Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
LEE, MA -- (Marketwired) -- 11/18/13 -- Wave Systems Corp. (NASDAQ: WAVX) will demonstrate its comprehensive solution for activating and managing virtual smart cards for Windows 7, 8 and 8.1 at the Gartner Identity & Access Management Summit 2013, taking place this week at the J.W. Marriott in Los Angeles.
Virtual smart cards emulate the functionality of traditional smart cards but do not require the use of a separate physical card or a reader as they use the Trusted Platform Module (TPM) chip on the PC. Wave introduced its virtual smart card feature for Windows 7 last year.
"The Gartner Identity and Access Management Summit is the ideal forum for us to show IT decision-makers how virtual smart cards can provide an added layer of security for both local and remote access of the endpoint," said Wave CEO Bill Solms. "Virtual smart cards let organizations integrate device identity management on top of an existing user identity management program, creating a layered approach to security that is much more effective."
Physical smart cards and virtual smart cards offer comparable levels of security, yet virtual smart cards deployed by Wave require no additional material acquisition costs and are less expensive to provision and manage. Enterprises enjoy lower total cost of ownership and save by eliminating hardware token deployment.
The Wave team will demonstrate use of a virtual smart card for endpoint, local and remote access.
The Gartner Identity & Access Management Summit is the premier gathering for IT professionals responsible for IAM programs, with more than 50 analyst-led sessions. Attendees include CISO, CSO, CIOs, IT directors, network security managers and directors.
About Wave Systems
Wave Systems Corp. reduces the complexity, cost and uncertainty of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave is a leading expert in this growing trend and is leading the way with first-to-market solutions and helped shape standards through its board seat on the Trusted Computing Group.
Safe Harbor for Forward-Looking Statements
This press release may contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995 and Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors. Wave assumes no duty to and does not undertake to update forward-looking statements.
All brands are the property of their respective owners.
Company:
Wave Systems Corp.
Michael Wheeler
413-243-7026
mwheeler@wave.com
Investor Relations:
David Collins, Eric Lentini
212-924-9800
wavx@catalyst-ir.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs