Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Wave Cloud Centrally Manages Self-encrypting Drives

Wave Systems, a Massachusetts-based provider of security, data protection and encryption solutions, today launched a subscription-based cloud service to help enterprises simplify management of self-encrypting drives (SEDs).

Wave Systems, a Massachusetts-based provider of security, data protection and encryption solutions, today launched a subscription-based cloud service to help enterprises simplify management of self-encrypting drives (SEDs).

Dubbed Wave Cloud, the service allows enterprises to centrally manage hardware-based data encryption, Wave Systems said Wednesday. Organizations interested in using SEDs within the enterprise have traditionally found it expensive and complex to manage. On-premise management also generally required dedicated servers and in-house experts to configure each drive and track where the drives are being used, Wave said.

Wave Systems WaveCloud allows the organization to quickly configure all of the SEDs from one central console using the point-and-click interface. Because configuring the drives is so simple, large-scale SED deployments are easier and faster. As a cloud platform, Wave Cloud customers also don’t have to make any server investments or disrupt the existing architecture. The subscription fee, starting at $37 per drive per year, scales to match the scope of protection customers wind up using.

“Wave Cloud opens the door for a new generation of users to discover the top-shelf endpoint data protectin afforded by SEDs,” said Brian Berger, Wave’s executive president of marketing and sales.

The platform gives organizations the ability to remotely manage the drives, enforce security policies, and retrieve passwords, Berger explained.

Related ReadingFull Disk Encryption Proves Its Worth, Ponemon Study

Hardware encryption has several advantages over software encryption, but the high cost of management and the associated complexity have deterred organizations from widespread deployment. SEDs provide one of the best defenses against data breach, since if the laptop is lost, the data is already encrypted and there’s no way for the user to turn it off.

The hardware encryption offered in SEDs have better performance, allow for faster deployment, and provide enhanced security, compared to software-based encryption products, according to Wave. The SEDs are generally faster because encryption happens on a chip and doesn’t have to wait for the computer to free up processing cycles. It is also not possible for the end-user to compromise the built-in encryption and SEDs are impervious to cold-boot or side channel attacks, according to Wave.

Wave is planning on additional features for Wave Cloud, expected later this year. The new capabilities include automatic enrollment of SEDs, easy integration with Microsoft BitLocker encryption and Windows 8 eDrive technology, and the ability to pair a device’s SED and Trusted Platform Module, according to the company. By pairing the SED with the TPM chip, organizations could switch off user authentication when the SED is not on the network. There were no details available at this time on exact timing.

Related ReadingImation Expands Line Of Hardware Encrypted USB Hard Drives

Related ReadingUSB “Ciphering Dongle” Offers Instant Full Disk Encryption for USB Drives

Related ReadingProjections Suggest Rapid Shift to Self-Encrypting Drives Over Next Two Years

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Cybercrime

A database containing over 235 million unique records of Twitter users is now available for free on the web, cybercrime intelligence firm Hudson Rock...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...