Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
PRESS RELEASE: Wave Systems and NTT DATA Complete Agreement to Distribute EMBASSY(R) Technology and Services in Japan
--------------------------------------------------------------------------------
Wed Jul 05 09:14:23 2006 EDT
Wave Systems and NTT DATA Complete Agreement to Distribute EMBASSY(R)
Technology and Services in Japan
LEE, Mass. & TOKYO--(BUSINESS WIRE)--July 5, 2006--
Wave Systems Corp. (Nasdaq:WAVX - www.wave.com) announced today that it has
executed a software reseller agreement with NTT DATA Corporation (TOKYO:9613.T)
of Japan, a leading systems integrator. Pursuant to the agreement NTT DATA will
be authorized to resell and provide support services for Wave's EMBASSY(R)
Trust Suite technology and solutions for the trusted computing market in Japan,
including financial services, government, health care and consumer market
segments. Financial details of the agreement were not disclosed. The agreement
does not provide for guaranteed minimum or maximum shipped quantities or
royalties.
Wave's Embassy software is designed to support the next generation, security
chip hardware called the Trusted Platform Module (TPM). The TPM standard was
developed by an industry standards body called the Trusted Computing Group
(TCG) www.trustedcomputinggroup.org. The computer industry has shipped tens of
millions of PCs embedded with TPM chips, and Wave's Embassy technology is
designed to be compatible with all commercially available TPMs. When used with
a TPM chip, Wave's Embassy trusted computing solutions enable a number of
features, including network policy management, data protection, password
protection, strong authentication -- including machine, biometric and smart
card authentication of a user's personal computer to a server -- and encrypted
email.
"We are very pleased to solidify our relationship with Wave Systems through
the execution of this software reseller agreement," said Noritaka Ogawa,
Director, Mobile & IC Media Service Unit, Business Solutions Sector, NTT DATA.
"We see a growing business opportunity to deliver quality secure solutions,
with Trusted Computing, in Japan. Wave's products, along with NTT Data's
Solutions, provide enterprise-wide complete security for the business customer.
The combined capabilities from NTT Data and products from Wave Systems, provide
the Japanese market standards based security that satisfies the requirements
for both government and commercial customers."
Steven Sprague, president and CEO, Wave Systems, commented, "Japan represents
a substantial market opportunity for Wave's trusted computing solutions, and
NTT DATA, the leading IT services provider in Japan, is the ideal partner for
Wave in this market. We are delighted to forge this alliance with NTT DATA and
to help their customers address daily personal computer security challenges
such as identity, data theft, phishing and insecure passwords. We are currently
enhancing Japanese language functionality and support of our solutions to meet
our partner's specifications, and we anticipate the rollout of our product
offering through NTT DATA later this year."
More information on Wave's Embassy secure software is available at
www.wave.com.
LEE, Mass., Jun 20, 2006 (BUSINESS WIRE) --
Wave Systems Corp. (NASDAQ: WAVX) today announced that
STMicroelectronics (NYSE: STM) has enhanced its existing license
agreement with Wave Systems with the addition of a license for a new
suite of EMBASSY(R) security software from Wave Systems for bundling
and distribution with ST's Trusted Computing Group (TCG) 1.2 TPM
Solution for personal computers. Under the agreement, Wave receives a
per-unit royalty (similar to Wave's existing PC OEM agreements) based
on ST's shipment volumes of products equipped with this new suite of
Wave's EMBASSY(R) security software technology. This royalty would be
in addition to the per-unit royalty currently paid to Wave for
distribution of the original Embassy security software licensed under
the companies' existing Master Software License and Distribution
Agreement. The contract does not provide for guaranteed minimum or
maximum shipped quantities or royalties.
The new software suite includes capabilities for multi-factor
authentication, data protection and ID/Password management that, when
bundled with Wave Systems' Embassy Trust Suite capabilities already
licensed for distribution by ST, offer wide-ranging desktop security
capabilities for the customer. The new solution is based on ST's
latest SOC - ST19WP18 - combined with the software stack (BIOS and
Windows(R) drivers, Trusted Computing Group Software Stack, and Wave
EMBASSY(R) Security Center and TCG Cryptographic Service Provider) and
delivers an off-the-shelf TCG-enabled security solution for desktop
and laptop PCs.
"Our TPM sales are accelerating in the Asia Pacific market, and
our customers are demanding a turn-key solution. Our new agreement
with Wave Systems allows ST to provide a more complete solution, up to
the applications level, for multifactor authentication-data protection
as well as basic TPM capabilities from the existing license agreement,
such as TPM management with Wave's Embassy Security Center (ESC),"
said Vincent Cousin, Manager, Digital Secure Access Business Unit,
STMicroelectronics Taiwan. "We see a growing market and adoption of
the TPM throughout Asia and expect our ability to sell Wave's solution
to help our position in the marketplace."
"Wave believes the OEM (Original Equipment Manufacturer) and ODM
(Original Design Manufacturer) channels will be important in the
long-term for the distribution of our value-added software solutions
and that ST's distribution of higher value solutions for biometrics,
key management, data encryption and pin/password management will
increase Wave's reach to the customer base in the APAC region. We are
pleased that STMicroelectronics is taking a leadership role in
providing more alternatives to their channels," said Brian Berger,
executive vice president of marketing and sales, Wave Systems. "We
believe this is another important demonstration of the extensive
capabilities Wave can offer to address client and server security
needs, particularly in areas where there are heightened concerns over
lost or stolen PC's containing proprietary data."
More information about STMicroelectronics products is available
through www.st.com.
More information about Wave's EMBASSY Trust Suite products is
available through www.wave.com/products/ets.html.
About Wave Systems
Consumers and businesses are demanding a computing environment
that is more trusted, private, safe and secure. Wave is a leader in
delivering trusted computing applications and services with advanced
products, infrastructure and solutions across multiple trusted
platforms from a variety of vendors. Wave holds a portfolio of
significant fundamental patents in security and e-commerce
applications and employs some of the world's leading security systems
architects and engineers. For more information about Wave, visit
http://www.wave.com.
*DJ Wave Systems Announces New Licensing Pact With STMicroelectronics For Additional PC Security Software; Trusted Platform Module (TPM) Solutions Target Asia Pacific OEMs / ODMs To Meet Increasing Customer Demand>WAVX
Phoenix Technologies Ltd. Latest BIOS Provides Increased Data Protection, Enhanced Security and Authentication for Upcoming Release of Windows Vista; New TrustedCore Release Supports BitLocker Drive Encryption Logo Requirements
--------------------------------------------------------------------------------
Tue May 23 08:03:01 2006 EDT
MILPITAS, Calif., May 23, 2006 (BUSINESS WIRE) --
Phoenix Technologies Ltd. (Nasdaq:PTEC) today announced
a new version of TrustedCore, its innovative firmware that creates a
more tamper-resistant platform by proactively protecting X86-based
computing devices and their data before the operating system and
applications even load. The new version of TrustedCore, through its
support of BitLocker(TM) Drive Encryption, will provide Windows Vista
users with better data protection, pre-boot security and
authentication and support for other security specifications,
including biometrics and smart tokens. TrustedCore is a secure
firmware foundation that will increase client and enterprise security
by providing endpoints with strong authentication and a secure
execution environment.
"BitLocker Drive Encryption for the Microsoft Windows Vista
operating system provides for full volume encryption and support for
pre-boot multi-factor authentication. These are important data
protection features that our customers are very excited about," said
Russell Humphries, senior product manager, Microsoft Windows Client
Group. "Microsoft and Phoenix Technologies are collaborating closely
to ensure that TrustedCore will meet the Windows Vista and BitLocker
requirements."
Building on previous versions of TrustedCore, the new version is
the most advanced firmware available and includes capabilities that
legacy BIOS solutions cannot offer. TrustedCore SP3B enhances endpoint
security by providing secure CRTM (core root of trust measurement,
also known as BIOS Bootblock) update through its Secure Flash update
process. In addition, TrustedCore SP3B supports Unified Extensible
Firmware Interface (UEFI) 2.0 and provides developer tools, including
a device driver kit (DDK) for silicon and hardware vendors, and a
software developer kit (SDK) for application developers that want to
build UEFI shell applications.
"PC designers and manufacturers are looking to us to provide them
with advanced firmware solutions to improve endpoint security and
speed time to market," said Robert Wise, vice president of product
marketing, Phoenix Technologies. "By collaborating with Microsoft on
security enhancements to Windows Vista, we will ultimately provide
enterprise users with enhanced security capabilities and better data
protection."
A beta version of TrustedCore SP3B is available immediately and
the release version is expected in Q3 2006. For more information,
visit www.phoenix.com/TrustedCore.
fivewood
Wave Systems to Demonstrate Trusted Computing Security and eSign Transaction Management Suite at ACORD LOMA Insurance Systems Forum
--------------------------------------------------------------------------------
Fri May 19 09:04:01 2006 EDT
LAS VEGAS, May 19, 2006 (BUSINESS WIRE) --
Wave Systems Corp. (NASDAQ:WAVX), a leader in developing
Trusted Computing applications, announced today that it will be
demonstrating insurance industry applications of the Company's trusted
computing security technology, including electronic signature and
document process management solutions, at the ACORD LOMA Insurance
Systems Forum, May 22-24 (Mandalay Bay Resort, Booth #1115). Wave
Systems offers the insurance industry practical, easy-to-use
applications for enhanced PC security utilizing the Trusted Platform
Module (TPM) security chip. Wave will demonstrate its software's
strong authentication capabilities with biometrics, smart cards or
TPMs, and will showcase advanced applications for digital signatures,
document protection, password management, TPM management and robust
key management.
"Trusted computing is becoming an important security industry
standard for enforcement of advanced security, authentication and data
protection, and it's important that the insurance industry understand
the power of the new hardware security chips now shipping in nearly
every professional-class PC on the market," said Steven Sprague,
president of Wave Systems. "The power of trusted computing may have
widespread impact in the financial and insurance industries, offering
a new level of strong authentication for remote agents that provides a
foundation of trust for electronic transactions."
Wave will demonstrate its Embassy Trust Suite client and server
technology, designed to deliver solutions compliant with the Trusted
Computing Group specifications for trusted computing. Wave's Embassy
Trust Suite adds capabilities for security policy management, data
protection, password management and strong pre-boot authentication.
The benefits of these applications for reducing network security
problems include mitigating password, data and personal information
theft, application security, strong wireless authentication, secure
email and more--all while increasing productivity. The entire solution
is designed to be standards based, interoperable with known business
applications and very easy to deploy and use in an enterprise
environment.
Wave will also be showcasing its eSign Transaction Management
Suite (eTMS), a popular solution for the insurance industry that
enables organizations to manage business processes and transactions
entirely online. eTMS is deigned to automate business policy
compliance and reduces the need for time-consuming and costly
traditional ink signatures and paper storage, or expensive traditional
delivery services. With eTMS, organizations can create, sign, store,
access and manage the lifecycle of legally binding electronic
documents and records.
"Cost savings have driven significant demand for electronic
signatures in the insurance and financial industries, but security and
convenience have been the real barriers to widespread adoption," said
Scott Schrader, president of Wave's eSign Systems. "By leveraging
trusted computing, the new standard in security, we've taken
e-signatures to a new level of confidence which we believe is suitable
for even the largest financial transactions. But we believe that the
real breakthrough Wave's eTMS signing process brings to the table is
intelligent, dynamic transactions that are designed to integrate
requirements and parameters such as document expiration, designation
of signers, transaction specific language, and consumer consent right
into an organizations existing documents and processes."
Wave's eTMS is designed to simplify use of e-signature
applications by customers--eliminating the need for additional plug-in
downloads common in signing applications today. Insurance and
financial services companies can integrate eTMS into existing
applications such as CRM or document management systems to create new
interfaces for signers, so the experience is seamless and appears as
an extension of existing processes and documents. The enhanced signing
capability includes secure authentication processes that can be
customized based on the risk of the transaction. Stronger security
options include signatures based on PKI certificate authentication and
signing, including support for the Trusted Computing Group's Trusted
Platform Module security chip. Wave's eSign Transaction Management
Suite is designed to be integrated into this trusted computing
environment.
Financial services markets, from insurance to mortgage and real
estate, bear different regulatory and compliance requirements. Wave's
eSign Transaction Management Suite allows organizations to deliver
customized solutions by using the modular pieces of the eTMS. The
suite consists of SmartSignature, SmartSignature Server, SmartSAFE,
SmartIdentity(TM) Services, SmartConnect, the SMARTDoc(TM) Mortgage
Banking Module and the Embassy(R) Trust Suite of software solutions.
The eTMS suite is designed to provide the functionality necessary to
meet both technical and legal requirements of transactions (signing
and record retention) governed by ESIGN, UETA, Revised Article 9 of
the UCC, SPeRS and GPEA.
For more information on Wave's eSign Transaction Management Suite,
visit www.eSignSystems.com. For more information on Wave's suite of
trusted computing applications, visit www.Wave.com.
About Wave Systems
Wave to Complete $4.8 Million Stock Offering
--------------------------------------------------------------------------------
Thu May 04 08:27:01 2006 EDT
LEE, Mass., May 04, 2006 (BUSINESS WIRE) --
Wave Systems Corp. (NASDAQ: WAVX), a developer of
trusted computing solutions and services, announced that it has agreed
to sell 6,037,500 shares of its Class A common stock at a price of
$0.80 per share for gross proceeds of $4,830,000. The sale is expected
to be completed on Friday, May 5, 2006. The net proceeds of the
financing - approximately $4.6 million - will be used to fund Wave's
ongoing operations and transition from development stage to commercial
operations.
Steven Sprague, CEO of Wave Systems, commented: "We are pleased to
welcome as shareholders the new institutional investors that
participated in this offering that was priced at Tuesday's closing bid
price. We believe that this offering represents an important step
forward for Wave and reflects the progress we are making in delivering
Trusted Computing solutions to the market."
Security Research Associates acted as placement agent in
connection with the offering. The shares in this offering are being
issued under Wave Systems' $25 million shelf registration statement
which was declared effective by the Securities and Exchange Commission
on January 13, 2006. A prospectus supplement related to the public
offering will be filed with the Securities and Exchange Commission.
This press release shall not constitute an offer to sell or the
solicitation of an offer to buy nor shall there be any sale of these
securities in any state in which such offer, solicitation or sale
would be unlawful prior to registration or qualification under the
securities laws of any such state.
About Security Research Associates
Security Research Associates (SRA) was founded in San Francisco in
1980 and today offers both investment banking and institutional
brokerage services. A boutique firm by design, SRA works with a select
group of portfolio managers from around the country and focuses on
technology and life science companies in the micro and small cap
arenas. For more information, visit www.sracap.com.
Intel Corp. (INTC) introduced a new brand, vPro,
for a set of technologies that are designed to improve the management and
security of desktop computers.
The technologies are expected to be available in the third quarter, and
include features built into a forthcoming microprocessor and into an accessory
product known as a chip set. Pricing was not disclosed.
The big chip maker has been introducing technology platforms, which go beyond
its well-known microprocessors to deliver sets of capabilities for specific
markets. The best-known example is Centrino, a set of chips that were designed
to help improve the battery life of laptop computers and add wireless
networking.
Paul Otellini, Intel's chief executive, said the vPro technology was inspired
by the need of corporate PC users to reduce costs of supporting thousands of
PCs and preventing disruptions by viruses or other security problems. "We think
it's time to reinvent the desktop," he said.
The company said vPro includes an updated version of a feature called Intel
Active Management Technology that can perform management tasks remotely, such
as helping a PC recover from a so-called "blue-screen" system crash. Another
feature is Intel Virtualization Technology, which partitions a computer into
secure zones and user-controlled sections.
Intel plans to work with software vendors, including Symantec Corp. (SYMC),
to load special protection programs into the chip that can filter out packets
of data that have been corrupted by viruses, the company said.
By Don Clark, The Wall Street Journal; 415-765-6115
PRESS RELEASE: Symantec and Intel Collaborate to Change Security Computing Model
--------------------------------------------------------------------------------
Mon Apr 24 13:01:47 2006 EST
CUPERTINO, CA -- (MARKET WIRE) -- 04/24/06 --
Symantec Corp. (NASDAQ: SYMC) today announced it is working with Intel Corp.
to build security solutions for the new Intel(R) vPro(TM) technology that will
allow IT managers to effectively manage security threats outside the main PC
operating system (OS). In this isolated virtual environment embedded within
Intel vPro technology, Symantec's security solutions will be more tamper
resistant and always on, monitoring and protecting the desktop.
In the emerging threat landscape, enterprises face security attacks that are
increasing in complexity, frequency, and malicious intent. Additionally, the
window of time between vulnerability disclosure and exploit is shrinking while
the severity of vulnerabilities is increasing. To make the situation even more
challenging, a new type of modular malicious code is increasingly used to take
advantage of vulnerabilities in the operating system and desktop applications
to disable security software on user systems. The end result is that
enterprises are left more vulnerable when only traditional security protections
in the primary OS are installed on the machine.
"By isolating the computer's protection in a virtual environment outside the
main operating system, enterprises will have confidence that the security
itself has not been compromised, that it is always on, and that they can trust
the result that it gives," said Jeremy Burton, senior vice president of
enterprise security and data management, Symantec. "We believe this new
approach will improve security and reduce the overall cost of administration."
Symantec's solutions for the Intel vPro technology will offer enterprises
several key benefits by taking advantage of the new virtualization capabilities
built into PCs with Intel vPro technology. These capabilities will allow
Symantec to build a tamper-resistant virtual security solution. The security
functionality will operate in a secure environment separate from the user OS,
where it will be unaffected by issues with the user OS. In the event malware is
successful in infecting a desktop environment, the Symantec virtual security
solution will contain the threat on that particular desktop, isolating it from
other network resources. Since this new solution is built specifically for
security and is separate from the primary OS, it offers IT departments a
separate, stable environment fromwhich to protect the desktop from attacks.
"Intel and Symantec are committed to providing customers with the
strongestand most manageable client security available to small, medium and
large businesses," said Robert Crooke, vice president and general manager of
Intel's Business Client Group. "The combination of Intel vPro technology and
Symantec's virtual security solution will provide a new level of control over
malicious attacks, simplify management, and increase confidence in endpoint
security."
Symantec and Intel's collaboration will focus on providing unprecedented next
generation security solutions during the coming years. Together, the two
companies will aim to provide robust security solutions in a way that is cost
effective for IT administrators, yet gives them an appropriate level of control
and helps ensure system and regulatory compliance on desktop PCs.
another presentation -
At the RedChip Small Cap Investor Conference, 30 small cap companies will present their story to the investment community, including (NASDAQ: WAVX), SignaLife ,SuperGEN, and (NASDAQ: YAKC).
April 28, at the Hard Rock Hotel & Casino, in Hollywood, Florida.
To register to attend the conference click here:
http://www.redchip.com/visibility/conferenceMain.asp.
Could also be same day Dell release new models...
fivewood
Wave Systems to Present at Dutton Associates' 'Recognizing Opportunity' SmallCap Conference in San Francisco, March 28th
--------------------------------------------------------------------------------
Fri Mar 17 10:30:06 2006 EST
SAN FRANCISCO & LEE, Mass., Mar 17, 2006 (BUSINESS WIRE) --
Wave Systems Corp. (NASDAQ: WAVX - www.wave.com), a
developer of trusted computing solutions and services, announced today
that it will present at Dutton Associates' "Recognizing Opportunity"
SmallCap Conference on Tuesday, March 28th. The conference will take
place at the St. Regis Hotel in San Francisco, with company
presentations from 8:30 a.m. to 12:25 p.m.
Wave's CEO, Steven Sprague, will make a ten-minute overview
presentation which will be available via webcast at www.jmdutton.com.
His presentation will be followed by a two break-out sessions with
investment professionals in the afternoon. For more conference
information and registration, visit www.jmdutton.com.
About Dutton Associates
Dutton Associates, an international issuer-paid equity research
firm, offers independent, fundamental research on over 120 small cap
public companies. The company's 29 analysts are primarily CFA charter
holders with, on average, over 20 years of experience at the major
securities firms. For more information, visit www.jmdutton.com.
About Wave Systems
Consumers and businesses are demanding a computing environment
that is more trusted, private, safe and secure. Wave is the leader in
delivering trusted computing applications and services with advanced
products, infrastructure and solutions across multiple trusted
platforms from a variety of vendors. Wave holds a portfolio of
significant fundamental patents in security and e-commerce
applications and employs some of the world's leading security systems
architects and engineers. For more information about Wave, visit
http://www.wave.com.
SOURCE: Wave Systems Corp.
Wave Systems Corp.
Gerard T. Feeney, 413-243-1600
info@wavesys.com
or
Jaffoni & Collins
David Collins, Richard Land
212-835-8500
wavx@jcir.com
Risk/Reward
We could dilute another 50% at a lower stock price.
We may not get meaningful enterprise upgrades til 2007.
But run the numbers, and even if the 2 above lines are true, this investment currently presents the greatest risk/reward prospect that we are likely to ever see.
That's good enough for me.
fivewood
ETS Lite - crude question.
Is there a possibility that the Lite version would have to be upgraded or renewed by customers annually ?
I am sure that most of my pre-installed software has prompted me to cough up some cash after a year or so in order to continue to get any updates at all.
So could even the Lite version after its initial 50c bring in $19.95 + over following years.
Someone shoot me down.
fivewood
If we're as close as it appears to a meaningful breakthrough in revenue (maybe 2 or 3 quarters ?) wouldn't it now be actually prudent to take a loan rather than dilute again ?
fivewood
Wave Systems to Demonstrate TNC Network Integrity Access Control with Juniper Networks; RSA Conference Network Access Control Demonstrations Showcase Platform Trust Service Using Trusted Network Connect Architecture
--------------------------------------------------------------------------------
Fri Feb 10 05:43:01 2006 EST
LEE, Mass. & SAN JOSE, Calif., Feb 10, 2006 (BUSINESS WIRE) --
Wave Systems Corp. (Nasdaq: WAVX, www.wave.com) announced
that it will demonstrate network integrity access control capabilities
using the industry standard Trusted Network Connect (TNC)
architecture. TNC architecture is designed to deliver significantly
strengthened network integrity. This demonstration, featuring Wave's
Embassy(R) Trust Suite software products working with Juniper Networks
L2 access control solution, will be conducted at the RSA Conference
2006, Booth 1407, Monday, Feb. 13 through Friday, Feb. 17 at the
McEnery Convention Center, San Jose, CA.
TNC is a security architecture standard promoted by the Trusted
Computing Group (TCG) designed to help improve the security and
compliance integrity of clients during the network connection process.
The TNC establishes a level of network access based on the
configuration and integrity of the client. Network administrators
implementing the TNC expect to have fewer security problems, lower
support costs and less downtime caused by poorly configured or
infected client systems.
The TNC standard was developed by a TCG subgroup of more than 60
networking and technology industry companies representing client and
network security; switches, routers, and hubs; systems and systems
management; and operating systems.
At RSA, Wave is demonstrating its Embassy secure software
technology by delivering platform integrity services on a PC equipped
with a Trusted Platform Module (TPM). The Embassy technology platform
is designed to support hardware security features provided by TPM
security chips currently shipping in millions of personal computers.
In the case of platform trust services, Embassy technology, using
a TPM, enforces a set of policies to collect integrity information
from the PC, such as the state of anti-virus software, whether the
operating system has been tampered with, or whether all appropriate
patches have been downloaded to the client. The Embassy platform
provides these client functions in concert with IT department policies
which can be set through network equipment and software from Juniper
Networks. Clients not meeting the pre-determined policies, such as
those for patch levels, can be quarantined for remediation, repaired,
and then allowed access to the network.
"The TNC standard leverages existing network infrastructure to
deliver secure and cost-effective, best-in-class access control
solutions. Adding TPM support to the client component of the system is
a natural extension of the solutions' ability to control use and
protect enterprises from non-compliant or malware-infected machines,"
said Andrew Harding, director of product management at Juniper
Networks, Inc. "Juniper Networks is showing the interaction between
Wave's Embassy Trust Suite software products and Juniper Networks'
Layer 2 access control technology, demonstrating how standards-based
systems can provide complete, seamless trusted computing and access
control."
"It is exciting to see Wave Systems releasing an implementation of
the Platform Trust Services (PTS) standard from the TCG, since PTS is
an essential piece of the trusted computing ecosystem," said Dr.
Thomas Hardjono, co-chair of the TCG Infrastructure Working Group.
"The PTS is designed to work on a broad range of platforms, including
the PC-Client platform, Server platform, Mobile Phone platform, and
the Network platform. Wave has clearly shown their leadership in the
trusted computing technology space."
"The platform integrity feature available with Wave's Embassy
technology is one of the industry's first solutions designed to
provide TNC products with the strong authentication capabilities of a
TPM," said Brian Berger, Wave's executive vice president, marketing
and sales. "Embassy delivers key identity capabilities for the network
authentication of users and machines as well as important integrity
capabilities for the collection of data necessary to determine the
health of a particular PC prior to network access."
The Embassy Trust Suite and the Embassy Enterprise Authentication
Server deliver improved trusted computing features for enterprise and
government markets. These features include network policy management,
data protection, biometric authentication, smart card authentication,
password authentication and machine authentication of a user's
personal computer to a server.
For more information about Wave's products and services, please go
to www.wave.com.
About Wave Systems
Consumers and businesses are demanding a computing environment
that is more trusted, private, safe and secure. Wave is the leader in
delivering trusted computing applications and services with advanced
products, infrastructure and solutions across multiple trusted
platforms from a variety of vendors. Wave holds a portfolio of
significant fundamental patents in security and e-commerce
applications and employs some of the world's leading security systems
architects and engineers. For more information about Wave, visit
http://www.wave.com.
old Softie stuff, but i hadn't seen before...
Microsoft Applications Using Longhorn TPM Services
The initial release of Longhorn will include three applications that take advantage of the TBS and the Microsoft TPM driver: Secure Startup, TPM Administration Tools, and the Key Storage Provider (KSP).
Secure Startup
Secure Startup is designed to utilize the TPM to protect the integrity of the Windows partition (and any other data, applications, DLLs, and files stored in that partition) and only release access to the protected data/partition after the veracity of the booting operating system has been established.
Secure Startup communicates with the TPM in the early phases of booting the operating system through a TCG-compliant BIOS and the TPM driver.
TPM Administration Tools
Microsoft is providing a Windows Management Instrumentation (WMI) interface that encapsulates the common TPM administration tasks. Using this interface, administrators can locally or remotely administer machines using provided scripts or develop custom scripts to suit the enterprise environment.
An important aspect of TPM administration is to enable the enterprise to opt-in to TPM technology in large deployments, yet give administrators the tools to control the exposure of personally identifying information (PII) with high granularity. Microsoft is providing a mechanism within Group Policy for administrators to curtail the use of TPM commands that might reveal privacy-related data about a user or workstation. The IT administrator will be able to disable certain PII-revealing commands or specify on a per-command basis which TPM operations are not allowed on workstations in a given organizational unit.
Key Storage Provider
The KSP is a plug-in for Microsoft’s Crypto Next-Generation (CNG) Key Storage Provider (KSP) Framework. The KSP is intended for applications that use the TPM to generate private keys and do basic encryption and signing. The KSP uses a single-level key hierarchy and stores keys in the application profile and user profile directories, to which access is appropriately controlled. Microsoft is evaluating methods through CNG extensions or system policy to turn on sealing to specific Platform Configuration Registers (PCRs) when using CNG to encrypt data. CNG strong key protection is supported by the TPM KSP, with the hash of the supplied password being used as the key usage authorization on the TPM key.
Implementing Applications that use Longhorn TPM Services
Software vendors who are developing new applications for TPM 1.2 in Longhorn can do either of the following:
• Write code using the Trusted Service Provider (TSP) layer of a v1.2-compliant TSS that has been built upon the TBS
• Access TPM functionality through the administration WMI interface or the KSP through the CNG interface.
Porting Existing Applications to Use TPM Services in Longhorn
Microsoft has no current plan to develop a v1.2-compliant TSS for Longhorn. Instead, Microsoft is working with TSS vendors to create TSS products that interface properly with the TBS infrastructure. This involves porting the lower portions of the TCG Core Services (TCS) component to call the TBS interface, instead of calling the TCG Device Driver Library (TDDL) component of the TSS.
Porting an existing application may or may not require changes, depending on the version of the TSS the application was designed to support.
http://download.microsoft.com/download/5/D/6/5D6EAF2B-7DDF-476B-93DC-7CF0072878E6/TPM.doc
fivewood
Windows Vista Beta 2 Trusted Platform Module Services Step-by-Step Guide
http://download.microsoft.com/download/3/b/a/3ba6d659-6e39-4cd7-b3a2-9c96482f5353/Trusted%20Platform...
fivewood
WAVX coverage www.MarketGainer.com: Market Gainer Releases Coverage for Wave Systems Corporation
--------------------------------------------------------------------------------
Tue Jan 10 14:25:57 2006 EST
Jan 10, 2006 (M2 PRESSWIRE via COMTEX) --
Market Gainer strives to find dynamic issues that are unknown but
because of their technology, approach, executive team, recent
discoveries or other key factors, could advance in the market. Now
available is Market Gainer's very own in-site blog; see below for
details. Market Gainer has identified the following company based on
these criteria.
Wave Systems Corp. (NASDAQ:WAVX), is a development stage company that
engages in the development, production, and marketing of products for
hardware-based digital security in the United States.
Today's chart for Wave Systems reflected a 5.88% rise alongside an
announcement from the Company regarding expected participation in the
new U.S. General Services Administration. Shares traded at 72 cents, up
4 cents from yesterday's close of 68 cents. This brings the shares back
to last week's high and parallel to December's high. August prices
stood at $1.20 and have been declining since then, so today's lift is
likely to be well received.
The announcement today explained that Wave is teaming with Operational
Research Consultants, Inc. where Wave expects ORC to provide federal
government authorized Access Certificates for Electronic Services
(ACES) capability, in combination with Wave's Embassy Trust Suite
secure software technology for use with compliant public key
infrastructures. The terms upon which Wave will participate in the
project are subject to the completion of a subcontract between Wave and
ORC.
The news release today stated that ORC, a wholly owned subsidiary of
WidePoint Corporation, has been awarded a Blanket Purchase Agreement
(BPA) issued under the new U.S. General Services Administration. The
BPA recognizes ORC as a fully operational ACES and Shared Services
Provider (SSP) as well as a provider of Homeland Security Presidential
Directive (HSPD-12) products and services. As well, the BPA recognizes
the ORC team as the only provider of Personnel Identity Verification
(PIV) ready solutions for HSPD-12 products and services. The ORC ACES
BPA is an indefinite delivery/ indefinite quantity (ID/IQ) program that
has total ceiling value of $100 million.
The ORC and Wave liaison is designed to offer HSPD-12 ready solutions
for both logical and physical security. "ORC is working with Wave to
make trusted computing solutions embedded with External Certificate
Authority (ECA) and ACES digital certificates available to all branches
of government," stated Daniel Turissini, President of ORC. Continuing,
he said, "The combination of Wave's Embassy software technology
integrated with ORC's Trusted Third Party services provides another
tool to ensure high levels of.......
To view the full Market Gainer report on Wave Systems Corporation,
please visit www.marketgainer.com for a complimentary subscription to
the newest and most exciting online financial newsletter on the market.
This article is available for viewing in the Featured Article section
of our website. No Credit Card information needed.
New to the Market Gainer's website is our very own in-site blog,
offering our subscribers the opportunity to communicate with fellow
investors without all the spam found in other investment blogs. Click
on talking stocks after you subscribe to join, and enhance your
investment knowledge and community.
The Financial Information and Financial Content provided by
Marketgainer.com is for informational purposes only and should not be
used or construed as an offer to sell, a solicitation of an offer to
buy, or endorsement, recommendations, or sponsorship of any company or
security by Marketgainer.com. You acknowledge and agree that any
request for information is unsolicited and shall neither constitute nor
be construed as investment advice by Marketgainer.com to you. It is
strongly recommended that you seek outside advice from a qualified
securities professional prior to making any securities investment.
Marketgainer.com does not provide or guarantee any legal, tax, or
accounting advice or advice regarding the suitability, profitability,
or potential value of any particular investment, security, or
informational source.
All material herein was prepared by based upon information believed to
be reliable. The information contained herein is not guaranteed by
Market Gainer to be accurate, and should not be considered to be
all-inclusive. The companies that are discussed in this opinion have
not approved the statements made in this opinion. This opinion contains
forward-looking statements that involve risks and uncertainties. This
material is for informational purposes only and should not be construed
as an offer or solicitation of an offer to buy or sell securities.
Market Gainer is not a licensed broker, broker dealer, market maker,
investment banker, investment advisor, analyst or underwriter. Please
consult a broker before purchasing or selling any securities viewed on
or mentioned herein.
This release contains "forward-looking statements" within the meaning
of Section 27A of the Securities Act of 1933, as amended, and Section
21E the Securities Exchange Act of 1934, as amended and such
forward-looking statements are made pursuant to the safe harbor
provisions of the Private Securities Litigation Reform Act of 1995.
"Forward-looking statements" describe future expectations, plans,
results, or strategies and are generally preceded by words such as
"may", "future", "plan" or "planned", "will" or "should", "expected,"
"anticipates", "draft", "eventually" or "projected". You are cautioned
that such statements are subject to a multitude of risks and
uncertainties that could cause future circumstances, events, or results
to differ materially from those projected in the forward-looking
statements, including the risks that actual results may differ
materially from those projected in the forward-looking statements as a
result of various factors, and other risks identified in a companies'
annual report on Form 10-K or 10-KSB and other filings made by such
company with the Securities and Exchange Commission.
M2 Communications Ltd disclaims all liability for information
provided within M2 PressWIRE. Data supplied by named party/parties.
Further information on M2 PressWIRE can be obtained at
http://www.presswire.net on the world wide web. Inquiries to
info@m2.com.
(C)1994-2006 M2 COMMUNICATIONS LTD
Wave Systems on Winning Team with Operational Research Consultants, Inc. for U.S. GSA Blanket Purchase Agreement Award
--------------------------------------------------------------------------------
Tue Jan 10 08:57:01 2006 EST
LEE, Mass., Jan 10, 2006 (BUSINESS WIRE) --
Wave Systems Corp. (Nasdaq: WAVX - www.wave.com)
announced today that the company is teamed with Operational Research
Consultants, Inc. (ORC), a wholly owned subsidiary of WidePoint
Corporation (OTC BB: WDPT), in connection with the first Blanket
Purchase Agreement award issued under the new U.S. General Services
Administration (GSA) "Authentication Products and Services" Category
Special Item No. (SIN) 160 32, part of existing IT Schedule 70 (the
"ORC ACES BPA"). The ORC ACES BPA is an indefinite delivery/
indefinite quantity (ID/IQ) program that has total ceiling value of
$100 million.
Under the BPA award ORC will provide certified credentialing for
identity management solutions to federal, state and local governments.
In connection with an agreement between ORC and Wave, Wave expects ORC
to provide federal government authorized Access Certificates for
Electronic Services (ACES) capability, in combination with Wave's
Embassy(R) Trust Suite secure software technology for use with
compliant public key infrastructures. The terms upon which Wave will
participate in the project are subject to the completion of a
subcontract to be entered into between Wave and ORC.
The BPA recognizes ORC as a fully operational ACES and Shared
Services Provider (SSP) as well as a provider of Homeland Security
Presidential Directive (HSPD-12) products and services. Further, the
BPA also recognizes the ORC team as the only provider of Personnel
Identity Verification (PIV) ready solutions for HSPD-12 products and
services. The combined products of ORC and Wave offer HSPD-12 ready
solutions for both "logical" and "physical" security.
"ORC is working with Wave to make trusted computing solutions
embedded with External Certificate Authority (ECA) and ACES digital
certificates available to all branches of government," said Daniel
Turissini, president of ORC. "The combination of Wave's Embassy
software technology integrated with ORC's Trusted Third Party services
provides another tool to ensure high levels of Information Assurance
technologies in the ongoing efforts to protect personal information
within the federal government."
"Authenticating a computer user into a network by using methods
more secure than passwords is a continuing effort for network
administrators within government and enterprises," said Steven
Sprague, president and CEO, Wave Systems. "With the ORC ACES BPA,
government administrators will now have easy access to Class 3 PKI
certificates that can be used within a Trusted Computing-based
framework: a network of personal computers secured by industry
standard Trusted Platform Modules and Wave's powerful and secure
software technology."
Safe Harbor for Forward-Looking Statements
Except for the statements of historical fact, the information
presented herein constitutes forward-looking statements within the
meaning of the Private Securities Litigation Reform Act of 1995. Such
forward-looking statements involve known and unknown risks,
uncertainties and other factors which may cause the actual results,
performance or achievements of the company to be materially different
from any future results, performance or achievements expressed or
implied by such forward-looking statements. Such factors include
general economic and business conditions, the ability to fund
operations, the ability to forge partnerships required for deployment,
changes in consumer and corporate buying habits, chip development and
production, the rapid pace of change in the technology industry and
other factors over which Wave Systems Corp. has little or no control.
Wave Systems assumes no obligation to publicly update or revise any
forward-looking statements.
All brands are the property of their respective owners
SOURCE: Wave Systems Corp.
Wave Systems
John Callahan, 413-243-7029
jcallahan@wavesys.com
or
Jaffoni & Collins
David Collins, 212-835-8500
wavx@jcir.com
DJ Dir Buys 20,000 Of WAVE SYSTEMS CORP >WAVX
--------------------------------------------------------------------------------
Fri Dec 23 14:02:11 2005 EST
SOURCE: Form 4
ISSUER: WAVE SYSTEMS CORP
SYMBOL: WAVX
FILER: GILDER GEORGE
TITLE: Director
DATE TRANSACTION SHARES PRICE VALUE
12/19/05 Purchase 20,000 $0.71 $14,176
OWNERSHIP: 49,000 (Direct)
The Form 4 is filed with the Securities and Exchange Commission by insiders
to report transactions in their companies' shares. Open market purchases
and sales must be reported within two business days of the transaction.
Insider Data Source: The Washington Service
(info@washingtonservice.com or 301-913-5100)
(END) Dow Jones Newswires
The Intel Wireless Trusted Platform with the Certicom Security Architecture software is an example of an embedded TPM derivative that allows such reuse. The TPM is built directly into mobile processors. Combining TPM functionality with secure boot on certain models of the Intel PXA27x product line of network processors, the combination provides a protected execution environment that supports the processing of secrets. It further provides secure key storage and protection, and hardware acceleration that complement the trusted boot process. The combination is also modular, allowing developers to plug in additional functionality that utilizes the same core security architecture for security services such as SSL, IPSec, PKI, DRM, and more.
The Certicom Security Architecture is a modular security firmware platform that allows developers to add security to their devices, and allows ISVs to embed security in software that will leverage the trusted platform. The software supports the Intel Wireless Trusted Platform and permits evolution from legacy crypto such as RSA to ECC (elliptic curve cryptography), which is increasingly cited in standards and specifications as the preferred algorithm for public-key (asymmetric) cryptography. The hardware and software work together to enable DRM in embedded devices. Once the secure boot process authenticates the hardware platform and the Security Architecture authentication module, the module can run applications such as DRM, allowing users to request rights-managed content.
Using the Security Architecture, a DRM agent seals the encryption key of the Rights Object (the rules for the content use) and binds it to the platform’s hardware root of trust. The AES key passes into the silicon through the Intel Wireless Trusted Platform, which wraps and returns the key. (Figure 2) After the wrapped key returns, the system can decrypt and use content, but only on that device. There is no need to lock the encrypted content to the device, because without access to the Rights Object, another user cannot play the content. This mechanism allows users to share content files through use of high speed Bluetooth, WiFi or wired Internet, but still requires them to connect to the content server to purchase access to the content.
Figure 2 -- Once a system has booted, accessing content requires the decoding of a key using information stored in secure hardware, then using the key to decrypt the content. Content files may be shared, but keys are bound to specific pieces of hardware.
An Embedded Trust Services (ETS) module in the Security Architecture provides authorization, secure storage of certificates, keys and BLOBs (binary large objects), as well as access to hardware security functions such as hardware key-ring and key-wrapping services. The ETS API includes software emulation of hardware facilities so that an application engineer can code to one interface then reuse that work as often as needed.
The built-in hardware crypto acceleration and key management features of this architecture facilitate the building of a trusted hardware platform. Secure boot support and support for cryptographic functions create the trusted runtime environment, on top of which sits the cryptographic functions. The software makes use of a common API that takes advantage of Intel silicon and performance primitives. Once developers know the API they can use it across all models of the chipset family.
Developers facing the challenge of securing embedded devices -- to provide the most comprehensive and robust digital rights management services possible -- will find it essential to start from a trusted platform. Ultimately, if code at the most fundamental level is vulnerable to attack then the entire device is vulnerable to attack. This vulnerability risks everything from financial losses to personal or even public safety, depending on the applications involved. While it is possible for developers to create their own custom trusted platforms, such effort is time-consuming and costly -- especially when there are off-the-shelf solutions that offer full security, reliability and ease of maintenance. The value of off-the-shelf options is particularly great for manufacturers who don’t have public-key and security expertise as core in-house strengths.
http://www.windowsfordevices.com/articles/AT2597271496.html
About the author: Tony Walters is a director at Certicom Corp., a developer of security software for embedded systems
DJ Wave Systems (WAVX) Mkt On Open Buy Imbalance: Shrs 100295
www.MarketGainer.com: Market Gainer Initiates Coverage for Wave Systems Corporation
--------------------------------------------------------------------------------
Mon Dec 05 13:38:34 2005 EST
Dec 05, 2005 (M2 PRESSWIRE via COMTEX) --
Market Gainer, the fastest growing online financial newsletter, focuses
on identifying companies that for various reasons have not performed
well. These companies could be trading down on the day but the decrease
in share price may not necessarily make them a poor prospect for
investment. In many instances the fundamentals of a company could still
be solid.
Market Gainer seeks to inform its subscribers of the details
surrounding the decrease in value of Wave Systems Corporation
(NASDAQ:WAVX). This Company is a development stage company, engages in
the development, production, and marketing of products for
hardware-based digital security in the United States.
Company shares of Wave Systems Corporation fell an ever so slight 8
percent today in trading. Dropping a faint $0.07 from the previous
close of $0.79, the current share price resides at $0.72. Shares are
trading in good numbers as 400,000 shares changed hands today. Looking
back at past results in previous months, shares of Wave Systems were at
the $1.00 range back in September. A slow decline in value began to
occur as October and November stood witness to value bouncing back and
forth between $0.80 and $0.90. In late November the share price fell to
$0.70, before regaining its position and working its way back to the
$0.80 mark of today. Today trading continues and is coupled with news
of a hopeful future.
Wave Systems Corporation announced today that it has agreed upon an
issuance of $3.5 million of its Class A common stock to accredited
investors. Pursuant to the financing, Wave Systems has agreed to sell
5,982,905 shares of Class A common stock at a price of $0.585 per share
as well as warrants to purchase 1,093,750 shares of the company's
common stock within six months at an exercise price of $0.80 per share.
If exercised in their entirety, the warrants would generate an
additional $875,000 in gross proceeds to Wave. The transaction is
anticipated to close today and is intended to fund Wave Systems'
ongoing operations and general corporate overhead. The transaction is
being done under Wave Systems' $25 million shelf registration statement
which was declared effective by the Securities and Exchange Commission
on May 10, 2004.
Consumers and businesses are demanding............
To view the full Market Gainer report, on Wave Systems Incorporated
please visit www.marketgainer.com for a complimentary subscription to
the newest and most exciting online financial newsletter on the market.
No Credit Card information needed.
The Financial Information and Financial Content provided by
Marketgainer.com is for informational purposes only and should not be
used or construed as an offer to sell, a solicitation of an offer to
buy, or endorsement, recommendations, or sponsorship of any company or
security by Marketgainer.com. You acknowledge and agree that any
request for information is unsolicited and shall neither constitute nor
be construed as investment advice by Marketgainer.com to you. It is
strongly recommended that you seek outside advice from a qualified
securities professional prior to making any securities investment.
Marketgainer.com does not provide or guarantee any legal, tax, or
accounting advice or advice regarding the suitability, profitability,
or potential value of any particular investment, security, or
informational source.
All material herein was prepared by based upon information believed to
be reliable. The information contained herein is not guaranteed by
Market Gainer to be accurate, and should not be considered to be
all-inclusive. The companies that are discussed in this opinion have
not approved the statements made in this opinion. This opinion contains
forward-looking statements that involve risks and uncertainties. This
material is for informational purposes only and should not be construed
as an offer or solicitation of an offer to buy or sell securities.
Market Gainer is not a licensed broker, broker dealer, market maker,
investment banker, investment advisor, analyst or underwriter. Please
consult a broker before purchasing or selling any securities viewed on
or mentioned herein.
This release contains "forward-looking statements" within the meaning
of Section 27A of the Securities Act of 1933, as amended, and Section
21E the Securities Exchange Act of 1934, as amended and such
forward-looking statements are made pursuant to the safe harbor
provisions of the Private Securities Litigation Reform Act of 1995.
"Forward-looking statements" describe future expectations, plans,
results, or strategies and are generally preceded by words such as
"may", "future", "plan" or "planned", "will" or "should", "expected,"
"anticipates", "draft", "eventually" or "projected". You are cautioned
that such statements are subject to a multitude of risks and
uncertainties that could cause future circumstances, events, or results
to differ materially from those projected in the forward-looking
statements, including the risks that actual results may differ
materially from those projected in the forward-looking statements as a
result of various factors, and other risks identified in a companies'
annual report on Form 10-K or 10-KSB and other filings made by such
company with the Securities and Exchange Commission.
M2 Communications Ltd disclaims all liability for information
provided within M2 PressWIRE. Data supplied by named party/parties.
Further information on M2 PressWIRE can be obtained at
http://www.presswire.net on the world wide web. Inquiries to
info@m2.com.
(C)1994-2005 M2 COMMUNICATIONS LTD
Viiv and Tivo
TiVo and Intel Working Together on Digital Home Initiatives
Wed Nov 30 11:30:14 2005 EST
ALVISO, Calif., Nov. 30 /PRNewswire-FirstCall/ -- TiVo Inc. (Nasdaq: TIVO),
creator of and a leader in television services for digital video recorders,
announced today that it is working with Intel to develop functionality in a
TiVo application that will enable it to work with Intel Viiv technology to pave
the way for a dramatic change in the way entertainment is consumed at home or
on the go.
This new application will further extend TiVo's groundbreaking TiVoToGo(TM)
features. It will allow existing TiVo subscribers to securely transfer their
favorite television programs from their TiVo(R) Series2(TM) DVR to an Intel
Viiv technology based PC using only the remote control. The application will
also allow any content downloaded from a TiVo DVR to an Intel Viiv technology
enabled device to be securely played back on certain compliant media adapters,
which will be supported in a future planned release of the application. This
application will be available in the first half of next year.
"Combining Intel's breakthrough technology with TiVo's award-winning user
experience will give consumers more of the control they are looking for," said
Tom Rogers, CEO, TiVo Inc. "When it comes to digital entertainment in the
living room and beyond, consumers deserve the ease of use they've come to
expect from TiVo. We're thrilled to be working on this important initiative
with Intel."
"We are excited to be working with TiVo on the application for the Intel Viiv
technology platform," said Kevin Corbett, vice president and general manager,
Content Services Group, Intel Digital Home Group. "Together with companies like
TiVo, Intel is working to bring powerful new connected entertainment
experiences to the home where consumers can more easily personalize, manage and
enjoy their entertainment experience with Intel Viiv technology."
"Today's announcement with Intel is another example of our commitment to
continually enhance and update our service and extend the TiVo experience
throughout the home," said Jim Denney, Vice President of Product Marketing at
TiVo. "This new application will allow our users to control their favorite
TiVo recordings even more easily so they can watch what they want, where they
want."
fivewood
WAVX: Q3 Earnings Call @ 16:30 ET Today [delayed]
--------------------------------------------------------------------------------
Wed Nov 09 13:53:14 2005 EST
Ridgeland, MS, NOV 09, 2005 (EventX/Knobias.com via COMTEX) --
Wave Systems Corporation CL A (NasdaqNM: WAVX) will host a webcast/conference call reviewing recent corporate and industry progress as well as Wave's results for the third quarter ended September 30, 2005 on Wednesday, November 9th at 4:30 P.M. EST.
Wave's results will be issued after the market's close.
WEBCAST/REPLAY: available at http://www.wave.com and archived for 30 days.
TELEPHONE: via 212-676-4900 or 415-537-1988. Please call five minutes in advance.
Misc Releated Info:
** Original Confirmation
GET KNOBIAS IN REAL-TIME: Delivery of this proprietary Knobias alert has been delayed by at least 10 minutes. To get all Knobias alerts in real-time daily, visit http://www.knobias.com/cmtx
ABOUT KNOBIAS: Knobias is a premier financial information provider of trading and investing data covering all U.S. equities for investors and security professionals. Knobias is best described by its three major components: Real-time desktop applications providing quotes, charts, level 2, analysis etc.; Knobias RAiDAR providing thousands of real-time news stories, alerts and documents daily; Knobias fundamentals providing a comprehensive database of fundamental research information.
Knobias.com, LLC
601-978-3399
601-978-3675
info@knobias.com
www.knobias.com/cmtx
Copyright 2004 Knobias.com, LLC, All rights reserved.
CSI in DC Nov 14th - apologies if posted
https://www.cmpevents.com/CSI32/a.asp?option=G&V=3&id=399400
Session:
[IAM-4] Trusted Computing: Empowering Computers to Protect Themselves
Speaker: Steven Sprague (President & CEO, Wave Systems Corp.)
Time/Date: Monday (November 14, 2005) 4:45pm — 5:45pm
Track: Identity & Access Management
Presentation Format: 75-minute Session
Audience level: Intermediate
Presentation Abstract
If you lost your laptop or PDA, would you trust it to secure itself? Tens of millions of new “Trusted Computers” can now do just that…securing themselves thanks to a revolutionary new hardware security chip. More than 100 vendors making up the Trusted Computing Group (Dell, Microsoft, Intel, Sony, Wave Systems and more) have created a hardware standard for ensuring data protection and security of computing devices. In this presentation you will learn key concepts of the Trusted Computing architecture and its implementation.
fivewood
InfoSec NY - apologies if posted
http://www.infosecurityevent.com/App/Homepage.cfm?linkid=2221&moduleid=331&sesAction=session...
Title: T1: Trusted Computing Group: Stopping Attacks on Your Corporate Assets: A Seminar on Protecting Data, Systems and the Network
Date: Tuesday, December 6, 2005
Start Time: 9:00am
End Time: 1:00pm
Description: Wave after wave of attacks have made data, systems and the network more vulnerable than ever. IT managers and network administrators are struggling to protect these assets while maintaining maximum workforce productivity and keeping budgets in check. What can be done NOW to keep hackers and others from getting in and taking over? Trusted platforms can help. This session will address the definition and role of trusted platforms and how they can help prevent viruses, malware and other attacks. Experts in networking will review the role of endpoint integrity and access control and new ways to prevent unauthorized users and attacks from entering your network. The protection of data in trusted drives and protecting data moving from systems to peripherals will be discussed. And real examples of these systems and applications in operation will be shown. Demonstrations of applications and systems also will be available.
Speaker(s): Kerry Maletsky - Business Unit Director, North American ASIC and ASSP Companies - Atmel
Michael Willett - Research Staff, Seagate Technology and Chair - Privacy Framework Project of the Internat'l Security, Trust and Privacy Alliance
Stephen Sprague - President and CEO - Wave Systems
Shab Madina - Product Marketing Manager - Hewlett-Packard
Stacy Cannady, CISSP - Senior Consultant and Product Manager for Client Security - Lenovo
John Vollbrecht - Senior Technical Consultant - Meetinghouse Data Communications
fivewood
here it is - DJ Wave Systems Gets NasdaQ Notice On Listing Rule
Mon Oct 31 16:43:22 2005 EST
Wavexpress Broadband Video Entertainment Services to Include Internet Syndicated Content for Windows XP Media Center Edition 2005; Wavexpress to Offer Media Center Users Automatically Updated RSS Channels
--------------------------------------------------------------------------------
Fri Oct 14 11:45:01 2005 EST
NEW YORK, Oct 14, 2005 (BUSINESS WIRE) --
Wavexpress, Inc. today announced version 3.0 of its
TVTonic broadband video entertainment service for PCs running
Microsoft Windows XP Media Center 2005. Wavexpress TVTonic gives Media
Center PC users access to high quality cached video delivered through
the Internet. Now with version 3.0, users can subscribe to any video
feed publicly syndicated through the popular RSS format.
Wavexpress TVTonic is available via the Microsoft Windows XP Media
Center Edition 2005 Online Spotlight feature. Online Spotlight is an
on-demand component of Media Center that provides a convenient,
central location where consumers can discover and enjoy the latest
online services and software designed for Windows XP Media Center
Edition.
Wavexpress specializes in delivering high-quality internet media
services. The company builds and operates a subscription management
system for media services as well as a media distribution network. The
company is majority-owned by Wave Systems Corp. (NASDAQ:WAVX), a
leader in trusted computing.
Wavexpress TVTonic makes a true television viewing experience out
of broadband video content. Users select content from an on-screen
guide and TVTonic takes it from there: fetching new content when
available and formatting the content into a familiar experience
designed to be watched from the couch with a remote. Wavexpress offers
a number of DVD-quality channels including movie trailers, music
videos, news and more.
The latest enhancement to the Wavexpress TVTonic service is for
the inclusion of RSS (Really Simple Syndication) content. RSS is a
popular Internet XML format designed for sharing headlines and
syndicating other web content, such as news, community sites and
personal weblogs. RSS is the syndication format behind podcasting and
is used by an ever-growing number of video bloggers. Through RSS,
users can subscribe to video feeds from thousands of publishers, large
and small.
"Windows Media Center Edition 2005 is a great platform for
entertainment services. The flexibility it provides has allowed us to
fully realize a television experience for Internet content," said
Michael Sprague, president, Wavexpress. "Media Center users can now
get the content they want, the way they want it."
"We've heard from our customers that they want quick and easy
access to a wide range of on-demand digital entertainment content
through their Media Center PCs," said Dave Mendlen, director of
Windows Consumer Marketing at Microsoft Corp. "Wavexpress' RSS
capability offers customers the flexibility they want to customize
their entertainment and enjoy a broad range of digital entertainment
options."
TVTonic 3.0 for Windows XP Media Center Edition 2005 Update Rollup
2 is now available for download from http://www.tvtonic.com.
More information about Wavexpress products and services is
available from http://www.wavexpress.com.
About Wavexpress
Wavexpress enables secure broadband distribution of premium
digital content. The company delivers full-screen, DVD-quality video,
games, music and software. Wavexpress supports a variety of business
models, including subscription, pay-per-view, and advertising
services.
About Wave Systems
Consumers and businesses are demanding a computing environment
that is more trusted, private, safe, and secure. Wave is the leader in
delivering trusted computing applications and services with advanced
products, infrastructure and solutions across multiple trusted
platforms from a variety of vendors. Wave holds a portfolio of
significant fundamental patents in security and e-commerce
applications and employs some of the world's leading security systems
architects and engineers. For more information about Wave, visit
http://www.wave.com.
Safe Harbor for Forward-Looking Statements
Except for the statements of historical fact, the information
presented herein constitutes forward-looking statements within the
meaning of the Private Securities Litigation Reform Act of 1995. Such
forward-looking statements involve known and unknown risks,
uncertainties and other factors which may cause the actual results,
performance or achievements of the company to be materially different
from any future results, performance or achievements expressed or
implied by such forward-looking statements. Such factors include
general economic and business conditions, the ability to fund
operations, the ability to forge partnerships required for deployment,
changes in consumer and corporate buying habits, chip development and
production, the rapid pace of change in the technology industry and
other factors over which Wave Systems Corp. has little or no control.
Wave Systems assumes no obligation to publicly update or revise any
forward-looking statements.
All product and company names herein may be trademarks of their
registered owners.
SOURCE: Wavexpress, Inc.
Wavexpress, Inc.
John Callahan, 413-243-7029
jcallahan@wavesys.com
WSJ:Gates Sees `Big Wave' In 06 Software Sales On New Pdts
headline gave me a chuckle...
and just wait til you see the bolds...
By Robert A. Guth
Of THE WALL STREET JOURNAL
LOS ANGELES (Dow Jones)--Microsoft Corp. (MSFT) previewed the next versions
of its Windows and Office programs, ahead of a stream of new products the
company is betting will help spur growth of the broader personal computer
industry.
The demonstrations, at a Microsoft-sponsored event here, are designed to drum
up support among other software makers, whose support is crucial to Microsoft's
success.
(This story and related background material will be available on The Wall
Street Journal Web site, WSJ.com.)
Microsoft Chairman Bill Gates predicted that the company's work on new
products will usher in "a big wave in 2006" of software sales. "We want to make
sure you're ready for the wave," Gates told attendees.
The Redmond, Wash., company provided the first public demonstration of the
Office 12 suite of business productivity applications, due next year. It also
disclosed new details about the forthcoming Windows Vista operating system and
new plans to help spur sales for the company and its partners, including a $100
million program to market application programs based on Windows Vista.
Microsoft depends heavily on popularizing its products as a foundation for
other companies' software. Maintaining loyalty among those companies becomes
increasingly important as competition from Internet services, open-source
software and other rivals threatens to make Microsoft a less essential partner
for some software makers.
The company said Tuesday that 30 software makers have said they will create
new software applications for the long-delayed Windows Vista, which the company
expects to introduce in the second half of 2005. The $100 million marketing
fund for Vista-based applications will be part of what Gates described as "the
largest marketing activity that we've ever had" to promote Windows next year.
Microsoft also announced an online marketplace called Digital Locker, which
is designed to help smaller software makers sell their products.
In the first public showing of Office 12, Gates demonstrated the software's
redesigned interface - the design of what users see and manipulate on a PC
screen. The interface, like that of Vista, includes representations of files
that appear three-dimensional, as well as windows that are translucent to allow
users to see underlying objects.
One goal, Microsoft executives said, is to help users more easily locate
existing features in Word, Excel and the other programs that comprise Office -
which is sometimes criticized for being so full of features that users can't
find them all.
Microsoft also said it will start providing test versions of Windows Vista to
software makers more frequently in the past, a move that's designed to both
give Microsoft more frequent feedback and keep software makers more informed on
changes in the software while under development. Microsoft yesterday provided
the first installment of the software as part of the effort, which it calls the
Community Technology Program.
-By Robert A. Guth, The Wall Street Journal; 415-765-8232
Wave Systems to Feature Trusted Computing Solutions At 2005 U.S. ARMY DOIM Conference
--------------------------------------------------------------------------------
Mon Aug 22 10:38:01 2005 EST
LEE, Mass., Aug 22, 2005 (BUSINESS WIRE) --
Wave Systems Corp. (NASDAQ:WAVX) today announced its
EMBASSY(R) Trust Suite solutions will be demonstrated August 23-25 at
Booth 1540 at the 2005 DOIM Conference, co-sponsored by AFCEA
International and the U.S. Army Directorate of Information Management.
The conference will be held at the Broward County Convention Center,
Ft. Lauderdale, FL.
"Wave believes its trusted computing software suite offers secure,
easy to use, easy to manage solutions for protecting computer data for
a range of government and military applications," said Steven Sprague,
Wave president. "Wave's advanced solutions are designed to deliver
biometric authentication, smart card authentication, password
authentication and machine authentication of a user's personal
computer to a government or enterprise server. Wave has designed these
trusted computing solutions to give Army information management
administrators more flexibility and increased options in managing its
data networks such as in FiXs and DCCIS environments."
Wave is a founding member of the Federation for Identity and
Cross-Credentialing Systems, Inc. (FiXs). The non-profit federation is
a coalition of industry and associations that have created and
deployed an interoperable identity cross-credentialing network that is
FIPS 201, PIV I compliant. The FiXs network is based on a set of
operating rules, interface specifications and a supporting
infrastructure that enable it to interoperate with the Defense
Identification and Cross-Credentialing System (DCCIS). This system
interoperability allows trusted credentials issued by FiXs members to
be authenticated at Department of Defense (DoD) sites and DoD employee
credentials to be authenticated at industry sites. Industry members'
credentials can also be authenticated at other industry members'
sites. As a founding member, Wave is taking a leadership role in this
landmark federation.
At the forum Wave will highlight its trusted computing solutions
for the government, homeland security and national defense markets,
including its EMBASSY Trust Suite software and its Key Transfer
Manager. Wave's trusted computing solutions work with a Trusted
Computing Group (TCG)-compliant Trusted Platform Module (TPM) - a chip
embedded inside a PC. Millions of PCs have been shipped by the
industry with TPMs installed. A TPM provides the resources used by
Wave's EMBASSY software to implement secure functions within a PC.
Wave's EMBASSY Trust Suite, developed to TCG specification and
designed to be compatible with the Microsoft Office(R) environment, is
designed to deliver a variety of PC-related security and productivity
tasks, in an intuitive, easy-to-understand format. The hallmark of
EMBASSY(R) Trust Suite solutions is usability - designed to be easy to
enable, easy to use and easy to manage by IT administrators. Wave's
Key Transfer Manager is designed to help backup and protect the
hardware encryption keys.
More information about EMBASSY Trust Suite products is available
through Wave Systems at www.wave.com/products/ets.html.
About Wave Systems
Consumers and businesses are demanding a computing environment
that is more trusted, private, safe and secure. Wave is the leader in
delivering trusted computing applications and services with advanced
products, infrastructure and solutions across multiple trusted
platforms from a variety of vendors. Wave holds a portfolio of
significant fundamental patents in security and e-commerce
applications and employs some of the world's leading security systems
architects and engineers. For more information about Wave, visit
http://www.wave.com.
New Dell Desktops Help Boost Performance, Reliability and Can Help Reduce Deployment Cost
--------------------------------------------------------------------------------
Thu Jun 02 09:10:02 2005 EST
MONTE CARLO, Monaco, Jun 02, 2005 (BUSINESS WIRE) --
Dell Inc. (NASDAQ:DELL)
-- Lead-Free(a) Chassis Advance Drive Toward EU RoHS Compliance
Dell(TM) today announced two new OptiPlex(TM) products designed to
enhance the deployment flexibility, performance and reliability of the
world's best-selling corporate desktop line.(b)
The company's OptiPlex GX520 and GX620 systems introduced today
also take steps toward compliance with the European Union (EU)
Restriction on the use of certain Hazardous Substances (RoHS)
directive by featuring lead-free(a) power supplies, motherboards and
chassis.
"The OptiPlex GX520 and GX620 underscore Dell's commitment to
directly address real customer needs, be a leader in global
environmental standards and support relevant product innovation," said
John Medica, senior vice president of Dell's product group. "The new
BTX chassis family supports Dell HyperCool technology, dual-core
processors, lead-free motherboards and components, as well as new
security features that help enable customers to protect their
investment."
Dell plans to meet RoHS requirements before the July 2006
deadline. The directive requires that electronics products shipped in
the EU eliminate or minimize several chemical compounds, including
lead. Dell's Restricted Materials Program prohibits other restricted
materials, like cadmium. In addition, Dell already complies with
international environmental standards such as GreenPC and Energy
Star(R).
Deployment Flexibility, New Chassis, Latest Technology
The OptiPlex GX520 and GX620 also give customers more flexibility
to deploy systems based on specific needs. Customers can choose from
seven chassis between the two products, including mini-tower, desktop,
small and ultra-small (GX620) form factors that offer extensive
expandability options. To help make deployments easy and cost
effective, the systems share a single software image across all
chassis.
The new small form factor chassis can be installed behind an
innovative flat-panel monitor for an all-in-one, "zero-footprint"
system that maximizes desk space.
The OptiPlex GX520 addresses the needs of the mainstream
performance user who requires essential, relevant technology for
productivity applications. The system is based on the Intel 945G
chipset designed to deliver enhanced performance with new 64-bit(c)
capable processors, Graphics Media Accelerator 950 (GMA950) and
Execute Disable Bit (XD). The GMA950 can provide an enhanced visual
experience with up to approximately two times the performance of
previous graphics solutions.(d) The new graphics capabilities help
enable future support for the Microsoft(R) operating system code-named
"Longhorn," scheduled for release next year. XD is a security feature
that can help protect systems by preventing certain classes of
viruses.(e)
The OptiPlex GX620 is designed for users who need investment
protection and maximum productivity throughout the life of the system.
The GX620 shares the GX520's features, but is designed to provide
better expandability and performance options. The system also features
Trusted Platform Module (TPM) 1.2 security technology to help ensure
only authorized systems access network data and resources. Dell
anticipates that the GX620 will support factory installation of
Microsoft Windows(R) XP Professional x64 operating system, as well as
dual-core processors, in the next few months.
Continuing Commitment to Reliability, Stability and Money-Saving
Services
The integration of BTX design specifications and Dell
HyperCool(TM) technology can contribute to reliability by enabling
systems to run at cooler temperatures with less fan noise. The new
chassis allow tool-less access to internal components, making it easy
for customers to service their systems. The GX520 and GX620 also
feature Dell DirectDetect(TM), a diagnostic tool that is designed to
identify system status. Four LED lights located on the front of the
chassis can help Information Technology (IT) personnel quickly
identify 16 system health indicators during startup.
Dell continues its commitment to stability with the Stable Image
Assurance program that helps assure no forced software image changes
will occur.(f) Should a customer's software image require an update,
Dell will execute the change through its Custom Factory Integration
(CFI) service. Dell leverages process efficiencies, CFI, and
deployment services to help customers reduce the cost of refreshing
their deployments and maximize uptime.
Technical Specifications for the GX520
-- Intel Pentium 4 and Celeron D processors up to 3.4 GHz
-- 40-160 GB(g) Serial ATA (SATA) hard drives
-- SATA II technology
-- 256 MB-2 GB(i) DDR2 400 and 533 MHz shared(h) RAM
-- Intel GMA 950 graphics
Technical Specification for the GX620
-- Intel Pentium 4 and Celeron D processors up to 3.8 GHz
(planned future support for Pentium D processors)
-- 40-250 GB(g) SATA hard drives
-- SATA II technology
-- 256 MB-4 GB(i) DDR2 533 MHz shared(h) RAM
-- 128 MB ATI Radeon(TM) X600 XE, 256 MB ATI Radeon(TM) X600
(dual VGA or DVI planned in the coming months) or Intel GMA
950
-- Optional DVI adapter card
The starting price of the GX520 is $549. The GX620 starts at $579.
For more information on the products, visit www.dell.com/optiplex. For
product photos, visit www.dell.com/photos. For more information on the
new OptiPlex chassis, see www.dell.com/optiplexbtx.
About Dell
Dell Inc. (NASDAQ:DELL) is a trusted and diversified
information-technology supplier and partner, and sells a comprehensive
portfolio of products and services directly to customers worldwide.
Dell, recognized by Fortune magazine as America's most admired company
and No. 3 globally, designs, builds and delivers innovative, tailored
systems that provide customers with exceptional value. Company revenue
for the past four quarters was $51.1 billion. For more information
about Dell and its products and services, visit www.dell.com.
Pricing, specifications, availability, and terms of offers may
change without notice. Taxes, fees and shipping and handling charges
are extra, and vary. Dell cannot be responsible for pricing or other
errors, and reserves the right to cancel orders arising from such
errors.
(a) Per the EU Restriction on the use of certain Hazardous
Substances directive, components contain less than 0.1% lead
by weight.
(b) IDC Worldwide Quarterly PC Tracker, Quarter 1, 2005
(c) Requires 64-bit operating system and application.
(d) Up to two times the graphics performance is based on the
FutureMark 3DMark 2005 benchmark test performed by Dell labs
in May 2005 on the OptiPlex GX520 with an Intel Pentium 4 3.2
GHz processor, Intel GMA 950, 512 MB DDR2 RAM, 80 GB SATA
Microsoft Windows XP Professional SP2 as compared with the
OptiPlex GX280 with a Pentium 4 3.2 GHz processor, Intel GMA
900, 512 MB DDR2 RAM, 80 GB hard drive, Microsoft Windows XP
Professional SP2, both with 1280 x 1024 screen resolution.
Actual performance will vary based on configuration, usage and
manufacturing variability.
(e) When combined with a supporting operating system such as
Microsoft Windows XP Professional SP2.
(f) Customers must use CFI's Image Deployment Services. A forced
image change is one that applies to integrated components and
requires user intervention and/or a new driver that is
required to implement in order to operate the system
effectively. Limitations apply.
(g) For hard drives, GB means 1 billion bytes; actual capacity
varies with preloaded material and operating environment and
will be less.
(h) Up to 224 MB of system memory may be allocated to support
graphics, depending on system memory size and other factors.
(i) The total amount of usable memory available will be less
depending on the actual system configuration.
Dell is a trademark of Dell Inc.
Dell disclaims any proprietary interest in the marks and names of
others.
SOURCE: Dell Inc.
Dell Inc., Round Rock
Jeremy Bolen, 512-728-8329
jeremy_bolen@dell.com
or
Tom Kehoe, 512-725-0281
tom_kehoe@dell.com
Copyright Business Wire 2005
Trusted Computing Group Hosts Seminar on Digital Identity and Protection of Data and Systems at 4th Annual Digital ID World Conference
--------------------------------------------------------------------------------
Tue Apr 26 14:03:01 2005 EST
PORTLAND, Ore., Apr 26, 2005 (BUSINESS WIRE) --
The Trusted Computing Group (TCG), whose specifications
help vendors build products that protect critical data and
information, will host a Trusted Computing seminar in conjunction with
the Digital ID World Conference May 9-12, at the Hyatt Regency
Embarcadero in San Francisco.
Trusted Computing implementation helps protect PCs from malicious
attack, data theft, fraud and other computer security problems.
Hardware authentication enabled by Trusted Computing can further
strengthen identity management processes. Millions of systems
worldwide have Trusted Computing capabilities.
"As companies continue to identify digital identity technologies
and solutions to integrate, manage and secure the network, Trusted
Computing Group provides a good foundation for digital identity
initiatives," said Phil Becker, editor in chief, Digital ID World
magazine and managing partner of Digital Identity World, LLC.
The free Trusted Computing seminar, "Trusted Computing and Digital
Identity: How Are They Related? How Can You Take Advantage of These
Technologies?" will be held on Monday, May 9, 1 p.m. - 5 p.m., in the
Seacliff A/B Room, on the second floor of the Hyatt Regency
Embarcadero. Experts from the Trusted Computing Group member
companies, including VeriSign and Wave Systems, will speak on the role
of Trusted Computing in identity and Web services, developing Trusted
Computing applications and case studies of customer experiences with
Trusted Computing.
Representatives from TCG member companies also will participate in
a panel discussion on Trusted Computing in the event's emerging
technology track, on Wednesday, May 11, 4 p.m. - 5 p.m.
About TCG
TCG is an industry standards body formed to develop, define and
promote open standards for trusted computing and security
technologies, including hardware building blocks and software
interfaces, across multiple platforms, peripherals and devices. TCG
specifications are designed to enable more secure computing
environments without compromising functional integrity, with the
primary goal of helping users to protect their information assets from
compromise due to external software attack and physical theft.
More information and the organization's specifications are
available at www.trustedcomputinggroup.org.
About Digital ID World
Digital ID World, the premier digital identity industry magazine
and conference, is the recognized leader in bringing together industry
luminaries, vendors and the enterprises that are implementing digital
identity technologies. Digital ID World focuses on the technology and
trends shaping the identity industry and how identity is solving
issues in integration, management and security of networked computing.
Information about Digital ID World magazine can be found at
http://www.digitalidworld.com/magazine. Information regarding Digital
ID World 2005 can be found at the Digital ID World Web site:
http://conference.digitalidworld.com/2005/.
Brands and trademarks are the property of their respective owners.
SOURCE: Trusted Computing Group
Trusted Computing Group
Anne Price, 602-840-6495
press@trustedcomputinggroup.org
fivewood
Wave System Speaker to Describe Trusted Computing and Web Services at RSA Conference 2005 Trusted Computing Solutions Are Available Today to Protect the High Value Digital Transactions Associated With Emerging Web Services
--------------------------------------------------------------------------------
Mon Feb 14 09:25:00 2005 EST
LEE, Mass., Feb 14, 2005 (BUSINESS WIRE) --
Wave Systems Corp. (NASDAQ:WAVX) today announced that Lark Allen,
executive vice president, business development, will present "Trusted
Computing, Identity Management and Web Services, the Next Generation
of the Internet", Session IAM-101 of the Identity and Access
Management Track at the RSA 2005 Conference at the Moscone Center, San
Francisco, CA. Allen's presentation, sponsored by the Trusted
Computing Group, will be on Feb. 15 at 2:00pm in the Esplanage Room in
the South Hall.
Allen's presentation will show how trusted computing, using
industry-standard security chip technology to defend the computing
platform against software-based attacks, promises to make the internet
safer terrain for enterprises, government and individuals ready to
engage in high value digital transactions.
"In order for the promise of higher value digital transactions on
the Internet to be realized, you need a range of capabilities to be
present, all of which readily available today from vendors selling
trusted computer solutions," Allen said. "With millions of PCs now
shipped by industry with Trusted Computing Group-compatible security
chips called Trusted Platform Modules (TPMs), we now have the basis
for widespread trustworthiness of computer platforms.
"Building a network of trusted devices can dramatically enhance
the privacy and security of existing and future web services," Allen
said. "The productivity gains that the internet can deliver have been
hampered by poor security and the inconvenience to users. Today's
internet is a patchwork of solutions that lack interoperability.
Trusted computing is expected to provide the foundation for a common
root of trust for business and consumer Interactions on the internet."
Wave's ETS software solutions are designed to be compliant with
the Trusted Computing Group (TCG) specifications. The computer
industry has shipped millions of PCs embedded with a TCG-standard
chip, called the Trusted Platform Module. Wave has designed its secure
business productivity software to work with all TCG-compliant TPMs
commercially available.
More information about EMBASSY Trust Suite products is available
through Wave Systems at www.wave.com.
fivewood
Trusted Computing Group to Address 'Putting Trust into Computing: How and Why' at 14th Annual RSA Conference Trusted Computing Group Members Also Will Participate in Two Security Educational Sessions and Demonstrate Today's Products
--------------------------------------------------------------------------------
Mon Feb 07 12:36:00 2005 EST
PORTLAND, Ore., Feb 7, 2005 (BUSINESS WIRE) --
The Trusted Computing Group (TCG), whose specifications have been
developed to help vendors build products that protect critical data
and information, will host a half-day educational session at the RSA
Conference on Monday, Feb. 14, at the Moscone Center South Hall, San
Francisco. The session is open to all registered RSA Conference
attendees.
"Putting Trust Into Computing: How and Why" will be held from 9
a.m. to 12 p.m. in Esplanade Room 302 at the Moscone Center South
Hall. The session will include an overview of the Trusted Network
Connect effort, a discussion of open source solutions, tips on writing
trusted applications along with examples, and a review of Trusted
Computing in real-world applications. Presenters will include
representatives from HP, IBM, NTru, Utimaco, VeriSign and Wave Systems
Corp.
Following the session, TCG will host a lunch from noon to 1 p.m.,
also open to all attendees of Monday's RSA Conference sessions. The
lunch will be in the Esplanade Room 301 of the Moscone Center South
Hall. Rob Enderle, president and principal analyst, Enderle Group,
will provide an update to lunch attendees on the current and future
computing security environment and challenges for developers and IT
managers.
Enderle has been identified by firms like the Kensington Group and
publications like Technology Marketing as one of the most influential
technology analysts in the world. As president and principal analyst
of the Enderle Group, a forward-looking emerging technology advisory
firm, he provides companies with guidance in how to better target
customer needs; create new business opportunities; and anticipate
technology changes. Enderle has worked for and with companies like
Microsoft, HP, IBM, Dell, Toshiba, Gateway, Sony, USAA, Texas
Instruments, AMD, Intel, Credit Suisse First Boston, GM, Ford, ROLM,
and Siemens.
There is no charge for the session or lunch but RSA Conference
attendees are asked to pre-register at the TCG Registration page.
TCG will also present two sessions during the RSA Conference 2005.
On Tuesday, Feb. 15, 2 p.m., Lark Allen of Wave Systems Corp. will
speak at the Identity and Access Management Track on "Trusted
Computing, Identity Management, and Web Services, Enabling the Next
Generation of the Internet." Michael Willett of Seagate Corp. will
speak at the Applied Security Track. His session is "Enhance Network
Security and Trust in e-Business Using Trusted Platform Modules" on
Tuesday, Feb. 15, 2 p.m.
Trusted Computing Group member companies Dell, HP, IBM, Intel and
Fujitsu will host demonstrations of the available Trusted Computing
platforms and solutions at the TCG booth (No. 332) at the conference.
To register for the conference or to get more information, visit
http://2005.rsaconference.com/us/.
About TCG
TCG is an industry standards body formed to develop, define, and
promote open standards for trusted computing and security
technologies, including hardware building blocks and software
interfaces, across multiple platforms, peripherals, and devices. TCG
specifications are designed to enable more secure computing
environments without compromising functional integrity with the
primary goal of helping users to protect their information assets from
compromise due to external software attack and physical theft.
More information and the organization's specifications are
available at the Trusted Computing Group's Web site,
www.trustedcomputinggroup.org.
Brands and trademarks are the property of their respective owners.
SOURCE: Trusted Computing Group
For Trusted Computing Group
Anne Price, 602-840-6495 or 602-330-6495 (mobile)
press@trustedcomputinggroup.org
fivewood
PRESS RELEASE: Wave Systems and Operational Research Consultants Collaborate to Address Government Security Markets
--------------------------------------------------------------------------------
Thu Jan 13 08:30:24 2005 EST
LEE, Mass. & FAIRFAX, Va.--(BUSINESS WIRE)--Jan. 13, 2005--Wave Systems Corp.
(NASDAQ:WAVX) and Operational Research Consultants, Inc. (ORC), a wholly owned
subsidiary of WidePoint Corporation (OTC BB: WDPT), announced today a strategic
partnership to jointly market trusted computing and certified credentialing to
provide identity management solutions to federal, state and local governments.
The partnership agreement combines ORC's federal government authorized
External Certificate Authority (ECA) and Access Certificates for Electronic
Services (ACES) capabilities with Wave's EMBASSY(R) Trust Suite technology for
use with federal compliant public key infrastructures.
"ORC is pleased to be joining forces with Wave Systems in making available
trusted computing solutions embedded with ECA digital certificate capabilities
to all branches of government, and beyond," stated Daniel E. Turissini,
president and CEO of ORC. "This combination of Wave's EMBASSY(R) Trust Suite
technology integrated with our Trusted Third Party services provides another
element to furthering the availability of the highest levels of Information
Assurance technologies in the ongoing efforts to protect personal information
and in support of Homeland Defense endeavors."
"Wave is happy to be partnering with ORC, a leader in the certificate
authority market, and whose technology has gained a strong foothold in
government, military and security markets," said Steven Sprague, Wave's
president and CEO. "We believe ORC can play an important role as a Trusted
Third Party serving the growing trusted computing market in government."
ORC employs Public Key Infrastructure (PKI) technology to enable Government
and Commercial customers to confidently disseminate information to
geographically dispersed audiences while protecting that information from
unauthorized disclosure. By implementing individual, code-signing and
device/server digital certificates through trusted identity validation
procedures, ORC provides its customers with:
-- A digital identity for identification and authentication,
-- Public-private key encryption for confidentiality, and
-- Digital signatures for data integrity and non-repudiation.
ORC tackles the most difficult issues in implementing PKI by establishing for
its customers rigorous procedures for subscriber identification that do not
place an undue burden on either the subscriber or the validating entity while
maintaining an acceptable level of trust.
Wave's EMBASSY Trust Suite technology is designed to make personal computers
more trusted and secure while making the PC applications more secure and easy
to manage. For more information please visit www.wave.com.
About Operational Research Consultants
ORC, a wholly-owned subsidiary of WidePoint Corporation, is a
multidisciplinary firm, offering a broad range of technical, analytical and
engineering services including weapons system acquisition management, software
development, systems integration, e-commerce, and expertise in all elements of
information assurance and security. In addition to the DoD ECA program, ORC is
also a prime contractor for the General Services Administration's (GSA) Access
Certificates for Electronic Services (ACES). For more information, please see
ORC's website at www.orc.com.
About WidePoint Corporation (OTC BB:WDPT) is a publicly-traded IT services
and solutions firm specializing in planning, managing, and implementing
government and commercial enterprise solutions. WidePoint has embarked upon a
growth through selective acquisition strategy focused on the Federal Government
sector's e-initiatives, which are driven by mandated requirements to greatly
enhance technical capabilities and increase functionality and productivity
within Federal Agencies. For more information, please see WidePoint's website
at www.widepoint.com.
About Wave Systems
Consumers and businesses are demanding a computing environment that is more
trusted, private, safe and secure. Wave is the leader in delivering trusted
computing applications and services with advanced products, infrastructure and
solutions across multiple trusted platforms from a variety of vendors. Wave
holds a portfolio of significant fundamental patents in security and e-commerce
applications and employs some of the world's leading security systems
architects and engineers. For more information about Wave, visit
http://www.wave.com.
fivewood
PRESS RELEASE: Wave Systems To Complete $5.8 Million Offering Under $25 Million Shelf Registration Statement
--------------------------------------------------------------------------------
Fri Dec 17 08:17:05 2004 EST
LEE, Mass.--(BUSINESS WIRE)--Dec. 17, 2004--Wave Systems Corp. (NASDAQ: WAVX
- www.wave.com), a developer of trusted computing solutions and services,
announced today that it has agreed upon an issuance of approximately $5.8
million of Class A common stock with accredited investors. The transaction is
being done under Wave Systems' $25 million shelf registration statement which
was declared effective by the Securities and Exchange Commission on May 10,
2004. Pursuant to the financing, Wave Systems agreed to sell 5,484,790 shares
of Class A common stock at a price of $1.05 per share. The transaction is
anticipated to close today and is intended to fund Wave Systems' ongoing
operations and general corporate overhead.
This press release shall not constitute an offer to sell or a solicitation of
an offer to buy securities of Wave Systems Corp. This press release is being
issued pursuant to and in accordance with Rule 135c under the Securities Act.
About Wave Systems
Consumers and businesses are demanding a computing environment that is more
trusted, private, safe and secure. Wave is the leader in delivering trusted
computing applications and services with advanced products, infrastructure and
solutions across multiple trusted platforms from a variety of vendors. Wave
holds a portfolio of significant fundamental patents in security and e-commerce
applications and employs some of the world's leading security systems
architects and engineers. For more information about Wave, visit
http://www.wave.com.
HP Makes Technology More Secure with Enhanced Products and Services for Home and Business Customers
Tue Nov 30 13:00:41 2004 EST
SAN FRANCISCO--(BUSINESS WIRE)--Nov. 30, 2004--HP (NYSE:HPQ) (Nasdaq:HPQ)
today announced an extended lineup of products and services designed to help
the full range of its customers address their unique technology security
threats.
By building security into its broad portfolio of products, HP is proactively
assisting in the defense against the increasing rise in technology-based
attacks on consumers, small and mid-size businesses (SMBs), enterprises and
public sector customers.
In recognition of International Computer Security Day, HP has joined with
industry leaders and channel partners to deliver a host of new security
solutions, including:
-- an expanded PC Security initiative to raise consumer awareness
of security issues and help them protect and clean their
systems;
-- a range of products and online tools with built-in security
features to help shield small and mid-size businesses; and
-- new services to help enterprises and public sector customers
proactively mitigate security risks.
"While anyone who connects to the Internet shares some common threats from
worms and viruses, as technology becomes more complex and widespread, we have
seen a rapid increase in threat velocity, meaning that it's more difficult for
consumers and administrators to protect their systems," said Tony Redmond, vice
president and chief technology officer, HP Services. "With our focused
investment in security technology backed up with terrific partnerships, HP is
in the unique position of being able to innovate for all of our customer bases.
We want security features to be built in - not bolted on - to proactively help
defend all types of technology environments, from a home PC to a data center."
The National Cyber Security Alliance, the Department of Homeland Security's
designated resource for computer safety information, has found that consumers
are largely unaware of the rising security threats they face. And, according to
a recent IDC report, the dynamics of security threats and protection strategy
vary widely among companies of different sizes.
"Home computer users, small businesses and large enterprises share similar
risks when using the Internet," said Matthew Moynahan, vice president, consumer
products and solutions, Symantec. "A combination of education on best computing
practices that can thwart phishing, fraud and identity theft schemes and
integrated security applications that are constantly updated will provide the
multi-layer protection to enable all users to take advantage of the power and
benefits of the Internet."
(Detailed information about the HP security solutions described
below for each customer segment is available in an online press kit at
www.hp.com/go/securitynews.)
Safeguarding home PCs
To help consumers defend their PCs, protect their privacy and keep their
systems running smoothly, HP is launching its PC Security initiative.
Key elements of the initiative include:
-- Dedicated, online security support with one-hour e-mail
response time and real-time chat available for no additional
charge;
-- Virus alert classes held via phone during virus outbreaks for
no additional charge; and
-- An HP Help and Support Center with performance and security
diagnostic software installed on notebooks.
Additional components of the PC Security initiative include awareness and
education campaigns, a new PC security website with access to security tools,
support and information, and special sales promotions for anti-virus and
spyware protection software.
HP has conducted proactive outreach to more than 9 million customers and
included a security brochure in the box of every notebook it sells in the
United States. HP also provides service alerts to notify consumers of critical
security information. The combination of the awareness campaign with the
release of Microsoft Windows(R) Service Pack 2 has helped reduce
security-related calls to HP's technical support agents by 20 percent from July
to October.
Simple security blueprint and new solutions help protect SMB customers HP
also unveiled its "layers of security" blueprint, a simple approach to help
channel partners and customers easily understand the many levels of protection
needed to better protect their small and mid-size businesses before security
breaches occur, from threats such as viruses and spyware, spam, intrusion and
outdated security.
The blueprint is the realization of one of the primary elements of HP's Smart
Office initiative to provide SMB customers with simple, more reliable
technology that enhances security. HP and its channel partners are helping SMB
customers secure their technology, so they can stay focused on their business.
HP has identified six essential layers of security that help SMBs at every
level of exposure, from the server to the PC. Along with its security industry
partners, HP is adding new solutions to the existing SMB security portfolio at
each layer:
-- At the most basic two layers -- physical and data security --
HP is helping customers prevent unauthorized access to and
corruption of their data with the expansion of the HP
ProtectTools embedded hardware and software portfolio. HP
ProtectTools security features help provide protection against
unauthorized access to desktops, notebooks, workstations and
thin clients, as well as the new HP iPAQ Pocket PC hx2000
series.
-- Also new at this layer is a 60-day free license for Symantec
Client Security virus protection software for business
systems, and HP Secure Disk Erase, which allows users to
manipulate settings related to the erasure of documents from
the hard drive memory on certain HP multifunction printers.
-- In the next two levels - application/operating system and
network security - new offerings from ProCurve Networking by
HP help prevent unauthorized access to businesses' wired and
wireless networks. HP is also announcing the availability of
Trend Micro antivirus and antispam solution pre-installed with
Microsoft(R) Small Business Server 2003 on HP ProLiant
servers.
-- At the security management level, customers can now identify
and fix or patch security vulnerabilities due to
mis-configured operating systems as well as missing patches
from HP Systems Insight Manager using the HP ProLiant
Essentials Vulnerability and Patch Management software, now
available for any HP ProLiant Small Business server.
-- The final layer is delivered security services, such as the
industry-first HP Security and Vulnerability Assessment
Service for SMBs, announced in early October.
In addition, HP has added a Security Expertise Center to its SMB website at
www.hp.com/go/secureSMB to provide customers with easy access to HP experts for
assistance with their secure technology needs. The center includes security
education courses designed to help businesses acquire the skills to start
building a holistic and effective security plan - as well as HP Learning Curve,
a wealth of white papers, articles and other educational resources specific to
security issues faced by small and mid-size businesses.
HP helps mitigate enterprise customers' risk with new services, software
solution partner HP has introduced new products, services and solution
relationships that help enterprise customers better respond to security threats
and manage identities.
The HP Security Incident Management Program is a package of services that is
applied in a proactive lifecycle approach to enhance the prevention of known
information security threats, vulnerabilities and incidents from occurring and
minimize the impact of unknown security attacks.
Components of the HP Security Incident Management Program include: threat
analysis and response; vulnerability detection; network intrusion detection and
response; anti-virus program; patch management; active countermeasures;
escalation and crisis management; security incident response; investigations
and forensics; and program administration and analysis.
To help enable secure extended enterprises and secure mobile identity
services, HP also announced the availability of HP OpenView Select Federation,
the newest component of its award-winning business service identity management
solutions. HP OpenView Select Federation is a "federated" (or single sign-on)
technology using industry-standard protocols, which eliminates the hassle of
multiple authentication steps, but safely links users with multiple accounts.
The solution streamlines the management of users over the entire security
lifecycle, including their access to network and enterprise resources, reducing
overall IT costs and improving compliance.
Available through an original equipment manufacturer relationship with
Trustgenix, HP OpenView Select Federation enables enterprises to quickly and
securely extend their enterprises to their business partners through rapid
integration between different identity systems. Integrated with HP OpenView
Select Access or Select Identity, it enables service providers to offer secure,
mobile, federated identity services while protecting the privacy of service
consumers.
HP is also continuing its innovation in virus protection with customer beta
testing of the HP ProLiant Intelligent Networking Pack. In the final
development stages at HP Labs, this service package will help protect
businesses from viruses by acting as a network filter driver, monitoring a
network's TCP traffic and proactively adapting to network infrastructure to
improve server availability and network performance.
More information about the HP security solutions announced today for each
customer segment is available at www.hp.com/go/securitynews.
About HP
(MORE) Dow Jones Newswires
11-30-04 1300ET
fivewood
Trusted Computing Group Community to Showcase Key Building Blocks, Applications and Systems at Fall Intel Developer Forum, San Francisco
--------------------------------------------------------------------------------
Wed Sep 01 12:20:00 2004 EST
PORTLAND, Ore., Sep 1, 2004 (BUSINESS WIRE) --
The Trusted
Computing Group (TCG), whose specifications have been developed to
help vendors build products that let users protect critical data and
information, continues to gain momentum as more vendors provide key
hardware and software building blocks for desktop, notebook,
communications and other systems. A number of these solutions will be
demonstrated at the upcoming Intel Developer Forum, Sept. 7-9, Moscone
Center, San Francisco. TCG is a sponsoring community for the event.
Trusted Computing implementation has been driven recently by a
wave of attacks and by growing concerns about data protection for
e-commerce and other growing applications. A number of components,
systems and applications have been announced this year to enable
Trusted Computing.
The IDF Trusted Computing Showcase will highlight Trusted Platform
Module (TPM) computer chips from Atmel, Infineon, National
Semiconductor and STMicroelectronics. These TPMs are used in PCs and
other systems to store passwords, digital certificates and encryption
keys, enabling systems that are more secure than those with
software-only solutions.
TCG members iPass, Meetinghouse Data Communications, NTRU, Phoenix
Technologies, SafeNet, Softex and Wave Systems will show applications
that build on the TPM capabilities. Many of these applications are
available now and help users protect data and passwords.
Intel will demonstrate PC and motherboard designs incorporating
the TPMs and various applications. To date, more than 5 million
systems with TPMs have been shipped to users worldwide.
Vendors from the showcase also will present 30-minute sessions on
TCG technologies and solutions during showcase hours.
Technical sessions about Trusted Computing and its implementation
will be held throughout the event. For a complete schedule of events
and to register for IDF, go to www.intel.com/idf.
TCG's online press kit is available via the Virtual Press Office
at virtualpressoffice.com/presskit/index.jsp?companyId=1091049571580
Fujitsu - optional TPM
Fujitsu Offers Ultimate Flexibility with LifeBook E Series Notebook; Latest Business-Class Desktop Replacement Provides Top Performance, Comfort & Security
Tue Jun 15 08:01:00 2004 EST
SUNNYVALE, Calif., Jun 15, 2004 (BUSINESS WIRE) --
Fujitsu
Computer Systems Corporation today unveiled the next generation of its
powerful and versatile LifeBook(R) E Series family, the LifeBook E8000
notebook. This corporate desktop replacement is rich with new features
and the latest technologies for the serious business professional.
"Enabled with the latest in Intel(R) Centrino(TM) mobile
technology, the LifeBook E8000 notebook could be compared to a
high-performance car with incredible gas mileage," said Paul Moore,
director of product marketing for Fujitsu Computer Systems. "The
adoption of a new processor allows the LifeBook E8000 notebook to
deliver extraordinary computing power and extended battery life.
Fujitsu has also equipped the notebook with an advanced security
system and flexible communications options to make it one of the
smartest mobile computing solutions on the market today."
Powered by an Intel(R) Pentium(R) M Processor, the LifeBook E8000
notebook allows users to customize their notebook with different
configurations. They can experience brilliant image quality from
either a 15-inch XGA TFT display for efficient business use or a
15-inch SXGA+ high-resolution display for a sharper image. In
addition, users can choose between the Intel EXTREME graphics chipset
with 64 MB UMA memory for traditional computing needs or the latest
ATI(TM) Mobility RADEON(TM) 9700 chipset with 64 MB of dedicated video
RAM for the ultimate in handling the most graphics-intense
applications. An integrated bay enables mobile professionals to
support their notebook with a variety of options, such as an extra
battery, a variety of optical drives or a weight saver, which can
reduce the notebook's weight by approximately half a pound. One of the
optical drive options available to LifeBook E8000 notebook users is
the Super-Multi DVD drive. This innovative drive can read or write
onto virtually any DVD and CD format.
The LifeBook E8000 notebook offers multiple security features
including an optional Trusted Platform Module (TPM) with advanced
password protection and hard drive encryption functionality. The
Fujitsu TPM is a powerful, embedded security system that protects
sensitive data from unauthorized users and enables secure
authentication. The module is compliant with the Trusted Computing
Group standard.
Users can easily connect their LifeBook E8000 notebook to their
office network or the Internet at home with its integrated modem,
Gigabit Ethernet and wireless LAN (802.11b/g or 802.11a+b/g). For
users wanting to connect to a Bluetooth-enabled cellular phone or PDA,
the notebook features an optional integrated Bluetooth wireless
solution to synchronize data and swap images.
This stylish, high-end desktop replacement is complete with a
SecureDigital (SD)/MMC slot, four USB 2.0 ports and an IEEE 1394 port
for fast downloading capability and direct data transfer.
Pricing for the Fujitsu LifeBook E8000 notebook starts at
$1,549(1).
LifeBook E8000 Notebook
Processor: Intel Pentium M 1.60 GHz (1 MB L2 cache, 400 MHz
system bus);
Intel Pentium M 735 (1.70 GHz, 2 MB L2 cache, 400
MHz system bus); or
Intel Pentium M 745 (1.80 GHz, 2 MB L2 cache, 400
MHz system bus)
Display: 15" XGA TFT or 15" SXGA+ TFT
Memory: DDR333; Two DIMM slots, 2 GB maximum
Hard Drive: Choice of 80 GB, 60 GB, 40 GB or 30 GB
hard drive(2)
Floppy Disk Drive: Optional external USB
Communications: Gigabit Ethernet, modem and Intel(R) PRO/Wireless
Network Connection 802.11b/g or optional Atheros
SUPER AG (802.11a+b/g), Optional Bluetooth
wireless
Media Drive: CD-ROM drive, DVD/CD-RW combo drive or Super-Multi
DVD Drive
Media Slot: SecureDigital (SD)/MMC slot
Ports: Four USB 2.0, IEEE 1394, S-video out, infrared
(IrDA-compatible, 4 Mbps), serial, parallel, PS/2,
external monitor, modem (RJ-11), Ethernet (RJ-45),
and headphone/SPDIF and microphone jacks
Operating System: Microsoft Windows XP Home, Windows XP Professional
Dimensions: 13.1"(w) x 11.2"(d) x 1.49"(h)
Weight: 6.99 lbs with DVD/CD-RW drive; 6.49 lbs with
weight saver
The Fujitsu LifeBook E Series notebook comes preinstalled with
Microsoft Windows XP Home Edition or Microsoft Windows XP
Professional. Users can choose among the recommended configurations or
customize their notebook using the Fujitsu Configure To Order (CTO)
program. All Fujitsu notebooks can be purchased through the company's
retail and reseller channels(3) as well as at us.fujitsu.com/computers
or 877-372-3473.
Service and Support
The LifeBook E Series notebook is backed by a three-year or
one-year International Limited Warranty for U.S. and Canadian
customers(4). In addition, users can add Fujitsu Premium Care Service
Plans, which include an on-site service or a screen protection plan.
About Fujitsu Computer Systems Corporation
Headquartered in Sunnyvale, Calif., Fujitsu Computer Systems is a
wholly owned subsidiary of Fujitsu Limited (TSE:6702) committed to the
design, development and delivery of advanced computer systems and
managed services for the business enterprise. The company offers a
complete line of high-performance mobile and desktop computers,
scalable and reliable servers as well as managed and professional
services. Fujitsu Computer Systems emphasizes leading-edge technology,
exceptional product quality, and productivity, as well as outstanding
customer service. More information on Fujitsu Computer Systems is
available at us.fujitsu.com/computers.
fivewood