Data Sheets

Data Sheets

Enterprises are increasingly aware of the vulnerability presented by a computer’s boot process. Before the operating system loads, malware such as a rootkit can insert itself in order to log...
  Formerly "Safend Protector" Protect your enterprise from data leakage and theft Eliminate targeted attacks via physical and wireless interfaces Enable connectivity and...
Password authentication, although commonly used, is easy to break and does not offer the strong authentication required to protect enterprise resources. In response, security-minded enterprises have...
Conventional security methodologies based on software alone fail to effectively authenticate users and machines on the network or secure data on lost or stolen laptops, or ensure compliance with laws...
Hardware-Based Security ESC is the premier application for managing hardware- based security; it protects your data from theft and leverages hardware-based security tools that aren’t...
Formerly "Safend Auditor" Endpoints | What You Can’t See Can Hurt You In the world of security, the unknown is always the greatest threat. In the realm of endpoint data leakage...
Formerly "Safend Discoverer" Map, classify and locate sensitive data stored on organizational endpoints Enable compliance with regulatory, data security, and privacy standards Gain...
Formerly "Safend Encryptor" Protect enterprise data from loss and theft Achieve optimum balance between security, productivity and performance Waive disclosure requirements in...
Wave for BitLocker Management provides a comprehensive set of tools to automate and secure the configuration and administration of Microsoft BitLocker. Wave’s software organizes the core...
Formerly "Safend Inspector" Prevent sensitive data leakage through Email, Web, removable storage, and additional data transfer channels Avoid user errors and enhance security...

Copyright © 1997-2014 Wave Systems Corp. All rights are reserved.
Terms of Use I Privacy Policy I Contact Us