SlideShare une entreprise Scribd logo
1  sur  21
Establishing security & trust across
the mobile economy

Patrick King
Sales Director Enterprise & Government (EMEA)

© 2014 Wave Systems Corp. All Rights Reserved.
Topics :

• Brief Introduction to Wave
• Drivers for Trust & Security
• Wave’s contribution to date

© 2014 Wave Systems Corp. All Rights Reserved.

2
Brief Introduction
to Wave

© 2014 Wave Systems Corp. All Rights Reserved.

3
An Introduction To Wave...

• The “Trusted Computing Company”
• Enterprise End-Point Device & Data Protection

• Security Embedded By Design
• Innovator & Industry Standards Leader

© 2014 Wave Systems Corp. All Rights Reserved.

4
Wave History and Innovation Legacy

© 2014 Wave Systems Corp. All Rights Reserved.
Drivers for Trust &
Security

© 2014 Wave Systems Corp. All Rights Reserved.

6
Drivers for Trust & Security

•
•
•
•
•
•

More smart phones than people
The rise of tablets
Gathering of “Big-Data”
Concerns over Privacy & IP
Enterprise reputation
EU Data Protection Regulation

© 2014 Wave Systems Corp. All Rights Reserved.
Key Driver For Mobile Trust & Security…

38% of customers said they no
longer did business with the
organisation concerned.
source: Wall St. Journal

32% effected businesses
experienced a decline in share
value
Source: Scott & Scott LLP.

© 2014 Wave Systems Corp. All Rights Reserved.

8
Seven Europeans out of ten are concerned

© 2014 Wave Systems Corp. All Rights Reserved.

9
Opportunities to consider…

Telecom operators and carriers :• Deliver personal „trust‟ services to consumers

• Develop consumer identitymanagement services
• Provide device & application management services
• Mobilize security services.

© 2014 Wave Systems Corp. All Rights Reserved.

10
Opportunities to consider…

Technology and service providers:• Develop location-based security services

• Deliver enterprise-integration-as-a-service
• Offer secure content services
• Create hardware-based security assurance technologies.

© 2014 Wave Systems Corp. All Rights Reserved.

11
Wave’s Contribution
to Date…

© 2014 Wave Systems Corp. All Rights Reserved.

12
Security & Safety Embedded By Design
Automotive Trusted Platform…

© 2014 Wave Systems Corp. All Rights Reserved.

13
Other Trusted Platforms in use every day…

© 2014 Wave Systems Corp. All Rights Reserved.
Trusted Computing Platform by Design:
TPM – (Trusted Platform Module)
Co-Invented and Specified By Wave.

•
•
•
•
•
•
•
•

© 2014 Wave Systems Corp. All Rights Reserved.

Digital Safe for PKIs
Virtual Smart-Card
Device Authentication
Device Integrity State
WiFi Authentication
VPN & Direct Access
Single-PIN Sign-on
HD Encryption Keys

15
Traditional vs. Self-Encrypting Drives
Traditional

OPAL-SED
Self Encrypting Drive

Software Drive Encryption

- Deployment time (hours++)
- Encrypt decrypt failure rate/risk
- Vulnerable
- No real compliance
- Ongoing management costs

+ Deployment in minutes
+ No initial encryption process
+ Less vulnerable
+ Real compliance
+ Lower maintenance costs

A fortune 500 oil company did an analyses and found that SW FDE
was 10 times more expensive then SED’s
© 2014 Wave Systems Corp. All Rights Reserved.
Wave ERAS

© 2014 Wave Systems Corp. All Rights Reserved.
Wave Adds trust & security to
mobile computing by…
Enterprise Security

Open Standards, Trusted Platforms

© 2014 Wave Systems Corp. All Rights Reserved.

Enterprise Management

Secure Network Authentication

Service Delivery (Enterprise, Cloud, SaaS)

Platform Health

Audit and Compliance

Platform Identity
Malware Detection
Trusted Boot

Policy Management

Data Protection

Deployment and Lifecycle Service

Device
Protection

Port
Control

Data
Filtering
(DLP)

Media
Encryption

Known Trusted Platform
Wave Solution User Cases

Data Encryption &
Compliance
Hardened Device Access
& Authentication
Data Protection for
mobile workers
© 2014 Wave Systems Corp. All Rights Reserved.
Summary:
•

Mobile – increasing digitisation across
markets and economies

•

Trust is the currency of the new economy

•

Reputation is everything

•

Security Embedded by Design

•

Consistent, unified policies and regulatory
frameworks are essential.

© 2014 Wave Systems Corp. All Rights Reserved.

20
Thank you.
www.wave.com

© 2014 Wave Systems Corp. All Rights Reserved.

21

Contenu connexe

Tendances

Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti
 
Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...LaRel Rogers
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANJuniper Networks
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesJuniper Networks
 
Remote Worker Series (Part 3)
Remote Worker Series (Part 3)Remote Worker Series (Part 3)
Remote Worker Series (Part 3)Ivanti
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service DeskIvanti
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Ivanti
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIDan Mårtensson
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseJuniper Networks
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7Networks
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationRedChip Companies, Inc.
 

Tendances (19)

Eseye
Eseye Eseye
Eseye
 
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020
 
MaaS Value Prop
MaaS Value PropMaaS Value Prop
MaaS Value Prop
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Remote Worker Series (Part 3)
Remote Worker Series (Part 3)Remote Worker Series (Part 3)
Remote Worker Series (Part 3)
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme!
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor Presentation
 

Similaire à Trust in Mobile Computing

The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
 
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...Denim Group
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre EuclidesTI Safe
 
Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudEmtec Inc.
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraVistara
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Javaterrencebarr
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 

Similaire à Trust in Mobile Computing (20)

The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides
 
Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the Cloud
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Venture Summit 2014, Pankaj Kedia
Venture Summit 2014, Pankaj KediaVenture Summit 2014, Pankaj Kedia
Venture Summit 2014, Pankaj Kedia
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With Vistara
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 

Plus de E Radar

Mobile Digital Evidence And Forensics
Mobile Digital Evidence And ForensicsMobile Digital Evidence And Forensics
Mobile Digital Evidence And ForensicsE Radar
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 
Impact of Mobile on Data Compliance
Impact of Mobile on Data ComplianceImpact of Mobile on Data Compliance
Impact of Mobile on Data ComplianceE Radar
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsE Radar
 
Securing Mobile Payments
Securing Mobile PaymentsSecuring Mobile Payments
Securing Mobile PaymentsE Radar
 
Mobile Digital Evidence
Mobile Digital EvidenceMobile Digital Evidence
Mobile Digital EvidenceE Radar
 
05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own DeviceE Radar
 
IT Security through governance, compliance and risk
IT Security through governance, compliance and riskIT Security through governance, compliance and risk
IT Security through governance, compliance and riskE Radar
 

Plus de E Radar (8)

Mobile Digital Evidence And Forensics
Mobile Digital Evidence And ForensicsMobile Digital Evidence And Forensics
Mobile Digital Evidence And Forensics
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Impact of Mobile on Data Compliance
Impact of Mobile on Data ComplianceImpact of Mobile on Data Compliance
Impact of Mobile on Data Compliance
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEs
 
Securing Mobile Payments
Securing Mobile PaymentsSecuring Mobile Payments
Securing Mobile Payments
 
Mobile Digital Evidence
Mobile Digital EvidenceMobile Digital Evidence
Mobile Digital Evidence
 
05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device
 
IT Security through governance, compliance and risk
IT Security through governance, compliance and riskIT Security through governance, compliance and risk
IT Security through governance, compliance and risk
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Trust in Mobile Computing

  • 1. Establishing security & trust across the mobile economy Patrick King Sales Director Enterprise & Government (EMEA) © 2014 Wave Systems Corp. All Rights Reserved.
  • 2. Topics : • Brief Introduction to Wave • Drivers for Trust & Security • Wave’s contribution to date © 2014 Wave Systems Corp. All Rights Reserved. 2
  • 3. Brief Introduction to Wave © 2014 Wave Systems Corp. All Rights Reserved. 3
  • 4. An Introduction To Wave... • The “Trusted Computing Company” • Enterprise End-Point Device & Data Protection • Security Embedded By Design • Innovator & Industry Standards Leader © 2014 Wave Systems Corp. All Rights Reserved. 4
  • 5. Wave History and Innovation Legacy © 2014 Wave Systems Corp. All Rights Reserved.
  • 6. Drivers for Trust & Security © 2014 Wave Systems Corp. All Rights Reserved. 6
  • 7. Drivers for Trust & Security • • • • • • More smart phones than people The rise of tablets Gathering of “Big-Data” Concerns over Privacy & IP Enterprise reputation EU Data Protection Regulation © 2014 Wave Systems Corp. All Rights Reserved.
  • 8. Key Driver For Mobile Trust & Security… 38% of customers said they no longer did business with the organisation concerned. source: Wall St. Journal 32% effected businesses experienced a decline in share value Source: Scott & Scott LLP. © 2014 Wave Systems Corp. All Rights Reserved. 8
  • 9. Seven Europeans out of ten are concerned © 2014 Wave Systems Corp. All Rights Reserved. 9
  • 10. Opportunities to consider… Telecom operators and carriers :• Deliver personal „trust‟ services to consumers • Develop consumer identitymanagement services • Provide device & application management services • Mobilize security services. © 2014 Wave Systems Corp. All Rights Reserved. 10
  • 11. Opportunities to consider… Technology and service providers:• Develop location-based security services • Deliver enterprise-integration-as-a-service • Offer secure content services • Create hardware-based security assurance technologies. © 2014 Wave Systems Corp. All Rights Reserved. 11
  • 12. Wave’s Contribution to Date… © 2014 Wave Systems Corp. All Rights Reserved. 12
  • 13. Security & Safety Embedded By Design Automotive Trusted Platform… © 2014 Wave Systems Corp. All Rights Reserved. 13
  • 14. Other Trusted Platforms in use every day… © 2014 Wave Systems Corp. All Rights Reserved.
  • 15. Trusted Computing Platform by Design: TPM – (Trusted Platform Module) Co-Invented and Specified By Wave. • • • • • • • • © 2014 Wave Systems Corp. All Rights Reserved. Digital Safe for PKIs Virtual Smart-Card Device Authentication Device Integrity State WiFi Authentication VPN & Direct Access Single-PIN Sign-on HD Encryption Keys 15
  • 16. Traditional vs. Self-Encrypting Drives Traditional OPAL-SED Self Encrypting Drive Software Drive Encryption - Deployment time (hours++) - Encrypt decrypt failure rate/risk - Vulnerable - No real compliance - Ongoing management costs + Deployment in minutes + No initial encryption process + Less vulnerable + Real compliance + Lower maintenance costs A fortune 500 oil company did an analyses and found that SW FDE was 10 times more expensive then SED’s © 2014 Wave Systems Corp. All Rights Reserved.
  • 17. Wave ERAS © 2014 Wave Systems Corp. All Rights Reserved.
  • 18. Wave Adds trust & security to mobile computing by… Enterprise Security Open Standards, Trusted Platforms © 2014 Wave Systems Corp. All Rights Reserved. Enterprise Management Secure Network Authentication Service Delivery (Enterprise, Cloud, SaaS) Platform Health Audit and Compliance Platform Identity Malware Detection Trusted Boot Policy Management Data Protection Deployment and Lifecycle Service Device Protection Port Control Data Filtering (DLP) Media Encryption Known Trusted Platform
  • 19. Wave Solution User Cases Data Encryption & Compliance Hardened Device Access & Authentication Data Protection for mobile workers © 2014 Wave Systems Corp. All Rights Reserved.
  • 20. Summary: • Mobile – increasing digitisation across markets and economies • Trust is the currency of the new economy • Reputation is everything • Security Embedded by Design • Consistent, unified policies and regulatory frameworks are essential. © 2014 Wave Systems Corp. All Rights Reserved. 20
  • 21. Thank you. www.wave.com © 2014 Wave Systems Corp. All Rights Reserved. 21

Notes de l'éditeur

  1. Robert Sprague – Sprague Electronics - Capacitors in 50’s to 80’s Peter J Sprague - Founders of Nat Semi in 1960’s Nolan Bushnell – Founder of Atari (Co Authored iTunes)Robert Thibadeau – Inventor of SED
  2. 2 billion smart phones and growingData analytics – unbridled spying and cynical manipulation?Privacy and intellectual property?Quality “Kite Mark” for best practice (Truste.com)Sony PSN – 77m accounts exposed - $millions lost + share price bombed.NHS – sold patient data to insurance industry.ICO – overtaken by EU…Vice-President Viviane Reding, the EU's Justice Commissioner said ahead of data protection day (which is on 28 January): "Data protection in the European Union is a fundamental right. Europe already has the highest level of data protection in the world. With the EU data protection reform which was proposed exactly two years ago – in January 2012 – Europe has the chance to make these rules a global gold standard. These rules will benefit citizens who want to be able to trust online services, and the small and medium sized businesses looking at a single market of more than 500 million consumers as an untapped opportunity. The European Parliament has led the way by voting overwhelmingly in favour of these rules. I wish to see full speed on data protection in 2014."
  3. The mobile industry has a significant role to play to build trust in the digital economy and to ensure interoperability across Member States and across sectors in the EU Single Market. By helping everyone and everything to get connected securely and conveniently, mobile identity is increasing market digitisation with tremendous socio-economic impacts across different industry verticals ranging from m-health, m-banking, m-government, m-commerce and others.To ensure mobile’s role and the benefits of mobile are fully realised, will require consistent approaches across the emerging policies and regulatory frameworks. In the emerging mobile identity market, the protection of privacy and security is a key issue, and industry, governments and regulators need to work closely together to clarify their roles and responsibilities.