SlideShare uma empresa Scribd logo
1 de 21
Dell Security Webinar Featuring Seagate FDE Drives                                      
The WORLD’S  MOST SECURE NOTEBOOK Perfect Solution for lost and stolen PC ,[object Object],[object Object],[object Object],[object Object]
Information Security Broad set of information security challenges  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
There is no such thing as bad publicity ! ,[object Object],[object Object],[object Object],[object Object]
Why Don’t Organizations Encrypt today? ,[object Object],* Ponemon Institute’s 2005 National Encryption Survey   System Performance Complexity Cost 69% 44% 25%
Dell Data Security Solution For Mobile Users  Wave Embassy Remote Administration Server Dell Latitude D531, D630, D631, D830, E4300, E5400, E5500, E6400, E6400 ATG and E6500 Dell Precision M2300, M2400, M4300, M4400, M6300 and M6400 Seagate Momentus 5400 FDE.2 HDD Wave Client Trusted Drive Manager
Seagate Momentus 5400 FDE.2 Solution for lost and stolen notebooks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted Drive operating in  ATA Mode  Default mode when embedded Security is Un-initialized  Drive Controller Encryption Data Encrypted In ATA mode the encryption key has no access control Boot    Block ATA Mode Operation When drive security is not enabled the drive functions as a normal ATA drive. At power-up the drive executes the code in the boot block and then execute normal windows boot-up from the drive.
Wave Software: Initialization of Trusted Drive embedded security All these steps can be remotely managed from a Domain console with the Embassy Remote Administration Server .  Drive Controller Authentication Encryption Data Encrypted Provision pre-boot Enroll Users / Admin
TDM: Pre-boot authentication process © 2007 Wave Systems Corp. Confidential. All Rights Reserved.  UNDER CONSTRUCTION Drive Controller Authentication Boot Clr TXT  Crdtl Crdtl Encrptd Encryption Data Encrypted
Hardware vs. Software Encryption DELL CONFIDENTIAL INTERNAL ONLY Dell Hard Drive Encryption  Software Encryption Computer Memory Resources Consumption No Yes CPU Cycles Consumption No Yes Encryption Key Access No Yes Encryption Key Generation Risk No Yes Turn Off Possibility No Yes Decryption need for OS Maintenance No Sometimes IT Deployement and Management Easy Moderate to Difficult Secure and instant Erase Yes No Recovery password Yes Sometimes Windows Password Synchronization Yes Sometimes Compliance Certification NSA approved FIPS 140-2 Remote Management Yes Yes Specific Drive need Yes No Non-Microsoft OS support No Sometimes
The Trusted Drive Solution Seagate ® DriveTrust ™ Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],FDE DRIVE Embassy ® Trusted Drive Manager Embassy ® Remote Administration Server ENTERPRISE NETWORK
EMBASSY Trusted Drive Manager ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dell FDE Remote Management Server ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Are you interested in the Dell FDE Solution? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2007 Wave Systems Corp. Confidential. All Rights Reserved.
How do you get it? Use your Dell contact ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Customer References © 2008 Wave Systems Corp. Confidential. All Rights Reserved.
Customer References ,[object Object],[object Object],[object Object],[object Object],© 2008 Wave Systems Corp. Confidential. All Rights Reserved.
Wave Enterprise Customers
Information Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THANK YOU ! Stanley Mtshali  [email_address] South Africa Rep (Agent) Wave Systems Corp +27 78 861 33 88

Mais conteúdo relacionado

Mais procurados

Download our Managed Services Presentation - ZSL - Systems ...
Download our Managed Services Presentation - ZSL - Systems ...Download our Managed Services Presentation - ZSL - Systems ...
Download our Managed Services Presentation - ZSL - Systems ...webhostingguy
 
eFolder BDR Cost Wizard and Pricing Best Practices
eFolder BDR Cost Wizard and Pricing Best PracticeseFolder BDR Cost Wizard and Pricing Best Practices
eFolder BDR Cost Wizard and Pricing Best PracticesDropbox
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Consolidated Integrative Services, LLC-CIS
Consolidated Integrative Services, LLC-CISConsolidated Integrative Services, LLC-CIS
Consolidated Integrative Services, LLC-CISClyde_Zimmerman
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet yonifine
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
BDR Bake-Off: Acronis vs. Replibit vs. ShadowProtect
BDR Bake-Off: Acronis vs. Replibit vs. ShadowProtectBDR Bake-Off: Acronis vs. Replibit vs. ShadowProtect
BDR Bake-Off: Acronis vs. Replibit vs. ShadowProtecteFolder
 
IT Foundation Management Security
IT Foundation Management SecurityIT Foundation Management Security
IT Foundation Management SecurityTDiTechnologies
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015John White
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Desktone
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreDell EMC World
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environmentajitambekar
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach FinalHossam Hassanien
 
eFolder Webinar — BDR Pain Relief: eFolder + Replibit
eFolder Webinar — BDR Pain Relief: eFolder + ReplibiteFolder Webinar — BDR Pain Relief: eFolder + Replibit
eFolder Webinar — BDR Pain Relief: eFolder + ReplibiteFolder
 
Jelecos Services Overview
Jelecos Services OverviewJelecos Services Overview
Jelecos Services OverviewJessica Sheldon
 

Mais procurados (19)

Download our Managed Services Presentation - ZSL - Systems ...
Download our Managed Services Presentation - ZSL - Systems ...Download our Managed Services Presentation - ZSL - Systems ...
Download our Managed Services Presentation - ZSL - Systems ...
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
eFolder BDR Cost Wizard and Pricing Best Practices
eFolder BDR Cost Wizard and Pricing Best PracticeseFolder BDR Cost Wizard and Pricing Best Practices
eFolder BDR Cost Wizard and Pricing Best Practices
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Consolidated Integrative Services, LLC-CIS
Consolidated Integrative Services, LLC-CISConsolidated Integrative Services, LLC-CIS
Consolidated Integrative Services, LLC-CIS
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
BDR Bake-Off: Acronis vs. Replibit vs. ShadowProtect
BDR Bake-Off: Acronis vs. Replibit vs. ShadowProtectBDR Bake-Off: Acronis vs. Replibit vs. ShadowProtect
BDR Bake-Off: Acronis vs. Replibit vs. ShadowProtect
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
IT Foundation Management Security
IT Foundation Management SecurityIT Foundation Management Security
IT Foundation Management Security
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environment
 
Windows 7
Windows 7Windows 7
Windows 7
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
 
eFolder Webinar — BDR Pain Relief: eFolder + Replibit
eFolder Webinar — BDR Pain Relief: eFolder + ReplibiteFolder Webinar — BDR Pain Relief: eFolder + Replibit
eFolder Webinar — BDR Pain Relief: eFolder + Replibit
 
Jelecos Services Overview
Jelecos Services OverviewJelecos Services Overview
Jelecos Services Overview
 

Semelhante a Dell Webinar on Seagate FDE Drives for Data Security

The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...Dell World
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesHow to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesDLT Solutions
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Data Compass Presentation
Data Compass PresentationData Compass Presentation
Data Compass PresentationSalvationDATA
 
Data Compass Introduction (Best Data Recovery Equipment)
Data Compass Introduction (Best Data Recovery Equipment)Data Compass Introduction (Best Data Recovery Equipment)
Data Compass Introduction (Best Data Recovery Equipment)Leon Xue
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it wordsApixel IT Support
 
Windows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined ValueWindows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined ValueAmit Gatenyo
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyClickSSL
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 

Semelhante a Dell Webinar on Seagate FDE Drives for Data Security (20)

TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
Vdi overview
Vdi overviewVdi overview
Vdi overview
 
The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesHow to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
 
DNA Cloud Backup
DNA Cloud BackupDNA Cloud Backup
DNA Cloud Backup
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Data Compass Presentation
Data Compass PresentationData Compass Presentation
Data Compass Presentation
 
Data Compass Introduction (Best Data Recovery Equipment)
Data Compass Introduction (Best Data Recovery Equipment)Data Compass Introduction (Best Data Recovery Equipment)
Data Compass Introduction (Best Data Recovery Equipment)
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it words
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Windows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined ValueWindows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined Value
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
How To Plan Successful Encryption Strategy
How To Plan Successful Encryption StrategyHow To Plan Successful Encryption Strategy
How To Plan Successful Encryption Strategy
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
About easySERVICE
About easySERVICEAbout easySERVICE
About easySERVICE
 

Dell Webinar on Seagate FDE Drives for Data Security

  • 1. Dell Security Webinar Featuring Seagate FDE Drives                                    
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Dell Data Security Solution For Mobile Users Wave Embassy Remote Administration Server Dell Latitude D531, D630, D631, D830, E4300, E5400, E5500, E6400, E6400 ATG and E6500 Dell Precision M2300, M2400, M4300, M4400, M6300 and M6400 Seagate Momentus 5400 FDE.2 HDD Wave Client Trusted Drive Manager
  • 7.
  • 8. Trusted Drive operating in ATA Mode Default mode when embedded Security is Un-initialized Drive Controller Encryption Data Encrypted In ATA mode the encryption key has no access control Boot Block ATA Mode Operation When drive security is not enabled the drive functions as a normal ATA drive. At power-up the drive executes the code in the boot block and then execute normal windows boot-up from the drive.
  • 9. Wave Software: Initialization of Trusted Drive embedded security All these steps can be remotely managed from a Domain console with the Embassy Remote Administration Server . Drive Controller Authentication Encryption Data Encrypted Provision pre-boot Enroll Users / Admin
  • 10. TDM: Pre-boot authentication process © 2007 Wave Systems Corp. Confidential. All Rights Reserved. UNDER CONSTRUCTION Drive Controller Authentication Boot Clr TXT Crdtl Crdtl Encrptd Encryption Data Encrypted
  • 11. Hardware vs. Software Encryption DELL CONFIDENTIAL INTERNAL ONLY Dell Hard Drive Encryption Software Encryption Computer Memory Resources Consumption No Yes CPU Cycles Consumption No Yes Encryption Key Access No Yes Encryption Key Generation Risk No Yes Turn Off Possibility No Yes Decryption need for OS Maintenance No Sometimes IT Deployement and Management Easy Moderate to Difficult Secure and instant Erase Yes No Recovery password Yes Sometimes Windows Password Synchronization Yes Sometimes Compliance Certification NSA approved FIPS 140-2 Remote Management Yes Yes Specific Drive need Yes No Non-Microsoft OS support No Sometimes
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21. THANK YOU ! Stanley Mtshali [email_address] South Africa Rep (Agent) Wave Systems Corp +27 78 861 33 88

Notas do Editor

  1. Where the buck stops on a lot of these threats is at the CEO’s desk. There are four key things to consider: The first is Regulatory compliance— It has become a mandate, whether you want to do it or not. Second is the Safekeeping of customer data —This is critical, particularly in the case of any organization that talks to individual customers. Examples are credit card companies or government agencies. There are numerous organizations where losing a pile of data could expose the personal information of thousands or even millions of customers, putting those individuals at risk of identity theft. CEOs also have to worry about abiding by their organization’s own Internal Security Policies —many times this is the fundamental check and balance against maintaining compliance to external regulations. And last is Protecting Corporate Intellectual Property which is simply a fundamental requirement of the job.
  2. So if it is so obvious that organizations need to encrypt, why are people not doing it. In 2005, Ponemon did a study and found that 5 to 10% of laptops were not being encrypted at all. When asked why, there were 3 primary reasons. The first is System Performance - most full disk encryption software hits the hard drive and CPU pretty hard. Every time a bit has to get written back and forth to the drive, the CPU has to spend cycles there to crypt and decrypt . As applications and OS’s have gotten more complex the hard drives get hit a lot and that can slow system performance to a crawl. The second is Complexity – installation can be a complex and lengthy process. Turning on a full disk encryption software package can take many hours as it goes through existing data and encrypts every bit back and forth to the drive. Maintaining these systems can be time consuming as well. And last is Cost - encryption is not free, it costs something to do this. And much more than the modest cost of the software, is the cost of maintaining it. It’s the IT person having to touch every machine – every time something has to be changed; or every time you install an application that doesn’t play nice with the encryption software; or when an employee loses their password, or leaves the organization and they have to re-permission the machine
  3. So what is the Dell data security solution for mobile users? Dell listened to its customers, from C-level Executives to End Users, partnered with IT industry leaders (Seagate and Wave systems) and created a comprehensive, hardware-based, data security solution. First box : We start with our Award-winning Latitude notebooks and Precision workstations. Second box: Then add the Seagate Momentus full disk encryption hard drive as a factory installed option and bundle it with Wave’s Embassy Trust Suite Trusted Drive Manager software to locally manage the encrypted drive. Third box: By adding Wave’s Embassy Remote Administration Server software, this enables remote deployment, lifecycle management, and automated compliance/reporting. Fourth box : And finally, when combined with Dell’s security best practices such as BIOS settings, Anti-virus software, utilization of multi-factor authentication solutions…. Fifth box: Dell has delivered The World’s Most Secure Commercial Notebook!
  4. The Seagate Momentus 5400 FDE.2 hard drive is hardware based data protection device that prevents unauthorized access to data on a lost or stolen notebook – You could also say that it is protection for data at rest. The drive is available today from Dell in capacities up 120GB A few of the features provided by Seagate’s DriveTrust technology include: Full disk encryption , the drive employs the government standard of encryption algorithms (AES 128 bit) Pre-boot authentication , the OS will boot in a protected storage partition until the user successfully authenticates, only then will the drive unlock, and the system will boot normally to the Windows OS Quick erase , the administrator can simply delete the user’s hard drive password, thereby rendering all of the data on the hard drive inaccessible.
  5. With your “Trusted Drive” solution out of the box your bring your customers strong pre-boot access control and a simple user interface. This makes things easier for the end user and the administrator – and this is what they have been looking for. You give them advanced administrative controls from a centralized remote management console and the ability to view logs so that they can prove that these systems conform to auditing and compliance requirements.
  6. The Trusted Drive Manager is the basic client application that allows you to perform the basic utility functions to integrate the FDE drive into your daily workflow. When you initially boot the encrypted hard drive, the notebook will see it as a normal SATA drive. The Trusted Drive Manager enables the DriveTrust features, such as: Adding users Deleting users Unlocking the drive Setting Security Policies Set up for Pre-boot Authentication; which most users will utilize for additional security And it provides the hooks required to talk to the backend management software provided in the form of Wave’s Embassy Remote Administration Server
  7. This overview was to provide you with a high-level understanding of a great way to position your full disk encryption options with your customer. These slides come from a more in-depth Dell overview on the same information. Today, we stressed the merits of hardware-based FDE and the management software your customer will need to activate the advanced security functions for their corporation. At Dell, the concept is that Seagate’s FDE drives are a “seismic shift” in the data protection landscape. Here at Wave we will continue to support your getting the message out ASAP. This is a win-win situation. If you’d like more information on the topic, please feel free to download Wave’s white paper “Protecting Your Business from Costly Data Theft” and the “Trusted Drive Manager Walkthrough Guide” offering you step-by-step instructions on implementing the TDM software for your Seagate FDE drives. These can be found on wave.com in the solutions section on the upper left hand side of the home page. For local sales and technical support in the Scandinavian Region, please call Bruno Chatellier, Wave’s RSM at +33674407099. Email bchatellier@wavesys-emea.com