SlideShare una empresa de Scribd logo
1 de 21
Establishing security & trust across
the mobile economy

Patrick King
Sales Director Enterprise & Government (EMEA)

© 2014 Wave Systems Corp. All Rights Reserved.
Topics :

• Brief Introduction to Wave
• Drivers for Trust & Security
• Wave’s contribution to date

© 2014 Wave Systems Corp. All Rights Reserved.

2
Brief Introduction
to Wave

© 2014 Wave Systems Corp. All Rights Reserved.

3
An Introduction To Wave...

• The “Trusted Computing Company”
• Enterprise End-Point Device & Data Protection

• Security Embedded By Design
• Innovator & Industry Standards Leader

© 2014 Wave Systems Corp. All Rights Reserved.

4
Wave History and Innovation Legacy

© 2014 Wave Systems Corp. All Rights Reserved.
Drivers for Trust &
Security

© 2014 Wave Systems Corp. All Rights Reserved.

6
Drivers for Trust & Security

•
•
•
•
•
•

More smart phones than people
The rise of tablets
Gathering of “Big-Data”
Concerns over Privacy & IP
Enterprise reputation
EU Data Protection Regulation

© 2014 Wave Systems Corp. All Rights Reserved.
Key Driver For Mobile Trust & Security…

38% of customers said they no
longer did business with the
organisation concerned.
source: Wall St. Journal

32% effected businesses
experienced a decline in share
value
Source: Scott & Scott LLP.

© 2014 Wave Systems Corp. All Rights Reserved.

8
Seven Europeans out of ten are concerned

© 2014 Wave Systems Corp. All Rights Reserved.

9
Opportunities to consider…

Telecom operators and carriers :• Deliver personal „trust‟ services to consumers

• Develop consumer identitymanagement services
• Provide device & application management services
• Mobilize security services.

© 2014 Wave Systems Corp. All Rights Reserved.

10
Opportunities to consider…

Technology and service providers:• Develop location-based security services

• Deliver enterprise-integration-as-a-service
• Offer secure content services
• Create hardware-based security assurance technologies.

© 2014 Wave Systems Corp. All Rights Reserved.

11
Wave’s Contribution
to Date…

© 2014 Wave Systems Corp. All Rights Reserved.

12
Security & Safety Embedded By Design
Automotive Trusted Platform…

© 2014 Wave Systems Corp. All Rights Reserved.

13
Other Trusted Platforms in use every day…

© 2014 Wave Systems Corp. All Rights Reserved.
Trusted Computing Platform by Design:
TPM – (Trusted Platform Module)
Co-Invented and Specified By Wave.

•
•
•
•
•
•
•
•

© 2014 Wave Systems Corp. All Rights Reserved.

Digital Safe for PKIs
Virtual Smart-Card
Device Authentication
Device Integrity State
WiFi Authentication
VPN & Direct Access
Single-PIN Sign-on
HD Encryption Keys

15
Traditional vs. Self-Encrypting Drives
Traditional

OPAL-SED
Self Encrypting Drive

Software Drive Encryption

- Deployment time (hours++)
- Encrypt decrypt failure rate/risk
- Vulnerable
- No real compliance
- Ongoing management costs

+ Deployment in minutes
+ No initial encryption process
+ Less vulnerable
+ Real compliance
+ Lower maintenance costs

A fortune 500 oil company did an analyses and found that SW FDE
was 10 times more expensive then SED’s
© 2014 Wave Systems Corp. All Rights Reserved.
Wave ERAS

© 2014 Wave Systems Corp. All Rights Reserved.
Wave Adds trust & security to
mobile computing by…
Enterprise Security

Open Standards, Trusted Platforms

© 2014 Wave Systems Corp. All Rights Reserved.

Enterprise Management

Secure Network Authentication

Service Delivery (Enterprise, Cloud, SaaS)

Platform Health

Audit and Compliance

Platform Identity
Malware Detection
Trusted Boot

Policy Management

Data Protection

Deployment and Lifecycle Service

Device
Protection

Port
Control

Data
Filtering
(DLP)

Media
Encryption

Known Trusted Platform
Wave Solution User Cases

Data Encryption &
Compliance
Hardened Device Access
& Authentication
Data Protection for
mobile workers
© 2014 Wave Systems Corp. All Rights Reserved.
Summary:
•

Mobile – increasing digitisation across
markets and economies

•

Trust is the currency of the new economy

•

Reputation is everything

•

Security Embedded by Design

•

Consistent, unified policies and regulatory
frameworks are essential.

© 2014 Wave Systems Corp. All Rights Reserved.

20
Thank you.
www.wave.com

© 2014 Wave Systems Corp. All Rights Reserved.

21

Más contenido relacionado

La actualidad más candente

La actualidad más candente (19)

Eseye
Eseye Eseye
Eseye
 
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020Ivanti Patch Tuesday for June 2020
Ivanti Patch Tuesday for June 2020
 
MaaS Value Prop
MaaS Value PropMaaS Value Prop
MaaS Value Prop
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Remote Worker Series (Part 3)
Remote Worker Series (Part 3)Remote Worker Series (Part 3)
Remote Worker Series (Part 3)
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
What's New with Ivanti Service Desk
What's New with Ivanti Service DeskWhat's New with Ivanti Service Desk
What's New with Ivanti Service Desk
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme!
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
Iveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor PresentationIveda (OTCQB:IVDA) - Investor Presentation
Iveda (OTCQB:IVDA) - Investor Presentation
 

Similar a Trust in Mobile Computing

The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
AirTight Networks
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
solarisyourep
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
Cyren, Inc
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 

Similar a Trust in Mobile Computing (20)

The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
The Savvy Security Leader: Using Guerrilla Tactics to ID Security Program Res...
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides
 
Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the Cloud
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Venture Summit 2014, Pankaj Kedia
Venture Summit 2014, Pankaj KediaVenture Summit 2014, Pankaj Kedia
Venture Summit 2014, Pankaj Kedia
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Delivering Unified IT Operations With Vistara
Delivering Unified IT Operations With VistaraDelivering Unified IT Operations With Vistara
Delivering Unified IT Operations With Vistara
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 

Más de E Radar

Más de E Radar (8)

Mobile Digital Evidence And Forensics
Mobile Digital Evidence And ForensicsMobile Digital Evidence And Forensics
Mobile Digital Evidence And Forensics
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Impact of Mobile on Data Compliance
Impact of Mobile on Data ComplianceImpact of Mobile on Data Compliance
Impact of Mobile on Data Compliance
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEs
 
Securing Mobile Payments
Securing Mobile PaymentsSecuring Mobile Payments
Securing Mobile Payments
 
Mobile Digital Evidence
Mobile Digital EvidenceMobile Digital Evidence
Mobile Digital Evidence
 
05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device
 
IT Security through governance, compliance and risk
IT Security through governance, compliance and riskIT Security through governance, compliance and risk
IT Security through governance, compliance and risk
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Trust in Mobile Computing

  • 1. Establishing security & trust across the mobile economy Patrick King Sales Director Enterprise & Government (EMEA) © 2014 Wave Systems Corp. All Rights Reserved.
  • 2. Topics : • Brief Introduction to Wave • Drivers for Trust & Security • Wave’s contribution to date © 2014 Wave Systems Corp. All Rights Reserved. 2
  • 3. Brief Introduction to Wave © 2014 Wave Systems Corp. All Rights Reserved. 3
  • 4. An Introduction To Wave... • The “Trusted Computing Company” • Enterprise End-Point Device & Data Protection • Security Embedded By Design • Innovator & Industry Standards Leader © 2014 Wave Systems Corp. All Rights Reserved. 4
  • 5. Wave History and Innovation Legacy © 2014 Wave Systems Corp. All Rights Reserved.
  • 6. Drivers for Trust & Security © 2014 Wave Systems Corp. All Rights Reserved. 6
  • 7. Drivers for Trust & Security • • • • • • More smart phones than people The rise of tablets Gathering of “Big-Data” Concerns over Privacy & IP Enterprise reputation EU Data Protection Regulation © 2014 Wave Systems Corp. All Rights Reserved.
  • 8. Key Driver For Mobile Trust & Security… 38% of customers said they no longer did business with the organisation concerned. source: Wall St. Journal 32% effected businesses experienced a decline in share value Source: Scott & Scott LLP. © 2014 Wave Systems Corp. All Rights Reserved. 8
  • 9. Seven Europeans out of ten are concerned © 2014 Wave Systems Corp. All Rights Reserved. 9
  • 10. Opportunities to consider… Telecom operators and carriers :• Deliver personal „trust‟ services to consumers • Develop consumer identitymanagement services • Provide device & application management services • Mobilize security services. © 2014 Wave Systems Corp. All Rights Reserved. 10
  • 11. Opportunities to consider… Technology and service providers:• Develop location-based security services • Deliver enterprise-integration-as-a-service • Offer secure content services • Create hardware-based security assurance technologies. © 2014 Wave Systems Corp. All Rights Reserved. 11
  • 12. Wave’s Contribution to Date… © 2014 Wave Systems Corp. All Rights Reserved. 12
  • 13. Security & Safety Embedded By Design Automotive Trusted Platform… © 2014 Wave Systems Corp. All Rights Reserved. 13
  • 14. Other Trusted Platforms in use every day… © 2014 Wave Systems Corp. All Rights Reserved.
  • 15. Trusted Computing Platform by Design: TPM – (Trusted Platform Module) Co-Invented and Specified By Wave. • • • • • • • • © 2014 Wave Systems Corp. All Rights Reserved. Digital Safe for PKIs Virtual Smart-Card Device Authentication Device Integrity State WiFi Authentication VPN & Direct Access Single-PIN Sign-on HD Encryption Keys 15
  • 16. Traditional vs. Self-Encrypting Drives Traditional OPAL-SED Self Encrypting Drive Software Drive Encryption - Deployment time (hours++) - Encrypt decrypt failure rate/risk - Vulnerable - No real compliance - Ongoing management costs + Deployment in minutes + No initial encryption process + Less vulnerable + Real compliance + Lower maintenance costs A fortune 500 oil company did an analyses and found that SW FDE was 10 times more expensive then SED’s © 2014 Wave Systems Corp. All Rights Reserved.
  • 17. Wave ERAS © 2014 Wave Systems Corp. All Rights Reserved.
  • 18. Wave Adds trust & security to mobile computing by… Enterprise Security Open Standards, Trusted Platforms © 2014 Wave Systems Corp. All Rights Reserved. Enterprise Management Secure Network Authentication Service Delivery (Enterprise, Cloud, SaaS) Platform Health Audit and Compliance Platform Identity Malware Detection Trusted Boot Policy Management Data Protection Deployment and Lifecycle Service Device Protection Port Control Data Filtering (DLP) Media Encryption Known Trusted Platform
  • 19. Wave Solution User Cases Data Encryption & Compliance Hardened Device Access & Authentication Data Protection for mobile workers © 2014 Wave Systems Corp. All Rights Reserved.
  • 20. Summary: • Mobile – increasing digitisation across markets and economies • Trust is the currency of the new economy • Reputation is everything • Security Embedded by Design • Consistent, unified policies and regulatory frameworks are essential. © 2014 Wave Systems Corp. All Rights Reserved. 20
  • 21. Thank you. www.wave.com © 2014 Wave Systems Corp. All Rights Reserved. 21

Notas del editor

  1. Robert Sprague – Sprague Electronics - Capacitors in 50’s to 80’s Peter J Sprague - Founders of Nat Semi in 1960’s Nolan Bushnell – Founder of Atari (Co Authored iTunes)Robert Thibadeau – Inventor of SED
  2. 2 billion smart phones and growingData analytics – unbridled spying and cynical manipulation?Privacy and intellectual property?Quality “Kite Mark” for best practice (Truste.com)Sony PSN – 77m accounts exposed - $millions lost + share price bombed.NHS – sold patient data to insurance industry.ICO – overtaken by EU…Vice-President Viviane Reding, the EU's Justice Commissioner said ahead of data protection day (which is on 28 January): "Data protection in the European Union is a fundamental right. Europe already has the highest level of data protection in the world. With the EU data protection reform which was proposed exactly two years ago – in January 2012 – Europe has the chance to make these rules a global gold standard. These rules will benefit citizens who want to be able to trust online services, and the small and medium sized businesses looking at a single market of more than 500 million consumers as an untapped opportunity. The European Parliament has led the way by voting overwhelmingly in favour of these rules. I wish to see full speed on data protection in 2014."
  3. The mobile industry has a significant role to play to build trust in the digital economy and to ensure interoperability across Member States and across sectors in the EU Single Market. By helping everyone and everything to get connected securely and conveniently, mobile identity is increasing market digitisation with tremendous socio-economic impacts across different industry verticals ranging from m-health, m-banking, m-government, m-commerce and others.To ensure mobile’s role and the benefits of mobile are fully realised, will require consistent approaches across the emerging policies and regulatory frameworks. In the emerging mobile identity market, the protection of privacy and security is a key issue, and industry, governments and regulators need to work closely together to clarify their roles and responsibilities.