Annual Reports

There are three core principles behind Wave’s transformation, and they factor into every decision we make: clarity, efficiency and accountability.
The National Institute of Standards and Technology (NIST) has advocated the use of integrated hardware security to protect against Advanced Persistent Threats, while Microsoft made support for trus
A new computing model has emerged in the past few years. It is based on the identity of the device, not just the user, and is independent of the type of connection.

Application Briefs

Data breaches have only increased in frequency and severity - and consequences for healthcare organizations found to be negligent in safeguarding patient information have never been higher.
To better succeed at their missions, state and local governments are incorporating enterprise applications and mobile technologies — especially laptops — across their organizations.


Ever heard of "something you know, something you have, and something you are"?
Ever heard of "something you know, something you have, and something you are"?
Self-encrypting drives (SED) are the same as standard hard drives, with one key difference: they embed encryption into the drive itself, so you don’t need encryption software.
Smart cards and tokens have long been the authentication method of choice for security-minded organizations. By adding “something you have” (i.e.