InvestorsHub Logo
Followers 25
Posts 348
Boards Moderated 0
Alias Born 07/22/2003

Re: Countryboy post# 170503

Saturday, 08/30/2008 12:26:07 AM

Saturday, August 30, 2008 12:26:07 AM

Post# of 249374
Credant-Wave-Danbury?


This 2008 platform incorporates a new, integrated chipset and Trusted Platform Module (TPM), along with a new data encryption technology codenamed "Danbury Technology." Wave will show how EMBASSY technology can be adapted for data-at-rest, strong authentication and key management. Wave offers the only interoperable solution based upon the Trusted Computing Group's specifications for trusted platforms that include TPM secure storage solutions and secure infrastructures as defined by the TCG. http://findarticles.com/p/articles/mi_m0EIN/is_2007_Sept_18/ai_n27378289

CREDANT Technologies and Intel Partner to Provide Enterprise-Grade Management and Compliance Reporting

Combined Solution Protects Data Against Insider and External Threats With a Single Point of Management for Policy
Administration, Encryption Enforcement, Key Escrow, Data Recovery and Compliance Reporting

Intel Developer’s Forum, SAN FRANCISCO, CA– September, 19, 2007 –CREDANT Technologies, the market leader in mobile data protection solutions, today announced that it has partnered with Intel to provide a single point of management that includes policy administration key escrow, encryption enforcement, data recovery and compliance reporting for Intel’s newly announced Danbury Technology hardware-based encryption. The combined Intel and CREDANT solution is leading the way in helping organizations more easily comply with data breach regulations by managing and enforcing the use of encryption to protect personally identifiable information when a computer or disk is lost or stolen.

In a joint appearance at the Intel Developer’s Forum in San Francisco yesterday, Intel’s Patrick Gelsinger, Senior Vice President, General Manager, Digital Enterprise Group, and CREDANT Technologies’ founder and CEO Bob Heard took the stage to make the announcement. CREDANT, an Independent Software Vendor (ISV) will deliver this functionality as a standard feature in its product, CREDANT Mobile Guardian when Danbury starts shipping in Q3 2008.

“CREDANT’s technology will enhance the Danbury Technology by giving enterprises a powerful encryption and management solution to protect against data breaches,” said Greg Bryant vice president and general manager of Intel’s Digital Office Platform Division. “The combination of our hardware-based encryption and CREDANT’s centralized management is an important step forward for many organizations that must comply with encryption regulations.”

The Privacy Rights Clearinghouse has identified that over 165 million data records of U.S. residents have been exposed due to security breaches since January 2005. As a result, numerous states, local and Federal regulations now require the use of data encryption to protect personally identifiable information. With this release Intel delivers readily available disk encryption that is built into the computer hardware, where it belongs to maximize performance and security for all data that is stored on the disk. CREDANT will provide the management and control infrastructure that will allow IT & security professionals to enforce the use of encryption, more easily recover encrypted data, and provide compliance reporting if a computer or disk is lost or stolen.

“Intel’s security strategy with Danbury Technology is perfectly matched to CREDANT’s solution and strategic direction. Now, our customers will be able to easily and quickly leverage the encryption capabilities of Intel’s Danbury architecture because the management will be seamlessly integrated right into our platform.” said Bob Heard, founder, and CEO of CREDANT Technologies. “The combination of Intel’s hardware-based encryption and our intelligent software encryption creates a compelling solution to protect data against both insider and external threats across all platforms, even removable media. This level of protection coupled with a single point of management for policy administration, encryption enforcement, key escrow, data recovery and compliance reporting is a win-win solution for everyone. ”

“As encryption technologies become pervasive, enterprises require a security solution that allows them to control numerous encryption technologies within one centralized management infrastructure,” said IDC analyst Charles Kolodgy. “Enterprises need a data protection strategy that is secure, reliable,

http://www.credant.com/credant-technologies-and-intel-partner-to-provide-enterprise-grade-management-and-compliance-reporti.html



Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.