WHAT ARE TRUSTED COMPUTERS?
Trusted Computers are a new generation ofPCs having a Trusted Platform Module
(TPM) security chip that adds anextra layer of security with
convenience, improvingthe quality of personalcomputing.
WHAT CAN I DO WITH ATRUSTED COMPUTER?
Using Wave’s secure software, you can add protection tothe critical information that you or your company values.
You can also strengthen accessto external
networks andsystems. Andwith yourWindows®
network, youcan nowenhance thenetwork'ssecurity with afew simple
configurations.
WHY DO I NEED ONE?
With the ever increasing threat to identities and sensitiveinformation, effective solutions can no longer be based on software-only solutions, but on hardware whichTrusted Computerscontain.
You Need Trusted Computingwww.wave.com
IS IT EASY TOGET STARTED?
Sure. Buy a new TrustedComputer. There are lots ofchoices available. You mightalready own one! Wave'ssoftware makes the newsecurity features easy to use so you can get startedimmediately.
Go to www.wave.com/solutions/getting_started.htmlfor more information on compatible PCs.
Top problems and threatsthat Trusted Computers solve:
Identity theft and impersonationthrough unprotected passwords andsensitive information.Unauthorized network access, such asto a corporate network, a wirelessnetwork, or a Virtual Private Network.Regulatory compliance issues for strongauthentication and data protection.Unauthorized access to unprotectedfiles, documents, or email on client PCsor servers.Escalating security costs by solutionsoffering minimal return on investment.
SKU: A0436206
You can solve regulatorycompliance issues, protect yourcompany's critical intellectualproperty, and add strongauthentication for a VPN orwireless network, for example.
a. Verify that the TPM chip is enabled.b. Check that the management software is
installed – generically called the TSS (TCG Software Stack).
c. Install the Wave EMBASSY Trust Suitesoftware – directly or through a softwaredistribution tool.
a. Identify a server that is part of the desired domain.b. Install the Wave server software.c. Configure user policies on client machines or
distribute policies across the network.Network distribution is an optional step toprovide centralized management andcontrol of user policies.
Experience thebenefits ofincreased PC security.
Easy Steps
to Enterprise Securitywith Wave’s
EMBASSY® Trust Suite
Consumers and businesses are demanding a computing environment that is moretrusted, private, safe and secure. Wave is the leader in delivering trusted computingapplications and services with advanced products, infrastructure and solutions across
multiple trusted platforms from a variety of vendors. Wave holds a portfolio of significant fundamental patents in securityand e-commerce applications and employs some of the world's leading security systems architects and engineers. More information available at www.wave.com. Part # 03-000175Wave Systems Corp.480 Pleasant Street, Lee, MA 01238 tel (877) 228-WAVE
Copyright © 2005 Wave Systems Corp. All rights reserved. Wave “Juggler” and EMBASSY logo are registered trademarks of Wave Systems Corp.All other brands are the property of their respective owners. Distributed by Wave Systems Corp. Specifications are subject to change without notice.
The Trusted Computer Group (TCG) is a new industry group dedicated toembedding trust and security more broadly into computing platforms anddevices. The TCG will work to create open standards that can be adopted for usein products and solutions across the spectrum of computing, including devicesbeyond the PC, to enable secure and trustworthy computing that can protectdata, privacy and individual rights.
Set up a server formanagement of theWave solutions:
Identify a pilotgroup of users.
Train the pilot users.
Ensure that the pilot users have Trusted PCs.
Set up the pilot PCs:
Identify a business needfor stronger security:
Roll out to secureenterprise:
7
More information is available at
www.wave.com
Step Step Step
StepStep
StepStep