Wave Demos Products Alongside Partners at IT-SA

By Boudewijn Kiljan

This year’s IT-SA conference was held in Nuremberg, Germany on October 7 – 9. It is, by far, the largest security conference in the DACH area (German-speaking countries in central Europe). In fact, this year’s conference enjoyed record-setting numbers, including 7,400 trade visitors and 385 exhibitors from 21 countries.

This year, Wave was present at both the Infinigate and Protea booths, offering product demos and general information about Wave solutions. As Wave partners that are selling Wave products in the DACH area, Infinigate and Protea staff members were able to offer extensive knowledge about the Wave solution portfolio on the exhibit floor.

Read More …

Trusted Cyber Collaboration Workshop Tackles Compliance, Complexity and Cost

By John Fitzgerald

Members of the Trusted Computing Group (TCG) will come together to present a half-day session titled, “Where Trust Begins: A Look at Trusted Computing and Security Automation in the Real World” at the Trusted Cyber Collaboration Workshop in Arlington, Virginia on September 24, 2014.

The three-day event, hosted by the Transglobal Secure Collaboration Program (TSCP), is focused on secure collaboration among industry partners and their supply chain members to mitigate the risk of IT security breaches and to accelerate secure information sharing, while reducing overall costs.

Read More …

Wave Joins Ultimate Industrial Internet Think Tank

While technically considered still in its infancy, the Industrial Internet Consortium (IIC) sure isn’t acting like it. Founded in March 2014, this conglomerate nonprofit was formed by an impressive group of industrial giants: AT&T, Cisco, GE, IBM and Intel. And this month, Wave was officially welcomed as a new member of this bold industrial cooperative.

Read More …

Wave Virtual Smart Card Named Gold Winner at Golden Bridge Awards

Wave Systems has been announced as Gold Winner in the “Information Technology (Software) Innovations” category at the 6th Annual Golden Bridge Awards. Wave won for Wave Virtual Smart Card 2.0, our new solution for secure device authentication. (Two years ago, Wave won top honors for deploying and managing SEDs in the “Case Study and Deployment” category.)

“Our product development team has done a terrific job,” said Bill Solms, CEO of Wave Systems. “Enterprise security breaches are occurring with increasing frequency and severity. We challenged our team to deliver a solution that would transform an organization’s ability to secure itself from these malicious cyberattacks. Wave Virtual Smart Card now offers an essential line of defense to organizations requiring strong access protections.”

Wave CEO Bill Solms with Wave's Golden Bridge Award.

Wave CEO Bill Solms with Wave’s Golden Bridge Award.

2014_GBA_logo

HITECH Compliance – You Can’t Wiggle Your Way Out of This One

At this year’s HIMSS Privacy and Security Forum held in Boston on September 8, I’ll have the pleasure of joining IT security leaders from Kaiser Permanente and Providence Health & Services to address security compliance and the BYOD movement in a session titled, “The BYOD Tightrope: Balance User Demands and Your Organization’s Risk Tolerance.” My peers and I will touch on the pros and cons of adopting a BYOD policy, the technologies and the strategies used to manage BYOD risk, and how best to secure devices and patient information without disrupting workflow.

I have spoken many times about healthcare data and IT security on behalf of Wave Systems. With its many new programs and mandates, the U.S. healthcare system has experienced somewhat of a rebirth that began decades ago and was more recently reinforced by President Obama’s Healthcare Information Technology for Economic and Clinical Health (HITECH) Act in 2009, which authorized billions of dollars in federal subsidies for the meaningful use of electronic health records (EHRs). This Act includes both rewards (in the way of bonuses) and punishments (a decline in Medicare reimbursement rates) for healthcare institutions based on their adoption of these newly enforced healthcare IT laws.

Read More …