Click here to close now.

Welcome!

News Feed Item

Wave Virtual Smart Card 2.0 Protects Organizations With Stronger Security at Lower Cost

LEE, MA--(Marketwired - July 22, 2014) - Sophisticated hacking techniques have left businesses more vulnerable than ever while rendering traditional authentication methods inadequate to protect them. That's why Wave Systems Corp. (NASDAQ: WAVX) today unveiled a new kind of virtual smart card that offers stronger authentication at significantly less cost than traditional second-factor authentication options. 

A live webcast of the launch is available on wave.com at 2 p.m. EDT today.

The Wave Virtual Smart Card 2.0 is the industry's only enterprise-grade virtual smart card management solution that works on Windows 7. It also supports Windows 8 and 8.1. Wave's new solution emulates the functionality of physical smart cards or tokens, but offers greater convenience to users, lower total cost of ownership, and a reduced risk of unauthorized use.

Businesses need to adopt virtual smart cards because today's security landscape is riddled with data breaches, and recent hacks have shown that current authentication methods are flawed. Passwords are easy to crack, difficult to remember and expensive to manage. While tokens and physical smart cards may provide strong security, the costs to purchase, maintain and replace them when lost or damaged can quickly rise.

Organizations that deploy Wave Virtual Smart Card 2.0 gain the security of smart card authentication while eliminating the problem of lost or stolen tokens and physical smart cards, resulting in lower costs and fewer help desk incidents. Many large companies report that more than 30% of physical smart cards and tokens must be replaced each year. By switching to virtual smart cards, these companies can save those costs and often 50% or more on the total authentication solution.

How it works
The Wave solution conveniently provisions virtual smart cards to users' devices from a central management server, using the Trusted Platform Module (TPM) security chip as the security foundation for each virtual smart card. The chip's capabilities include the secure storage of credentials such as keys and certificates. These TPM chips have been shipping on most business computers for much of the last decade, with hundreds of millions shipped to date.

The Wave Virtual Smart Card 2.0 solution takes the user identity of the individual and binds it to the unique device identity generated by the TPM chip in the devices that are associated with that user. Even if a hacker were to gain access to the user's valid user credentials, without the device ID credential from one of that user's known and trusted devices, the authentication and access to the environment or application that they were trying to gain access to would be denied. This means that a hacker would have to gain physical control of the targeted user's device, crack the security on the device, and then submit the valid user credentials from that device before its loss is noticed and its access is turned off.

Virtual Smart Card 2.0 enables the enterprise to easily provision, manage and support virtual smart cards for its users. Virtual smart cards provide an attractive and convenient path to increased security over usernames and passwords without the added costs of managing physical smart cards and smart card readers. 

Wave Virtual Smart Card 2.0 gives IT the ability to:

  • Remotely create and delete virtual smart cards
  • Provide help desk-assisted recovery
  • Configure PIN and card policies
  • View the status of virtual smart cards and enrolled certificates
  • Generate reports for compliance
  • Support virtual smart cards on laptops, tablets and desktops with TPM 1.2 or TPM 2.0

"With Wave Virtual Smart Card 2.0, enterprises can avoid many of the headaches of traditional authentication technologies with the same security as using physical smart cards in a PKI environment," said Bill Solms, CEO of Wave. "Virtual smart cards are less expensive to manage, easier and faster to deploy and effectively address the problem of lost or stolen tokens."

"DMI has a long history working with Wave Systems to advance the state-of-the-art in IT security," said Jay Sunny Bajaj, president and CEO of DMI, a global leader in enterprise mobile solutions and Wave Solutions Partner. "Wave's new Virtual Smart Card 2.0 enables us to save our clients money, improve and future-proof their IT security, and enhance the user experience all at the same time."

Wave's virtual smart card solution can help organizations comply with key regulations such as PCI, HIPAA and FFIEC. Many of these regulations require organizations to implement two-factor authentication methods to verify users' identities when remotely connecting to a network.

To learn more and to view today's product release webinar (2 p.m. EDT), visit www.wave.com.

About Wave Systems
Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection and authentication by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group. 

Safe Harbor for Forward-Looking Statements
This press release may contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995 and Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors. Wave assumes no duty to and does not undertake to update forward-looking statements.

All brands are the property of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction. ...
"We help to transform an organization and their operations and make them more efficient, more agile, and more nimble to move into the cloud or to move between cloud providers and create an agnostic tool set," noted Jeremy Steinert, DevOps Services Practice Lead at WSM International, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
The basic integration architecture, as defined by ESBs, hasn’t changed for more than a decade. Most cloud integration providers still rely on an ESB architecture and their proprietary connectors. As a result, enterprise integration projects suffer from constraints of availability and reliability of these connectors that are not re-usable across other integration vendors. However, the rapid adoption of APIs and almost ubiquitous availability of APIs amongst most SaaS and Cloud applications are ra...
Agile, which started in the development organization, has gradually expanded into other areas downstream - namely IT and Operations. Teams – then teams of teams – have streamlined processes, improved feedback loops and driven a much faster pace into IT departments which have had profound effects on the entire organization. In his session at DevOps Summit, Anders Wallgren, Chief Technology Officer of Electric Cloud, will discuss how DevOps and Continuous Delivery have emerged to help connect dev...
"What Dyn is able to do with our Internet performance and our Internet intelligence is give companies visibility into what is actually going on in that cloud," noted Corey Hamilton, Product Marketing Manager at Dyn, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...
Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years.
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, will explore the IoT cloud-based platform technologies drivi...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
Live Webinar with 451 Research Analyst Peter Christy. Join us on Wednesday July 22, 2015, at 10 am PT / 1 pm ET In a world where users are on the Internet and the applications are in the cloud, how do you maintain your historic SLA with your users? Peter Christy, Research Director, Networks at 451 Research, will discuss this new network paradigm, one in which there is no LAN and no WAN, and discuss what users and network administrators gain and give up when migrating to the agile world of clo...
SYS-CON Events announced today that JFrog, maker of Artifactory, the popular Binary Repository Manager, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based in California, Israel and France, founded by longtime field-experts, JFrog, creator of Artifactory and Bintray, has provided the market with the first Binary Repository solution and a software distribution social platform.
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult – let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and liv...