Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Wave Systems Gets U.S. Army Contract

Wave Systems Gets U.S. Army Contract for Encryption Management for Vehicle-Based Mobile Computers

Wave Systems, a Massachusetts-based provider of security, data protection, and encryption solutions, today announced that it has received a contract from the United States Army to provide labor, equipment and management to implement solutions for the Army’s self-encrypting drives (SEDs).

Wave Systems Gets U.S. Army Contract for Encryption Management for Vehicle-Based Mobile Computers

Wave Systems, a Massachusetts-based provider of security, data protection, and encryption solutions, today announced that it has received a contract from the United States Army to provide labor, equipment and management to implement solutions for the Army’s self-encrypting drives (SEDs).

According to Wave, the Army is exploring the enablement of SEDs with Trusted Platform Modules (TPMs) in its systems in order to reduce the risk of sensitive data falling into enemy hands if such enemies were able to get their hands on hardware.

Wave SystemsWave did not disclose the value of the contract, but did say that its fees under the contract would be modest. Despite the modest contract value, the company views it as as an important application of trusted computing solutions by the Army, and the news appeared to please investors, with shares of Wave Systems (NASDAQ:WAVX) closing up over 18 percent at the close of trading on Tuesday.

Wave also said that the Army asked the company to provide expertise in the area of SEDs and TPMs to help maximize the security advantage of these technologies while minimizing the disruptive impact to Army’s fielding and sustainment. Wave will also provide engineering support to Army missions in support of global operations.

“This contract affirms the value and leadership that Wave brings in leveraging embedded security for mobile endpoints operating beyond the network perimeter,” said Steven Sprague, CEO for Wave. “We’re delighted to have the opportunity to help ensure that mission-critical data and communications remains under the secure control of central command at all times.”

Trusted computing standards provide capabilities that can be leveraged in many mission systems where device assurance and integrity and data protection are required.

According to the Trusted Computing Group (TCG), the international industry standards group that develops specifications and standards for Trusted Computing Technology, the term “trusted computing” refers to applications that leverage hardware-based “roots of trust” at the edge of the network and at the endpoints – sometimes referred to as “hardware anchors in a sea of untrusted software” – for higher assurance.

As the adoption of trusted computing continues to grow across all platforms, there are many ways this industry-standard technology can be leveraged to reduce costs and improve security and assurance of any computing system.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...