InvestorsHub Logo
icon url

New Wave

08/26/10 1:48 PM

#198158 RE: wavedreamer #198152

wavedreamer, this collaboration between the TSCP and NSTIC is all related to the efforts to promote trusted computing by the NSA and TCG.

IMO, it's no small coincidence that these events are occuring simultaneously. I expect this fall - maybe September - we'll start seeing visible deployment of trusted computing solutions by the government to harden the Identity Ecosystem. I've also read the NSTIC plans to start an awareness campaign this fall, so there's likely some level of implementation built around that.

With the federal government becoming an adopter of these hardware based technologies, as well as their planned role as a relying party and identity provider, we could finally start to see a significant pull in the market for Wave's solutions from numerous companies who do business with the government.


Pages 11 through 14 of your document are key, especially page 13 for Identity Federation Services highlighted below:

Strategic Goals

•NSTIC GOALS 1, 2 & 3:
•Develop a comprehensive Identity Ecosystem Framework
•Build and implement an interoperable identity infrastructure aligned with the Identity Ecosystem Framework
•Enhance confidence and willingness to participate in the Identity Ecosystem
•TSCP GOAL 1 & 3:
•Enable secure information sharing within and between industry and governments
•Define interoperable specifications and solutions that enable re-use in a cost-effective manner across multiple programs

Business Case
•Federated Common Identity Policy: Employers vouch for employees identity attributes –Relying parties do not have to issue credentials and account provisioning is automated (cost reduction)
•Advanced Persistent Threat: Employees are using trusted computers and trusted networks to access CUI
•Cost Control and Recovery: Promote re-usable deployment of solutions to expedite implementation (decrease time to setup)
icon url

cooler

08/26/10 3:02 PM

#198160 RE: wavedreamer #198152

Great! Here are some more details.

http://financial.tmcnet.com/news/2010/08/26/4976466.htm
Wave Senior Executives to Present at First Annual NSA Trusted Computing Conference Sept. 14-16
(Market Wire Via Acquire Media NewsEdge) LEE, MA -- (MARKET WIRE) -- 08/26/10 -- Wave Systems Corp. (NASDAQ: WAVX) (www.wave.com) today announced that its President and CEO, Steven Sprague, and Executive Vice President of Marketing & Sales, Brian Berger, will join security experts from academia, government and industry to speak at the National Security Agency's (NSA) Trusted Computing Conference and Exposition (Orlando, September 14-16). Invited speakers include Susan Alexander of the Office of the Director of National Intelligence.
Story continues below ?

The Trusted Computing Conference will educate government and industry alike on how to protect data, systems and networks by leveraging embedded hardware security built on open industry standards. The NSA-sponsored event is hosted by the Trusted Computing Division of the NCSC (NSA Commercial Solutions Center) charged with harnessing the power of US commercial technology for national security, and the High Assurance Platform® (HAP) program office, which has brought together the latest commercial Trusted Computing technologies to form Reference Implementations of secure IT enterprise environments to include areas such as workstations, networks and enterprise-level cloud administration.

On Wednesday, Wave Executive Vice President Brian Berger, in his capacity as Trusted Computing Group (TCG) Director and Chair of the TCG Marketing Work Group, will address conference attendees at the Plenary Session at 8:45 a.m. in a presentation titled, "TCG, the Organization, Its Work, the Future -- Plus a Snapshot on Trusted Computing and its Global Adoption." Later that afternoon, Wave President and CEO, Steven Sprague, will host a Break-out Session titled, "Self-Encrypting Drives and Trusted Platform Modules (TPMs): A Commercial Off the Shelf (COTS) Solution for HAP Capabilities on Standardized Enterprise PCs" from 2:00 to 2:45 p.m.

Wave will also be showing both practical and leading-edge technology demonstrations as part of the NSA Conference program. At 2 p.m. on Tuesday, a 45-minute session will cover basic Trusted Computing implementations that virtually all organizations could implement today. These demonstrations will include the use of the TPM for enhancing security of wireless access points and VPN connections. At 4:30 on Wednesday, another 45-minute session will showcase the advanced Trusted Computing capabilities of TPMs and SEDs: self-healing; multi-user and OS models on single workstations in encryption-protected mode; and use of Intel's vPro? Technology for the offline management of SEDs. Wave will demonstrate various implementations of these basic and advanced security applications at its booth (#205).

New Videos Cover Trusted Computing 101With increased interest in Trusted Computing brought on by the conference, Wave is also announcing the launch of a video podcast series on Trusted Computing -- providing an overview and education on how industry standard hardware security can address cyber security threats. The first series of three podcasts is published today -- introducing Trusted Computing, and exploring the most common ways that enterprise and government users are now leveraging TPM security chips and hardware-based disk encryption.

PODCAST 1: Featuring Mr. Sprague, "Leveraging Hardware Security in 350 Million Platforms," gives viewers a brief overview of Trusted Computing, from the history behind the TCG, to an introduction of both the TPM and SED as embedded forms of hardware security, designed by the security and PC industry to counter the vulnerabilities of software security.

PODCAST 2: The second video, "Trusted Computing: Establishing Device Identity," evaluates how TPMs act as the foundation for device identity, ensuring that only known machines are allowed network access. The TPM is a highly secure "container" for user and device keys, providing device identity much the same way as a SIM chip does on mobile phone networks.

PODCAST 3: The third video in the series, "Trusted Computing: Employing Hardware Encryption," introduces viewers to hardware-based disk encryption. Mr. Sprague addresses the impact of new legislation mandating encryption and points to performance differences between software and hardware full-disk encryption (FDE), along with deployment considerations.

PODCASTS 4, 5, 6 & 7: A second installment of videos will follow next month, as part two of Wave's Trusted Computing podcast series. Four additional videos will cover the topic in greater depth: Trusted Computing implementations in government; deployment in a mixed environment; the need for a strong management infrastructure; and a concluding video on the future of Trusted Computing. To be notified when the second series of videos is available, or for permission to publish these videos, please contact: Wave@MessageInfusion.com.

About Wave Systems Corp.Wave provides software to help solve critical enterprise PC security challenges such as strong authentication, data protection, network access control and the management of these enterprise functions. Wave is a pioneer in hardware-based PC security and a founding member of the Trusted Computing Group (TCG), a consortium of more than 100 companies that forged open standards for hardware security. Wave's EMBASSY® line of client- and server-side software leverages and manages the security functions of the TCG's industry standard hardware security chip, the Trusted Platform Module (TPM) and supports the TCG's "Opal" self-encrypting drive standard. Self-encrypting drives are a growing segment of the data protection market, offering increased security and better performance than many existing software-based encryption solutions. TPMs are included on an estimated 300 million PCs and are standard equipment on many enterprise-class PCs shipping today. Using TPMs and Wave software, enterprises can substantially and cost-effectively strengthen their current security solutions. For more information about Wave and its solutions, visit http://www.wave.com.

Safe Harbor for Forward-Looking StatementsThis press release may contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995 and Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors. Wave assumes no duty to and does not undertake to update forward-looking statements.

All brands are the property of their respective owners