InvestorsHub Logo
Followers 25
Posts 348
Boards Moderated 0
Alias Born 07/22/2003

Re: Countryboy post# 34465

Thursday, 03/18/2004 11:10:01 PM

Thursday, March 18, 2004 11:10:01 PM

Post# of 249374
Re: AMD's Enhanced Virus Protection.

"AMD's Athlon 64 and Opteron security features will work with Windows XP Service Pack 2's Data Execution Prevention feature to prevent buffer overrun exploits, a common method used to attack computers. A buffer overrun or overflow essentially overwhelms a computer's defense systems and then inserts a malicious program in memory that the processor subsequently executes"

"Whatever the initiative, Trusted Computing won't solve the problem of mistrust in the Internet. Malicious code will still run in the untrusted parts of systems. There are just too many computers without TPMs, providing fertile fields for malicious code attacks. Even Trusted applications are not safe from attacks against bad coding like buffer overruns. If there were a fully Trusted OS from Microsoft with a buffer overrun that allowed DEL c:\ <ECHO Y to run, you still would lose your hard drive's contents! Since a Trusted Computer can send authenticated anonymous data, such as e-mails, there is still plenty of potential for spam."
http://www.iapplianceweb.com/story/OEG20040223S0038

Wave Systems Demonstrates Next Generation, Secure Enterprise Software at RSA Conference 2004

Wave Introduces the EMBASSY® Trust Suite Key
Transfer Manager to Help Backup and Protect Encryption
Keys Used for Enterprise Data

San Francisco, CA and Lee, MA - February 24, 2004 - Wave Systems Corp. (NASDAQ: WAVX - www.wave.com), today announced its EMBASSY® Trust Suite software will be demonstrated at Booth 516 at the RSA Conference 2004, February 23-27, at the Moscone Convention Center, San Francisco.

In addition, Wave software solutions will be demonstrated with the Trusted Computing Group (TCG) Community exhibition area and also with AMD, Atmel, HP and Intel. Customers seeking Wave appointments and demonstrations may contact Brian Berger at bberger@wavesys.com.

At this conference Wave will highlight the availability of the newest enhancement to the EMBASSY Trust Suite portfolio - Key Transfer Manager-- an enterprise software solution that is designed to help backup and protect the hardware encryption keys used for critical personal computer data.

Key Transfer Manager - expected to be shipping to select PC OEMs in the first half of 2004 - is designed to work with all Trusted Computing Group-compliant secure hardware Trusted Platform Modules.

"As more and more trusted platforms are operating in enterprises, the importance of key back up and recovery solutions becomes more critical to users. Valuable personal computer data can be lost forever if keys are not properly archived. The availability of new applications like Key Transfer Manager that are designed to address this need make trusted computing an even more compelling choice for enterprise PC users," said Nancy Sumrall, chairman, TCG marketing work group.

"We believe this solution offers a significant improvement in ease of use and manageability over existing solutions," said Steven Sprague, Wave's president and CEO. "Key Transfer Manager was developed in cooperation with industry partners who identified this next-generation capability as needed today."

Wave's EMBASSY Trust Suite, developed to the TCG specification and integrated into the Microsoft Office® environment, is designed to deliver a variety of PC-related security and productivity tasks, in an intuitive, easy-to-understand format. The hallmark of EMBASSY Trust Suite solutions is usability - designed to be easy to enable, easy to use and easy to manage by IT administrators.

Wave's software works with a Trusted Platform Module (TPM) - a single chip solution embedded inside a PC. Millions of PCs have been shipped by the industry with TPMs installed. The TPM provides the resources used by the EMBASSY software to implement secure functions within the PC.

With the TCG standard, user data is protected by encryption keys stored within the TPM. These keys are very secure and provide the ability for an end user to encrypt a file or folder or perform other secure enterprise tasks. However, these keys must be recoverable if the TPM fails or when there is a need to replicate a user's configuration on a new machine - otherwise the protected data is lost.

In addition to Key Transfer Manager, EMBASSY Trust Suite includes other TCG-compliant capabilities. These include Document Manager Vault for securing files and folders, SmartSignature for digital signature capability for secure electronic contracts, and Private Information Manager for secure storage and management of user names, passwords and personal information. Private Information Manager is designed to intelligently retrieve data for use in web pages, logging into web sites, or for filling forms
http://www.wave.com/news/press_archive/04/040224_RSA.html

Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.