a lot of time and money on legal fees. One more reason to use Wave rather than someone else.
Katana Technologies is working closely with distributor Renaissance on the Palo Alto agency, Rielly says. He is currently the company’s sole employee.
http://www.katanatechnologies.net/products/
http://www.renaissance.co.nz/insite.html
Distributor gets bigger bite of Apple
Tuesday Jun 26, 2007
The New Zealand distributor for Apple products like iPods is plugging directly into the retail business, helping to allay threats to its wholesale operation.
Apple Mac New Zealand distributor Renaissance Corporation has bought the country's largest Apple reseller - MagnumMac - a purchase that may insure the company against any future squeeze by the global IT giant.
Renaissance announced yesterday it had paid $3.5 million for MagnumMac, which has outlets in Auckland, Wellington, Christchurch and Dunedin with annual sales last year of $28 million and earnings before interest and tax of $1 million.
The payment to MagnumMac owner Murray Wood is through two million $1 shares and he will take up an executive position at Renaissance, running the MagnumMac business.
First New Zealand Capital analyst Chris Burke said the purchase made sense for the company, whose performance depended heavily on its relationship with Apple.
In most countries Apple operates a separate division but here it deals through Renaissance in this market.
Apple's decision to keep control of iTunes and to sell directly through its New Zealand website is understood to have cut margins.
"There have been rumours for three to four years that they could lose the Apple wholesale business. It's something that affects the stock now and again," Burke said.
"This embeds them into Apple's supply chain a bit more, so perhaps it is an incentive for Apple to not change the current arrangements."
Specialist branches out with own firm.
Monday, May 03 2010
Steve Rielly establishes Katana Technologies.
IT security veteran Steve Rielly has established Auckland-based Katana Technologies, to represent vendors who want to establish a local presence.
Rielly has worked in networking and security for more than a decade, and was most recently a security consultant at distributor Chillisoft. Prior to that, he was business development manager for Symantec and before that a security consultant at Trend Micro.
He formed Katana Technologies last December and says he has since grown vendor partnerships from three to 10. The company will focus on working with startups and those who want to set themselves up in the country or the region, says Rielly.
“I started with two or three [vendors] but then it got around I was starting my own company. In some cases these vendors have had leads, but haven’t been able to service them,” he says.
His initial focus is on Palo Alto Networks, for which he is a local gold partner, and US-headquartered Bluecat Networks, which specialises in IP address, DNS and DHCP management. He will also be working with email security vendor Proofpoint and endpoint encryption specialist Wave Systems, adding both companies are well established overseas but not locally.
Rielly will name the other vendors as the business grows.
He adds some of the vendors he is working with have other partners locally, but claims these partners aren’t working actively on the vendors’ solutions. In some cases, Katana’s partnerships cover Australia and New Zealand.
Rielly believes he is the only local certified technologist for Palo Alto Networks, having completed its accredited engineer programme in December.
Palo Alto Networks’ ANZ sales director David Thrum says he is happy Katana has joined its NextWave partner programme. “Steve Rielly is a recognised visionary in the network security industry and his experience will help us expand the success of our next generation firewall technology in New Zealand,” says Thrum.
Katana Technologies is working closely with distributor Renaissance on the Palo Alto agency, Rielly says. He is currently the company’s sole employee.
http://www.katanatechnologies.net/products/
Data Security
WAVE SYSTEMS
Wave Systems is a leading provider of client and server software for hardware-based digital security, enabling organizations to know who is connecting to their critical IT infrastructure, protect corporate data, and strengthen the boundaries of their networks. Wave's core products are based around the Trusted Platform Module (TPM), the industry-standard hardware security chip that is included as standard equipment on most enterprise-class PCs shipping today.
A TPM is a highly secure cryptographic support system. It generates, stores and processes keys, which can be used to encrypt information and harden identities. It provides a broad range of security features, but because the TPM works independently of the operating system, it can serve as a "root of trust," verifying the integrity of the machine and user.
Great Video. It's up there the FreeCreditReport Commercial's.