InvestorsHub Logo
Followers 5
Posts 2589
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Thursday, 07/22/2021 5:48:39 PM

Thursday, July 22, 2021 5:48:39 PM

Post# of 248835
Long-awaited bill would force breach victims to contact CISA

https://www.scmagazine.com/analysis/breach/long-awaited-bill-would-force-breach-victims-to-contact-cisa

==================================================================
Shouldn't there be a requirement for these companies to have their hardware security: TPMs (Trusted Platform Modules) and SEDs (Self Encrypting Drives) enabled IF there is going to be limited legal protections?!!

These are two hardware security standards that have the support of 100+ companies (TCG), and they should be required to be enabled in organizations. It could save a lot of these potential breaches from being reported: because there wouldn't have been these breaches!!!

==================================================================
http://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Secure device & user authentication

Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.
=================================================================
http://www.wavesys.com/

http://www.wavesys.com/contact-information

Contact Wave

Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com

Gold Customer Support:

goldsupport@wavesys.com

1-800-928-3638

Support:

support@wavesys.com

1-844-250-7077

Sales:

1-877-228-WAVE







Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.