Datasheet

Centralized Encryption Management
Organizations, both large and small, understand that
centralized encryption management is a critical component
to their security architecture.  Wave’s software provides the
policy-based access controls, comprehensive reporting,
directory services integration, centralized control and end-user
access recovery. Companies require these capabilities to cost
eectively implement and manage data encryption and, most
importantly, prove that data is protected in the event that a
computer (or its hard drive) is lost or stolen.
Wave for BitLocker Management
Microsoft Windows
®
 7 comes with an embedded software
encryption application called BitLocker.  Unlike other stand-
alone software-based full disk encryption (FDE) applications,
the tight platform integration of BitLocker and its use of the
Trusted Platform Module (TPM), an embedded security chip in
virtually all PCs, makes it a good starting point for data-at-rest
protection for organizations moving to Win 7.
Wave for BitLocker Management provides a comprehensive set of
toolstoautomate and secure the conguration and administration
of Microsoft BitLocker.  Wave’s software organizes thecore Microsoft
capabilities into a simple and intuitive administrative application
for setting up and maintaining BitLocker clients.  Wave for
BitLocker Management eliminates the cost and complexity
associated with creating custom scripts and Active Directory
schema extensions, associated with BitLocker.  In addition, Wave’s
software provides a more secure BitLocker environment through
the automation of the Trusted Platform Module (TPM), for strong
key protection, the encryption of BitLocker recovery passwords
and the monitoring of BitLocker client conguration settings.
Manageability and Control
Wave for BitLocker Management provides a full set of capabilities
toremotelysearchfor,initialize,congureandadministeraglobal
deployment of BitLocker clients.  Through native integration with
Microsoft Active Directory and the use of Windows Group Policy
Objects (GPO), assigning users and associated policies can be
performed within the directory framework —dramatically simplifying
deployment, thus accelerating the use of BitLocker encryption.
Microsoft Management Console (MMC) snap-in provides
•
both single user and group level control
Fully compatible with Windows Management
•
Instrumentation (WMI)
Delegated role-based administration with pre-dened
•
tasks for Enrollment Agent, Help Desk, Security Ocer
and System Administrator
Support for non-domain computers
•
Automates TPM ownership and control for greater security•
Key Benets:
Simplies deployment and ongoing 3
management by eliminating the burden of
writing and maintaining custom scripts
Reduces costs with the addition of 3
centralized control for activation,
deployment and on-going management
Increases security with the addition of 3
centralized policy enforcement, protected
recovery credentials and supervision of
the Trusted Platform Module (TPM)
Adds an authority of proof that data 3
is protected in the event of a lost or
stolen PC
Wave for BitLocker
®
Management
Automated Policy Management for Microsoft
®
BitLocker Encryption
Simplifying Encryption and Authentication

Summary of content (2 pages)