Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Wave Systems Gets U.S. Army Contract

Wave Systems Gets U.S. Army Contract for Encryption Management for Vehicle-Based Mobile Computers

Wave Systems, a Massachusetts-based provider of security, data protection, and encryption solutions, today announced that it has received a contract from the United States Army to provide labor, equipment and management to implement solutions for the Army’s self-encrypting drives (SEDs).

Wave Systems Gets U.S. Army Contract for Encryption Management for Vehicle-Based Mobile Computers

Wave Systems, a Massachusetts-based provider of security, data protection, and encryption solutions, today announced that it has received a contract from the United States Army to provide labor, equipment and management to implement solutions for the Army’s self-encrypting drives (SEDs).

According to Wave, the Army is exploring the enablement of SEDs with Trusted Platform Modules (TPMs) in its systems in order to reduce the risk of sensitive data falling into enemy hands if such enemies were able to get their hands on hardware.

Wave SystemsWave did not disclose the value of the contract, but did say that its fees under the contract would be modest. Despite the modest contract value, the company views it as as an important application of trusted computing solutions by the Army, and the news appeared to please investors, with shares of Wave Systems (NASDAQ:WAVX) closing up over 18 percent at the close of trading on Tuesday.

Wave also said that the Army asked the company to provide expertise in the area of SEDs and TPMs to help maximize the security advantage of these technologies while minimizing the disruptive impact to Army’s fielding and sustainment. Wave will also provide engineering support to Army missions in support of global operations.

“This contract affirms the value and leadership that Wave brings in leveraging embedded security for mobile endpoints operating beyond the network perimeter,” said Steven Sprague, CEO for Wave. “We’re delighted to have the opportunity to help ensure that mission-critical data and communications remains under the secure control of central command at all times.”

Trusted computing standards provide capabilities that can be leveraged in many mission systems where device assurance and integrity and data protection are required.

According to the Trusted Computing Group (TCG), the international industry standards group that develops specifications and standards for Trusted Computing Technology, the term “trusted computing” refers to applications that leverage hardware-based “roots of trust” at the edge of the network and at the endpoints – sometimes referred to as “hardware anchors in a sea of untrusted software” – for higher assurance.

As the adoption of trusted computing continues to grow across all platforms, there are many ways this industry-standard technology can be leveraged to reduce costs and improve security and assurance of any computing system.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

Paul Calatayud has been named CISO of developer security posture management firm Archipelo.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.