Wave Announces Availability of EMBASSY® EMBASSY Network Access Control and Endpoint Enforcer Security Solutions at InterOp New York

Network Access Control for Existing Infrastructure Available Now: Product Demonstrations at InterOp Trusted Network Connect Event

Wave’s new network security solutions will be demonstrated at InterOp, in a Trusted Network Connect event co-sponsored by Wave on Wednesday, September 20 (Room 2D08 — details below)

Lee, MA– September 18, 2006 — Wave Systems Corp. (NASDAQ:WAVX www.wave.com) today announced the availability of two new IT security products, introducing EMBASSY® Network Access Control and EMBASSY® Endpoint Enforcer. EMBASSY Network Access Control is designed to leverage existing network infrastructure and open industry standards for IT control over which PC clients can be used to access a network, locking out unauthorized machines. EMBASSY Endpoint Enforcer (EEE) is an open, standards-based solution designed to work with many network access control solutions. Wave is demonstrating interoperability with the Trusted Computing Group (TCG) protocol known as Trusted Network Connect (TNC). Wave plans to develop a version of EEE that is also interoperable with Microsoft’s® NAP and Cisco’s® NAC architecture.

EMBASSY Network Access Control (ENAC) is a network security solution designed to lock down the network from unauthorized access and to mitigate many common and damaging network attacks. ENAC is designed to provide strong network access security by leveraging the strong identity features in the Trusted Platform Module (TPM) hardware, a security chip housed on tens of millions of PCs shipping today. ENAC builds upon Wave’s widely available EMBASSY® Trust Suite (ETS) client software, which provides TPM management functions and Public Key Infrastructure (PKI) enrollment functions to embed PKI identity features in TPM-enabled clients and standard Microsoft server PKI infrastructure. Interoperability with unmodified Microsoft server 2003 makes ENAC easy to deploy, and enforcement using GPO and Active Directory makes it easy to manage.

"We believe that EMBASSY Network Access Control fills a market need for network security based on strong platform identity and addresses an immediate opportunity for trusted computing in the enterprise," said Aidan Herbert, senior product manager for Wave Systems. "IT managers that require the client security of TPM hardware security can benefit from an easy, plug-in architecture for their server environments. By providing interoperability with Microsoft server 2003, we believe that EMBASSY Network Access Control can meet many current needs for trusted computing solutions access control with an open, standards-based alternative to proprietary solutions. This offers an easy first step to start adopting the TPM security standards that the industry has started shipping in volume as a new security architecture for PCs."

Wave’s EMBASSY Endpoint Enforcer is a network security product that enables third-party applications and services to make informed network access decisions. It is a client and server application designed to capture, report and validate platform integrity metrics on PCs equipped with TPM security chips. Based on validation by EMBASSY Endpoint Enforcer, network access control systems are assured of the integrity of the client system’s foundation, including the network access control system itself.

EMBASSY Endpoint Enforcer includes a software developer’s kit for integration with any network access control or endpoint integrity solutions desiring to base the security of their solutions on the trustworthiness of TPM hardware. By leveraging the developer’s kit, enterprises can tap the power of trusted computing and hardware security to integrate the solution into their existing enterprise security strategy. EMBASSY Endpoint Enforcer is currently compatible with the Trusted Network Connect specification for endpoint integrity that is specified by the Trusted Computing Group but is also designed to accommodate various network access control architectures.

Savings, Security for the Enterprise
A recent study of Department of Justice network crime prosecutions reveals most attacks used stolen IDs and passwords; the average damage was more than $1.5 million per occurrence. The study conducted by Trusted Strategies, L.L.C. shows that the majority of attacks would have been thwarted if platform authentication was used for network access control.

http://www.netsecurity.org/dl/articles/ReportDOJ_Computer_Crime_Prosecutions.pdf

Advanced technologies for network access control improve the enforcement of network security policies to reduce system compromises, downtime, and data loss. IT departments benefit as endpoints, applications, and network equipment work together to efficiently manage security. Choosing the EMBASSY Endpoint Enforcer adds value by (1) allowing users to use many favored platforms, virus software, and security appliances, (2) enabling IT departments to choose among a variety of interoperable solutions, and (3) allowing users to employ an open standards approach that reduces complexity of integration with the use of these open API’s from the TCG. The end objective is a healthier and more secure network at a lower total cost of ownership.

See the Products Live at InterOp NY
Wave Systems is demonstrating the advanced features of the EMBASSY Endpoint Enforcer and a complementary network access control solution at InterOp New York, both in the InterOp Labs and at the Trusted Computing Group event, "Trusted Network Connect and protecting the enterprise network" (Wednesday, September 20, 2006, Javits Convention Center in Room 2D08, 11:00 a.m., 2:15 p.m. and the 4:00 p.m. invitation-only networking reception). Wave is co-sponsoring the event with HP Procurve, Juniper Networks, Patchlink, Trapeze and Vernier Networks. Experts on network access control from leading networking vendors and from the Trusted Computing Group will review network access control solutions, the Trusted Network Connect architecture and its implementations, and multi-vendor demonstrations of TNC products/solutions in deployment.

TNC is a security architecture promoted by the Trusted Computing Group, designed to improve the security policy compliance of clients during the network connection process. TNC establishes a level of network access based on the configuration and integrity of the client. Network administrators implementing Trusted Network Connect solutions expect to have fewer security problems, lower support costs and less downtime caused by poorly configured or infected client systems. Wave Systems has developed the EMBASSY Endpoint Enforcer based upon an upcoming TNC interface specification from the Trusted Computing Group known as Platform Trust Service (IF-PTS).

Wave’s demonstrations will show how client measurement and server validation components of EMBASSY Endpoint Enforcer work together with the TPM and network access control solutions to secure its foundation, thus further locking down the security to the corporate network.

"Wave is enthusiastic about providing a hardware-based security option for network access control solutions," said Craig Werhan, senior product manager, Wave Systems. "The added assurance provided by EMBASSY Endpoint Enforcer that a PC or its security components have not been compromised prior to granting access to network resources is the foundation to the whole concept of controlling endpoints and their access to networks."

Wave also offers EMBASSY Trust Suite, the EMBASSY® Key Management Server (EKMS), and the EMBASSY® Authentication Server (EAS), which are designed to deliver improved trusted computing features for enterprise and government markets. These features include network policy management, data protection, and strong authentication using biometrics, smart cards and TPMs.

For more information about Wave’s products and services, please visit www.wave.com.

Wave Logo

About Wave Systems Corp.

Wave is a pioneer in hardware-based PC security that provides software to help solve critical enterprise PC security challenges such as data protection, strong authentication, network access control and the management of these enterprise functions.  Wave is a founding member of the Trusted Computing Group (TCG), a consortium of more than 100 companies that forged open standards for hardware security.  Wave’s EMBASSY® line of client- and server-side software leverages and manages the security functions of the TCG’s industry standard hardware security chip, the Trusted Platform Module (TPM) as well as hard drives that comply with TCG’s “Opal” self-encrypting drive (SED) standard.  Self-encrypting drives are a growing segment of the data protection market, offering increased security and better performance than most existing software-based encryption solutions.  TPMs are standard equipment on many enterprise-class PCs shipping today and have shipped on an estimated 300 million PCs worldwide.  Using TPMs and/or SEDs and Wave software, enterprises can substantially and cost-effectively strengthen their current security solutions.  Visit http://www.wave.com for more information.

Safe Harbor for Forward Looking Statements

Under the Private Securities Litigation Reform Act of 1995. This press release may contain forward-looking information within the meaning of Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company’s financing plans; (ii) trends affecting the company’s financial condition or results of operations; (iii) the company’s growth strategy and operating strategy; and (iv) the declaration and payment of dividends. The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements. Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company’s ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors.

All brands are the property of their respective owners.

For more information please contact:

Company:
Wave Systems Corp.
Michael Wheeler
413-243-7026
mwheeler@wave.com
Wave Media Contact:
Schwartz Communications, Inc.
Michael Schultz /Katie Potter
781-684-0770
wavesystems@schwartz-pr.com
Wave Investor Relations Contact
David Collins, Ratula Roy
Catalyst Global LLC
212-924-9800
wavx@catalyst-ir.com

Stay up-to-date on news relating to Wave. Join our email list by putting your email address in the space below.