EMBASSY Security Center
The First Industry-Wide Application for
Managing Trusted Computing
As the number of Trusted Computing Group (TCG) compliant enterprise PCs purchased rises to the millions, finding a straightforward and unified method for managing the myriad of different platform types, tools, and behavior is a daunting task.
Many enterprises that purchased these advanced Trusted Computing systems with embedded TPMs now require a means to effectively administer them.
Wave's EMBASSY Security Center is the premier application for managing Trusted Platform security settings including TPM owner management, user management, and key management.
Centralized TPM Management
Wave's EMBASSY Security Center facilitates acquiring platform ownership, changing the owner password, and setting up or modifying security-based machine policies. TPM platform management features include status information verifying the state of the TPM and installed software.
EMBASSY Security Center provides multifactor authentication which enables users to select from various authentication mechanisms including individual passwords, a master password, biometrics, smart cards, TPM PKI certificate, or specific combinations thereof. Multi-factor authentication provides an additional strong authentication mechanism and facilitates Windows login, network/domain login, computer unlock, application login, and authentication to the TPM.
Robust Password Management
Streamlined password management is provided by the EMBASSY Security Center through caching and automatic recall of passwords from TPM-secured storage, valuable for managing the myriad of passwords required by a Trusted Platform. This feature supports key passwords, migration passwords and more.
TPM Key Archive Capability
A main function of the TPM is to generate keys. As use of the TPM increases with more functions and applications, the user and enterprise need assurance that the keys are properly backed up for disaster recovery. Backup and restore of allowed TPM keys is also provided by the EMBASSY Security Center. Restoration is possible on machines having a similar TPM model and TCG Software Stack (TSS) version.
In addition, for users with the complete Key Transfer Manager application, the EMBASSY Security Center provides an interface for advanced key management capabilities. Key Transfer Manager copies
cached passwords to the new PC, and has capabilities for server backup, certificate support, automated identification and backup of keys, scheduled backup, and individual key viewing and
Hardened Security Solution
By leveraging the intrinsic benefits of PCs with hardware security features, or TPMs, the EMBASSY Security Center optimizes security while adding flexibility and convenience to PC users in an enterprise
Interoperable Across Trusted Platforms
The EMBASSY Security Center enables the enterprise to deploy Trusted Platforms from multiple manufacturers using a single management system. Standardizing on the EMBASSY Security Center reduces support and training costs.
Security Policies & User Preferences in 1 Location
The EMBASSY Security Center provides centralized management of security policies at the machine and user levels. The robust user security preferences include secure Windows login, simplified password management, fingerprint authentication, and emergency recovery of Trusted Platform keys.
Additional security many times entails more complexity and even additional passwords to remember. The EMBASSY Security Center combines easy-to-use functions with a comprehensive security approach. Password management features simplify the usage of secure functions allowing users to select the password behavior desired.
TCG 1.2 Support
In addition to TCG version 1.1b, the EMBASSY Security Center supports Trusted Platforms conforming to TCG version 1.2, the latest Trusted Computing Group (TCG) standard.
PC Transfer and Recovery
When a Trusted Platform malfunctions, whether it is the Trusted Platform Module (TPM) security chip, motherboard, or hard drive, the EMBASSY Security Center has the tools to provide backup and easy recovery so that users can continue to access sensitive data and documents. These same key management functions ease the transition to a new secure PC.
Based on the familiar 3 factors of authentication, the EMBASSY Security Center controls secure authentication beyond passwords with the flexibility to combine (1) a
password (something you know) (2) the TPM security chip (something you have), and (3) a fingerprint (something you are).