Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Wave Systems Launches Cloud-Based Encryption Service

Wave Systems, a Massachusetts-based provider of encryption and security solutions, this week launched Wave Encryption Service (WES), a cloud-based encryption solution designed to be easy to deploy, manage and enforce.

Wave Systems, a Massachusetts-based provider of encryption and security solutions, this week launched Wave Encryption Service (WES), a cloud-based encryption solution designed to be easy to deploy, manage and enforce.

Wave Systems LogoWES allows organizations of all sizes to centrally enforce strong data encryption policies on laptops across the organization to secure data and meet compliance regulations—without the complexity and cost associated with an on-premise solution.

The solution supports a variety of client encryption solutions, including folder-level software encryption and Microsoft Bitlocker. WES also manages Opal self-encrypting drives (SEDs), which offer security and performance benefits over other forms of encryption.

The Wave Encryption Service offers the following features:

• A Web-based unified management console that allows businesses to organize their devices into policy groups

• Support for multiple encryption technologies ranging from Microsoft BitLocker to self-encrypting hard drives (SEDs)

• Pre-configured policy settings, alerts and reports that show compliance on demand

• A centralized management log to meet safe harbor requirements

• An intelligent client agent that:

• Automatically enrolls target devices

• Implements and enforces centralized policy settings even on disconnected devices

• Locks out data based on centrally designated triggers such as hard drive removal

• One-touch service activation helps customers achieve IT security policy compliance in minutes rather than days

• Low-touch deployment that frees organizations to focus on their core business

• Transparency to end users, with no effects on user actions or system performance

“Some data protection laws on the state and federal level mandate encryption at the endpoint, no matter how big or small the business or the size of its IT budget,” said Brian Berger, Executive Vice President of Marketing and Sales at Wave. “The Wave Encryption Service is designed to provide the same compliance-grade security of an on-premise solution, without the complexity or cost. It can eliminate the need to install or maintain third-party software and can be implemented securely in the Cloud. We believe it is an ideal alternative for the cost-conscious SMB and the enterprise.”

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Software maker Adobe on Tuesday released security patches for 29 documented vulnerabilities across multiple enterprise-facing products and warned that hackers could exploit these bugs...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Google’s Threat Analysis Group (TAG) has shared technical details on an Internet Explorer zero-day vulnerability exploited in attacks by North Korean hacking group APT37.