LEE, MA--(Marketwire - Feb 12, 2013) - Wave Systems Corp. (
"CIOs everywhere are trying to accommodate the growing number of users that demand the convenience of a tablet while balancing the need from IT for greater security and control. The launch of Windows 8 tablets will redefine what mobile means to the enterprise. Now there's a group of devices that resemble an iPad but operate like a PC," commented Richard Stiennon, Chief Analyst for IT Harvest. "Wave has introduced the killer app for these devices -- one that eliminates the need for passwords, features encryption and delivers the assurance that only authorized tablets are granted access to corporate resources, no matter where they connect."
For users, this means no more passwords to lose or remember. The device acts as the token, leveraging the Trusted Platform Module to securely store and manage user credentials. The user logs into the device by entering a PIN or swiping a fingerprint sensor; the device then logs the user into all business services. There's no need to remember separate passwords to access Wi-Fi, virtual private networks (VPN) or internal Web resources or remote services. Wave's solution can also be used to enable strong encryption for local data at rest and content shared in the Cloud, ensuring that enterprise secrets are not exposed, while users retain access to the social tools they wish to use. Tablets running Windows 8 Pro also support the critical programs that many others cannot, including Windows Office and legacy applications.
Wave-managed Windows 8 tablets can address many of the mobile security and support issues that have plagued IT departments since the Bring Your Own Device trend emerged. Wave provides support that can fully leverage the Trusted Computing infrastructure that is part of every Windows 8 device, ensuring that the full security benefit of the platform can be realized. Additionally, Wave solutions can leverage the security hardware built in by the factory that can establish that the device is free of changes caused by malware and to keep data secure.
Because Windows 8 tablets can be managed by Microsoft Active Directory -- the same infrastructure used for managing Windows 7 and Windows 8 desktop and laptops -- there's no need for Mobile Device Management, eliminating overhead cost and additional training. With no need to enter passwords, there is a lower risk of socially engineered attacks. No passwords also means lower help desk volume, and because Wave activates embedded hardware security within the tablet itself, there's no requirement for smart cards or tokens for multi-factor authentication.
"We believe that this is the mobile solution many enterprises have been seeking; it's simple and convenient for the end user, cost-effective and easy for IT to manage," said Wave CEO Steven Sprague. "By enabling the authentication features of the Trusted Platform Module, we're making it easier for users who already have too many passwords to remember. The tablet itself logs on to the domain or Wi-Fi hotspot automatically. The security in Windows 8 tablets offers a simple, elegant solution that demonstrates the power of Trusted Computing and will lay the foundation for all enterprise PCs and devices to be mobile."
Wave-managed tablets running Windows 8 feature:
- No more passwords -- users need only a PIN for network access! Once the user inputs a four-digit PIN, the tablet does the rest. The tablet, as opposed to the user, logs onto the network domain or virtual private network.
- Always on, always connected. Both Windows 8 and Windows 7 include a feature called DirectAccess, which offers a secure connection without a virtual private network (VPN). Remote workers gain the access they need, while keeping mobile systems in compliance with security policies and patches every time they connect. Wave also enables automatic access to wireless "hot spots" supporting the 802.1x protocol.
- Data is always secure and audited. Data-at-rest is protected through encryption, using self- encrypting drives (SEDs), Microsoft BitLocker or external SEDs that conform to the Trusted Computing Group's Opal industry standard.
- The tablet becomes "safe to lose." Should a tablet become lost or stolen, network administrators can remove the device from the Security Group in Active Directory, revoke a certificate, or disable the device remotely.
About Wave Systems
Wave Systems Corp. (
Safe Harbor for Forward-Looking Statements
This press release may contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995 and Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors. Wave assumes no duty to and does not undertake to update forward-looking statements.
All brands are the property of their respective owners.
- Technology & Electronics
- Trusted Computing