Click here to close now.

SYS-CON MEDIA Authors: Elizabeth White, Liz McMillan, AppDynamics Blog, Ed Featherston, Pat Romanski

News Feed Item

Wave Virtual Smart Card 2.0 Protects Organizations With Stronger Security at Lower Cost

LEE, MA--(Marketwired - July 22, 2014) - Sophisticated hacking techniques have left businesses more vulnerable than ever while rendering traditional authentication methods inadequate to protect them. That's why Wave Systems Corp. (NASDAQ: WAVX) today unveiled a new kind of virtual smart card that offers stronger authentication at significantly less cost than traditional second-factor authentication options. 

A live webcast of the launch is available on wave.com at 2 p.m. EDT today.

The Wave Virtual Smart Card 2.0 is the industry's only enterprise-grade virtual smart card management solution that works on Windows 7. It also supports Windows 8 and 8.1. Wave's new solution emulates the functionality of physical smart cards or tokens, but offers greater convenience to users, lower total cost of ownership, and a reduced risk of unauthorized use.

Businesses need to adopt virtual smart cards because today's security landscape is riddled with data breaches, and recent hacks have shown that current authentication methods are flawed. Passwords are easy to crack, difficult to remember and expensive to manage. While tokens and physical smart cards may provide strong security, the costs to purchase, maintain and replace them when lost or damaged can quickly rise.

Organizations that deploy Wave Virtual Smart Card 2.0 gain the security of smart card authentication while eliminating the problem of lost or stolen tokens and physical smart cards, resulting in lower costs and fewer help desk incidents. Many large companies report that more than 30% of physical smart cards and tokens must be replaced each year. By switching to virtual smart cards, these companies can save those costs and often 50% or more on the total authentication solution.

How it works
The Wave solution conveniently provisions virtual smart cards to users' devices from a central management server, using the Trusted Platform Module (TPM) security chip as the security foundation for each virtual smart card. The chip's capabilities include the secure storage of credentials such as keys and certificates. These TPM chips have been shipping on most business computers for much of the last decade, with hundreds of millions shipped to date.

The Wave Virtual Smart Card 2.0 solution takes the user identity of the individual and binds it to the unique device identity generated by the TPM chip in the devices that are associated with that user. Even if a hacker were to gain access to the user's valid user credentials, without the device ID credential from one of that user's known and trusted devices, the authentication and access to the environment or application that they were trying to gain access to would be denied. This means that a hacker would have to gain physical control of the targeted user's device, crack the security on the device, and then submit the valid user credentials from that device before its loss is noticed and its access is turned off.

Virtual Smart Card 2.0 enables the enterprise to easily provision, manage and support virtual smart cards for its users. Virtual smart cards provide an attractive and convenient path to increased security over usernames and passwords without the added costs of managing physical smart cards and smart card readers. 

Wave Virtual Smart Card 2.0 gives IT the ability to:

  • Remotely create and delete virtual smart cards
  • Provide help desk-assisted recovery
  • Configure PIN and card policies
  • View the status of virtual smart cards and enrolled certificates
  • Generate reports for compliance
  • Support virtual smart cards on laptops, tablets and desktops with TPM 1.2 or TPM 2.0

"With Wave Virtual Smart Card 2.0, enterprises can avoid many of the headaches of traditional authentication technologies with the same security as using physical smart cards in a PKI environment," said Bill Solms, CEO of Wave. "Virtual smart cards are less expensive to manage, easier and faster to deploy and effectively address the problem of lost or stolen tokens."

"DMI has a long history working with Wave Systems to advance the state-of-the-art in IT security," said Jay Sunny Bajaj, president and CEO of DMI, a global leader in enterprise mobile solutions and Wave Solutions Partner. "Wave's new Virtual Smart Card 2.0 enables us to save our clients money, improve and future-proof their IT security, and enhance the user experience all at the same time."

Wave's virtual smart card solution can help organizations comply with key regulations such as PCI, HIPAA and FFIEC. Many of these regulations require organizations to implement two-factor authentication methods to verify users' identities when remotely connecting to a network.

To learn more and to view today's product release webinar (2 p.m. EDT), visit www.wave.com.

About Wave Systems
Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection and authentication by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group. 

Safe Harbor for Forward-Looking Statements
This press release may contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995 and Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors. Wave assumes no duty to and does not undertake to update forward-looking statements.

All brands are the property of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers ...
Software Development Solution category in The 2015 American Business Awards, and will ultimately be a Gold, Silver, or Bronze Stevie® Award winner in the program. More than 3,300 nominations from organizations of all sizes and in virtually every industry were submitted this year for consideration. "We are honored to be recognized as a leader in the software development industry by the Stevie Awards judges," said Steve Brodie, CEO of Electric Cloud. "We introduced ElectricFlow and our Deploy app...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data...
Mobile commerce traffic is surpassing desktop, yet less than 20% of sales in the U.S. are mobile commerce sales. In his session at 15th Cloud Expo, Dan Franklin, Segment Manager, Commerce, at Verizon Digital Media Services, defined mobile devices and discussed how next generation means simplification. It means taking your digital content and turning it into instantly gratifying experiences.
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists will address the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affec...
SYS-CON Events announced today that EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and database compatibility solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. EDB is the largest provider of Postgres software and services that provides enterprise-class performance and scalability and the open source freedom to divert budget from more costly traditiona...
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
Gartner predicts that the bulk of new IT spending by 2016 will be for cloud platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017. The benefits of the cloud may be clear for applications that can tolerate brief periods of downtime, but for critical applications like SQL Server, Oracle and SAP, companies need a strategy for HA and DR protection. While traditional SAN-based clusters are not possible in these environments, SANless cluste...
Software Defined Storage provides many benefits for customers including agility, flexibility, faster adoption of new technology and cost effectiveness. However, for IT organizations it can be challenging and complex to build your Enterprise Grade Storage from software. In his session at Cloud Expo, Paul Turner, CMO at Cloudian, looked at the new Original Design Manufacturer (ODM) market and how it is changing the storage world. Now Software Defined Storage companies can build Enterprise grade ...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en...
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...