Wave Senior Executives to Present at First Annual NSA Trusted Computing Conference Sept. 14-16

New Series of Trusted Computing Video Podcasts Launched, Featuring Wave CEO Steven Sprague Discussing Hardware Security Benefits, Value and Deployments

Lee, MA August 26, 2010 — Wave Systems Corp. (NASDAQ:WAVX www.wave.com) today announced that its President and CEO, Steven Sprague, and Executive Vice President of Marketing & Sales, Brian Berger, will join security experts from academia, government and industry to speak at the National Security Agency’s (NSA) Trusted Computing Conference and Exposition (Orlando, September 14-16). Invited speakers include Susan Alexander of the Office of the Director of National Intelligence.

The Trusted Computing Conference will educate government and industry alike on how to protect data, systems and networks by leveraging embedded hardware security built on open industry standards. The NSA-sponsored event is hosted by the Trusted Computing Division of the NCSC (NSA Commercial Solutions Center ) charged with harnessing the power of US commercial technology for national security, and the High Assurance Platform® (HAP) program office, which has brought together the latest commercial Trusted Computing technologies to form Reference Implementations of secure IT enterprise environments to include areas such as workstations, networks and enterprise-level cloud administration.

On Wednesday, Wave Executive Vice President Brian Berger, in his capacity as Trusted Computing Group (TCG) Director and Chair of the TCG Marketing Work Group, will address conference attendees at the Plenary Session at 8:45 a.m. in a presentation titled, "TCG, the Organization, Its Work, the Future—Plus a Snapshot on Trusted Computing and its Global Adoption."

Later that afternoon, Wave President and CEO, Steven Sprague, will host a Break-out Session titled, "Self-Encrypting Drives and Trusted Platform Modules (TPMs): A Commercial Off the Shelf (COTS) Solution for HAP Capabilities on Standardized Enterprise PCs" from 2:00 to 2:45 p.m.

Wave will also be showing both practical and leading-edge technology demonstrations as part of the NSA Conference program. At 2 p.m. on Tuesday, a 45-minute session will cover basic Trusted Computing implementations that virtually all organizations could implement today. These demonstrations will include the use of the TPM for enhancing security of wireless access points and VPN connections. At 4:30 on Wednesday, another 45- minute session will showcase the advanced Trusted Computing capabilities of TPMs and SEDs: self-healing; multi-user and OS models on single workstations in encryption-protected mode; and use of Intel’s vPro™ Technology for the offline management of SEDs. Wave will demonstrate various implementations of these basic and advanced security applications at its booth (#205).

New Videos Cover Trusted Computing 101
With increased interest in Trusted Computing brought on by the conference, Wave is also announcing the launch of a video podcast series on Trusted Computing—providing an overview and education on how industry standard hardware security can address cyber security threats. The first series of three podcasts is published today — introducing Trusted Computing, and exploring the most common ways that enterprise and government users are now leveraging TPM security chips and hardware-based disk encryption.

PODCAST 1: Featuring Mr. Sprague, "Leveraging Hardware Security in 350 Million Platforms," gives viewers a brief overview of Trusted Computing, from the history behind the TCG, to an introduction of both the TPM and SED as embedded forms of hardware security, designed by the security and PC industry to counter the vulnerabilities of software security.

PODCAST 2: The second video, "Trusted Computing: Establishing Device Identity," evaluates how TPMs act as the foundation for device identity, ensuring that only known machines are allowed network access. The TPM is a highly secure "container" for user and device keys, providing device identity much the same way as a SIM chip does on mobile phone networks.

PODCAST 3: The third video in the series, "Trusted Computing: Employing Hardware Encryption," introduces viewers to hardware-based disk encryption. Mr. Sprague addresses the impact of new legislation mandating encryption and points to performance differences between software and hardware full-disk encryption (FDE), along with deployment considerations.

PODCASTS 4, 5, 6 & 7:  A second installment of videos will follow next month, as part two of Wave’s Trusted Computing podcast series. Four additional videos will cover the topic in greater depth: Trusted Computing implementations in government; deployment in a mixed environment; the need for a strong management infrastructure; and a concluding video on the future of Trusted Computing. To be notified when the second series of videos is available, or for permission to publish these videos, please contact: Wave@MessageInfusion.com.

Wave Logo

About Wave Systems Corp.

Wave is a pioneer in hardware-based PC security that provides software to help solve critical enterprise PC security challenges such as data protection, strong authentication, network access control and the management of these enterprise functions.  Wave is a founding member of the Trusted Computing Group (TCG), a consortium of more than 100 companies that forged open standards for hardware security.  Wave’s EMBASSY® line of client- and server-side software leverages and manages the security functions of the TCG’s industry standard hardware security chip, the Trusted Platform Module (TPM) as well as hard drives that comply with TCG’s “Opal” self-encrypting drive (SED) standard.  Self-encrypting drives are a growing segment of the data protection market, offering increased security and better performance than most existing software-based encryption solutions.  TPMs are standard equipment on many enterprise-class PCs shipping today and have shipped on an estimated 300 million PCs worldwide.  Using TPMs and/or SEDs and Wave software, enterprises can substantially and cost-effectively strengthen their current security solutions.  Visit http://www.wave.com for more information.

Safe Harbor for Forward Looking Statements

This press release may contain forward-looking information within the meaning of the Private Securities Litigation Reform Act of 1995 and Section 21E of the Securities Exchange Act of 1934, as amended (the Exchange Act), including all statements that are not statements of historical fact regarding the intent, belief or current expectations of the company, its directors or its officers with respect to, among other things: (i) the company’s financing plans; (ii) trends affecting the company’s financial condition or results of operations; (iii) the company’s growth strategy and operating strategy; and (iv) the declaration and payment of dividends.  The words "may," "would," "will," "expect," "estimate," "anticipate," "believe," "intend" and similar expressions and variations thereof are intended to identify forward-looking statements.  Investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, many of which are beyond the company’s ability to control, and that actual results may differ materially from those projected in the forward-looking statements as a result of various factors.  Wave assumes no duty to and does not undertake to update forward-looking statements.

All brands are the property of their respective owners.

For more information please contact:

Contact:

Wave Systems Corp.
Michael Wheeler
413-243-7026
mwheeler@wave.com