Skip to Content

Application Briefs

Energy

Energy Sector
Data Breaches and Compliance Mandates Present Critical Challenges

February 2011

DoD

Government — DoD
Fighting Data Breaches that Threaten National and Homeland Security

February 2011

FedCiv

Government — Federal
Protecting Federal Agencies — and the Public — from Data Breaches

February 2011

StateGov

Government — State & Local
Helping State and Local Governments Keep Sensitive Data Safe

February 2011

Financial

Financial
Helping Banks and Financial Institutions Keep Sensitive Data Safe

August 2011

HIPAA

Healthcare
Data Breaches: A Growing Problem for the Healthcare Community

August 2010

MAReg201CMR17

MA Regulation 201 CMR 17
Massachusetts’ Data Protection Regulation Mandates Encryption for Customer Data

January 2009

SMB

Small & Medium Businesses
SMBs Realize Significant Costs Savings and Superior Security with Self-Encrypting Drives (SEDs)

August 2011

Case Studies

BMC

Boston Medical Center

Wave Systems’ EMBASSY® software enforces centrally managed and unrivaled data security for the hospital’s 400 laptops.

February 2011 BMC




VEGA

Mazda North American Operations — Case Study

Wave Systems’ EMBASSY® software and Seagate self-encrypting hard drives help Mazda North American Operations achieve Japan’s Sarbanes Oxley (J-SOX) compliance.

May 2010 Mazda




VEGA

VEGA Deutschland — Case Study

Wave Systems’ EMBASSY® software provides data security for VEGA’s laptops.

March 2010 VEGA




CBI Health

CBI Health — Case Study

Data Protection for Regulatory Compliance

December 2008 CBI Health




Adaptasoft

Adaptasoft — Case Study

Data Protection for Today’s Mobile Workforce

November 2008Adaptasoft

Research

How_to_Use_TPM

How to Use the TPM: A Guide to Hardware-Based Endpoint Security

Taking advantage of the inherent security provided by the Trusted Platform Module (TPM)

Trusted Computing Group

March 2009

Secure the Data of Your Mobile Workforce

Secure the Data of Your Mobile Workforce

Dell Solutions Take the Complexity Out of Mobile Security

February 2009

Enterprise Strategy Group — Information Security Brief

Enterprise Strategy Group — Information Security Brief

Seagate and Dell: Bringing Hardware-based PC Encryption to the Masses

By Jon Oltsik, Senior Analyst

January 2009







Solution Brief

Protecting Network Access in the Wild — Solution Brief

Solution Brief:
Protecting Network Access in the Wild

Today’s IT managers must contend with an increasingly mobile work force that has moved more and more end-users, devices, computing applications and highly sensitive data beyond the safety of the enterprise firewall.

October 2010


Ensuring Identities in a Digital World — Solution Brief

Solution Brief:
Ensuring Identities in a Digital World

Guard against identity theft with secure and transparent device authentication – the foundation for network security and personal privacy.

March 2010


Changing the Landscape of Data Encryption — Solution Brief

Solution Brief:
Data Protection for a Mobile World

Data Breaches: A Growing Problem for the Private and Public Sectors

January 2010


White Papers

Network Security

Network Security: How to Defend an Infinitely Expanding Frontier

The increasing use of home offices and laptops has put an ever-expanding number of users, data, devices and applications beyond the security of the traditional enterprise network firewall.

September 2010

Trusted Computing

Trusted Computing White Paper

A proven security paradigm in use today and already deployed for improved Online Security

June 2010

Financial

Data Protection Compliance for Financial Services — White paper

Is Your Company Compliant with Data Protection Regulations?

December 2008

Compliance(full)

Data Protection Compliance — White paper

Comply with Data Protection Laws and Regulations

By W. Scott Blackmer
Technology Law and Consulting

October 2007

Compliance(abr)

Data Protection Compliance — White paper (abridged version)

Comply with Data Protection Laws and Regulations

By W. Scott Blackmer
Technology Law and Consulting

October 2007

DAR&FDE

Data at Rest & Full Disk Encryption — White paper

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

October 2007