Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
LEE, MA -- (Marketwire) -- 05/23/12 -- Wave Systems Corp. (NASDAQ: WAVX) announced today that CEO Steven Sprague will join representatives from Microsoft, the NSA and Fixmo to discuss the importance of trusted computing in solving security problems organizations face every day. The panel presentation takes place Thursday, May 24th, at the 15th annual Secure Communications and Computing User Conference and Training at The Paris Hotel, Las Vegas, Nevada.
Trusted computing offers compelling security benefits for global enterprises facing serious cyber threats. The technology gives organizations a new paradigm for device authentication and trusted execution, along with faster and more secure encryption based in hardware. Technologies such as the Trusted Platform Module (TPM), a cryptographic chip built on open industry standards defined by the Trusted Computing Group, can enable a myriad of advanced security features. Applications include ensuring only known devices have access to the corporate network and measuring and reporting on the health of the pre-boot environment.
WHAT:
Panel presentation, "Knowing Who and What Is on Your Network: Trusted Computing Challenges and Solutions for Government and Industry"
WHO:
Leslie Andresen, General Dynamics C4 Systems (Moderator); Steven Sprague, Wave Systems; Rick Segal, Fixmo Inc.; Atul Shah, Trustworthy Computing Division, Microsoft Corporation; and Marianne Bailey, National Security Agency's Information Assurance Directorate.
About Wave Systems
Wave Systems Corp. (NASDAQ: WAVX) reduces the complexity, cost and uncertainty of data protection by starting inside the device. Unlike other vendors who try to secure information by adding layers of software for security, Wave leverages the security capabilities built directly into endpoint computing platforms themselves. Wave has been a foremost expert on this growing trend, leading the way with first-to-market solutions and helping shape standards through its work as a board member for the Trusted Computing Group.
Safe Harbor for Forward-Looking Statements
This press release may contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995 and Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company's financing plans; (ii) trends affecting the company's financial condition or results of operations; (iii) the company's growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company's ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors. Wave assumes no duty to and does not undertake to update forward-looking statements.
All brands are the property of their respective owners.
Company:
Wave Systems Corp.
Michael Wheeler
413-243-7026
mwheeler@wavesys.com
Investor Relations
David Collins, Eric Lentini
Catalyst Global
212-924-9800 office
917-734-0339 mobile
wavx@catalyst-ir.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs