Learn more about how Verbatim s Secure n Go products can keep you safe

Size: px
Start display at page:

Download "Learn more about how Verbatim s Secure n Go products can keep you safe"

Transcription

1 Learn more about how Verbatim s Secure n Go products can keep you safe

2 Contents EU Compliance Regulations for IT Professionals EU Compliance Regulations for IT Professionals About Verbatim Secure n Go Benefits of Verbatim Features Secure Data USB Drive Business Secure Data USB Drive / SSD ExpressCard Remote Secure Data USB Drive / SSD ExpressCard AntiVirus A data loss incident is no longer seen as an unfortunate accident; now there is a high possibility that an organisation or individual executives will be subject to legal action. Those responsible for IT within companies need to be aware; today, data loss is a significant legal and regulatory issue. The EU Directive 95/46/EC of the European Parliament has been put in place to harmonise data protection laws across the EU. The law focuses on seven key principles concerning the use and access to personal data. Member states of the EU have generally implemented ed their own local data protection laws what reflects the principle of this directive (e.g. the UK Data Protection Act or Germany s Federal Data Protection Act / Bundesdatenschutzgesetz). The principal of data security has been defined as follows: Your company s reputation and assets are at risk The personal details of every prisoner in England and Wales have been lost by a government contractor in the latest data security breach in Whitehall. Police were called in after a consultancy firm working for the government lost a computer memory stick containing the private information. London (Reuters) Verbatim Control System (VCS) Secure Data USB Drive FIPS Secure Data HDD Backup PowerBay Secure Data SSD 6,35cm (2,5 ) Secure Data Software EasyLock Secure Data DVD Product Overview What product fits my purpose? Verbatim Security Micropage Best practise 10 Tips for Dummies Contact details Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. The first and most basic Data Security measure is Data is the process of converting information into an encrypted form, so that it is available only to someone who knows how to decrypt it in order to obtain the original data. tools can vary in the type of encryption (software/ hardware), exact encryption algorithm used and in the way it s implemented (full drive, partial or per- file encryption). Data-losing companies may be forced to spill to public The EU Commission has said that it will investigate the passing of new EU-wide legislation forcing all kinds of organisations to notify any data breaches to the relevant authorities and the people affected. So, not only should organisations ensure data is secure for legal reasons, they should also do it to protect the company s reputation. A computer memory stick containing details of a military training exercise was found on the floor of a West country nightclub, it has emerged. Files on the memory stick, which could be opened on any personal computer, included travel and accommodation details as well as some personal details. Western Morning News A computer memory stick said to contain top-secret information on terror suspects has been lost by police, it has been reported. The black 4GB stick went missing after being taken out of a police station by an office on patrol in the West Midlands last Thursday. Daily Mail It doesn t have to be this way... sensitive data + encryption = legal compliancy 2 3

3 Verbatim Secure n Go TM Benefits of Verbatim is owned by the Mitsubishi Chemical Corporation Group, and its reputation for quality and reliability in the storage industry is well renowned worldwide. Over its 40 year history, and now with its security range, Verbatim has developed a portfolio of digital storage solutions matching and exceeding the increasingly complex and varied requirements of modern society today. Portable storage media is used widely as an essential business tool to conveniently carry and share large volumes of data. But this freedom has created the increased possibility of sensitive data being lost or stolen. Responding to the need for reliable data security, Verbatim has focussed on Encrypted Storage Products. Modern IT security is provided through a combination of a. network security b. secure data storage Verbatim specialises in delivering secure data storage solutions. The main element of secure storage is encryption. The part of the program that encrypts and decrypts data on a drive can either be stored and run from a chip inside the drive (hardware encryption) or in software that is installed on and runs from the computer that the drive plugs into (software encryption). The primary benefit of software encryption is lower cost Network Security Information Security Data Security 128Bit 256Bit Verbatim Secure n Go TM Product Range Secure Data Legal Compliance Quality Reliability Experience Innovation Storage Solutions The benefits of hardware encryption are speed and security In software-based encryption, the keys are placed in the device s memory, so a hacker will know where to look for the keys by their unique format and can target those keys for an attack. In hardware-based encryption, the key never leaves the hardware device, which means that you cannot access them by simply looking at the device s memory. To ensure highest-level security, and in keeping with the Verbatim brand of quality and trust, we have only focused on flash memory and hard disk drive solutions that are hardware encrypted. Algorithm Mandatory Password Entry Windows Host Computer Software Premium AES 256bit Security Controller Secure Storage Solutions Verbatim offers a full assortment of secure DVD, USB, Solid State Drive and Hard Disk Drive Storage. It is our mission to provide the finest assortment of Secure Storage Media in the market. AES is the successor to the older DES (Data Standard) and is used by the U.S. Government for encrypting secret-level and top-secret-level documents, using the 128-bit and 256-bit strengths respectively. 256-bit AES encryption is the strongest form of encryption commonly available in consumer products. It meets the requirements of Information Security Policy SEC Guideline. It is the most commonly accepted algorithm in the industry and all of Verbatim s flash memory and hard disk drive security solutions are based on it. Cryptographic Hash Password Storage Data Storage / Decryption via Integrated Security Controller Blackbox Data 100% Encrypted on Flash Memory Level of Security Data Low Medium High Software Password Only + lower price AES 128-bit - less secure AES 256-bit Page 14 / 15 AES 128-bit Page 7 + highly secure AES 256-bit Page 8 + extra features AES 256bit + AntiVirus Page 9 4 5

4 Verbatim Features Secure Data USB Drive Business FEATURES for reliable security Administration Rights AntiVirus Protection Brute-force Password Attack Protection Central Manageability Cryptographic Hash Password Data encryption 100% guaranteed FIPS Application Update Lock / Unlock Mandatory Password Entry Military Strength Multi Password support On-the-Fly /Decryption Password strength Personal ID Function Physical Anti Tamper Protection Plug & Play Poison Pill Remote Device Management Scalability Security On Demand Unique Identification Number User Identification Verbatim Control System (VCS) Server Software Zero Footprint DESCRIPTION Works in restricted user mode. No software installation required Embedded built-in automatic malware scanning. Avoid copying and transferring infected files - the AntiVirus Engine protects you regardless of the status of the host PC everywhere and at anytime. No software installation is required to run the AntiVirus protection. The Verbatim drive does not copy and scan; the malicious file will be rejected before it even gets stored. Scan and remove viruses from any PC without installation from your Verbatim Secure Data USB/SSD Drive AntiVirus. 12 month updates are included in the package. After this, updates can be signed at regular AntiVirus update rates. Data will be erased and the drive will reset after reaching a maximum number of attempts in order to protect the content if it is lost/stolen. A backup is recommended. See Verbatim Control System (VCS). Password is stored and communicated encrypted to avoid exposure. Security comes with a combination of Mandatory Password and full drive hardware-based encryption - All files are 100% encrypted. United States NIST certification. Latest application updates available free of charge. After registering the device, the user can control it via the Internet and lock (no password entry possible) or unlock (password entry enabled) if it becomes lost / stolen. This provides an additional line of defence. The drive can only be used after the password has been set up and data can be stored and accessed only after a secure and successful login. Premium -based Engine with 256-bit AES providing strong decryption and encryption. Owner and guest user accounts can be defined. Guest file operations can be limited and controlled. Drag and drop your files after opening the drive with the correct password. No other action required. Depending on the product selected, options include mandatory simple password up to mandatory complex password. To help reclaim a lost drive, a person s name, address or alternative information can be stored on the device and accessed and viewed by anyone handling the drive. Only this information is accessible for everybody all other data is encrypted. The controller is embedded into epoxy to prevent manipulation. No software installation required. A password entry screen pops up after plugging in the device. Just enter the password required and drag and drop your files or use other convenient functions from the intuitive launch pad in the system tray. After registering the device, the user can control the device via the Internet and erase all data if it becomes lost / stolen. After registering the device, the user can control the device via the Internet and lock, unlock or erase all data if it becomes lost / stolen. Customised password rules or maximum number of attempt (MAXNOA) are matter of change - see Verbatim Control System (VCS). Upgrade possibility to add Remote Device Management and/or AntiVirus Protection this service is charged extra. A unique serial number which identifies the drive anywhere in the world and can control it via the Internet. Personalise your device and leave your contact details to be seen by any user in order to organise and/or to leave a message if lost or found. Offers for corporate users a centralised management server allowing the IT administrator to remotely control and manage all flash drives being used in the organisation. Advanced remote management capabilities audit, trace and view logs of corporate flash drive usage - running on a VMware virtual appliance. Used for a new generation of mobile device applications which run entirely embedded of the device. So applications do not require end users to install any software. Verbatim s Secure Data USB Drive Business is a highly practical and reliable security device - ideal for any business purpose. With its security controller-based hardware it delivers high-level security for your documents or other important files. Military strength encryption No software installation Mandatory password entry 100% data encryption guaranteed Multi password support for user / guest Secure Data USB Drive Business Specifications: Interface: USB 2.0 Capacities: 2GB, 4GB, 8GB, 16GB, 32GB Data Retention: 10 Years Power Source: USB Bus (No batteries required) Windows XP, Vista and 7 Contents: Secure Data USB Drive Business, Quick Start Guide Product Dimensions: 64mm x 21mm x 11mm L x W x H) Product Weight: 13.8g Secure Data USB Drive Business 2GB Secure Data USB Drive Business 4GB Secure Data USB Drive Business 8GB Secure Data USB Drive Business 16GB Secure Data USB Drive Business 32GB Windows 7 compatible On demand: Remote Device Management On demand: AntiVirus protection On demand: Central Management OFESS SSION SION AL Responding to the need for reliable data security, Verbatim has developed a range of portable storage solutions specifically designed for the different requirements and levels of security demanded: Secure Data Storage Entry Level S SIONAL Secure Data Storage for Professionals GOVERN MENT Secure Data Storage for Government 6 7

5 Secure Data USB Drive /SSD ExpressCard Remote Secure Data USB Drive /SSD ExpressCard AntiVirus SSD ExpressCards and USB devices have evolved into useful, everyday data storage tools. But with the advantages they bring in terms of convenience and portability, there is also a danger just one lost or stolen could prove disastrous, risking the exposure of private information or financial data. Verbatim s Secure Data USB Drive and SSD ExpressCard Remote deliver premium AES 256bit (Advanced Standard) hardware security encryption and integrated password protection on an SSD or USB drive, which enables the storing and carrying of confidential data while being protected from loss or theft. After registering the device, the user can control the device via the Internet and lock (no password entry possible), unlock (enable password entry) or erase all data if it becomes lost / stolen. This additional line of defence strengthens the security of your data even further. It s another innovative first-to-market technology from Verbatim. Military strength encryption No software installation Mandatory password entry 100% data encryption guaranteed Multi password support for user / guest Secure Data SSD ExpressCard Remote Specifications: Interface: ExpressCard Read Speed: 30MB/sec Write Speed: 8MB/sec Capacities: 16GB, 32GB, 64GB Data Retention: 10 Years Power Source: USB Bus (No batteries required) - Windows 2000, XP, Vista, 7 - Mac OS 9 or higher, LINUX or higher Contents: Secure Data SSD ExpressCard Remote, Quick Start Guide Product Dimensions: 75mm x 34mm x 5mm (L x W x H) Product Weight: 15.3g Secure Data SSD ExpressCard Remote 16GB Secure Data SSD ExpressCard Remote 32GB Secure Data SSD ExpressCard Remote 64GB Windows 7 compatible Remote Device Management Plug n play device On demand: AntiVirus protection On demand: central management (see page 10) SSION NAL Secure Data USB Drive Remote Specifications: Interface: USB 2.0 Capacities: 2GB, 4GB, 8GB, 16GB, 32GB Data Retention: 10 Years Power Source: USB Bus (No batteries required) - Windows 2000, XP, Vista, 7 Contents: Secure Data USB Drive Remote, Quick Start Guide Product Dimensions: 64mm x 21mm x 11mm (L x W x H) Product Weight: 13.8g Secure Data USB Drive Remote 2GB Secure Data USB Drive Remote 4GB Secure Data USB Drive Remote 8GB Secure Data USB Drive Remote 16GB Secure Data USB Drive Remote 32GB Cutting-edge technology for your data safety; secure USB/SSD storage incorporating embedded McAfee antivirus support a combination of premium 256bit hardware encrypted SSD ExpressCard with independent virus scanner. Verbatim s Secure Data USB/SSD AntiVirus ensures that your data remains both secure from unauthorised viewing and virus free - all provided independently of the host computer. The drive comes with a free AntiVirus update service which lasts for 12 month. The virus scanner will continue to work after these 12 months, and you can also choose to purchase and receive future updates from McAfee directly once the free period has elapsed. Military strength encryption No software installation Mandatory password entry 100% data encryption guaranteed Multi password support for user / guest Secure Data SSD ExpressCard AntiVirus Specifications: Interface: ExpressCard Read Speed: 30MB/sec Write Speed: 8MB/sec Capacities: 16GB, 32GB, 64GB Data Retention: 10 Years Power Source: USB Bus (No batteries required) - Windows 2000, XP, Vista, 7 - Mac OS 9 or higher, LINUX or higher Contents: Secure Data SSD ExpressCard AntiVirus, Quick Start Guide Product Dimensions: 75mm x 34mm x 5mm (L x W x H) Product Weight: 15.3g Secure Data SSD ExpressCard AntiVirus 16GB Secure Data SSD ExpressCard AntiVirus 32GB Secure Data SSD ExpressCard AntiVirus 64GB Windows 7 compatible Remote Device Management Plug n play device Built-in AntiVirus protection Central management (see page 10) SSION AL Secure Data USB Drive AntiVirus Specifications: Interface: USB 2.0 Capacities: 2GB, 4GB, 8GB, 16GB, 32GB Data Retention: 10 Years Power Source: USB Bus (No batteries required) Windows XP, Vista and 7 Contents: Secure Data USB Drive AntiVirus, Quick Start Guide Product Dimensions: 64mm x 21mm x 11mm (L x W x H) Product Weight: 13.8g Secure Data USB Drive AntiVirus 2GB Secure Data USB Drive AntiVirus 4GB Secure Data USB Drive AntiVirus 8GB Secure Data USB Drive AntiVirus 16GB Secure Data USB Drive AntiVirus 32GB SSD ExpressCard The drive fits inside every laptop s PCI ExpressCard slot, providing a convenient way to add storage capacity without increasing the footprint of the laptop with an external device or going inside the case to install hardware. SSD ExpressCard The drive fits inside every laptop s PCI ExpressCard slot, providing a convenient way to add storage capacity without increasing the footprint of the laptop with an external device or going inside the case to install hardware. 8 9

6 Verbatim Control System (VCS) Secure Data USB Drive FIPS Centralised Remote Management for Corporate Users In corporate environments, data security is an ongoing concern for IT managers as lost or compromised flash drives can have serious business consequences. As the number of corporate USB drives increases, so does the need for centralised management tools that allow IT administrators to efficiently deploy, maintain and enforce security policies with enhanced manageability and scalability. The Corporate Secure USB Drive FIPS Edition - is NIST certified to meet Federal Information Processing Standards (FIPS) 140 Level 2 security requirements for cryptographic modules. Optimised for maximum performance and protection, this drive offers AES 256bit hardware data encryption, password hashing algorithm, protected password entry and compatibility with central management CMC software. For corporate users, Verbatim Control System offers a centralised management server allowing the IT administrator to remotely control and manage all flash drives being used in the organisation. Advanced remote management capabilities include: Lock (no ability to enter password), unlock (enable password entry) or erase drives of any user from corporate headquarters Government / military-strength encryption No software installation Mandatory user login complex password 100% data encryption guaranteed Hacker-proof data erased after 10 incorrect attempts Centrally managed Plug n play device Windows 7 compatible FIPS 140 level 2 certification GOVER NMENT NT Audit, trace and view logs of corporate flash drive usage (individual and aggregated) Enforce corporate security policies with respect to the use of flash drives by different types of users Generate individual drive or aggregated reports Secure Data USB Drive FIPS Specifications Running on a VMware virtual appliance, this system can be easily installed and deployed on any computer running VMware - from a strong dedicated server to a regular laptop running Windows. In addition to maximising use of existing resources, the management system leverages VMware to scale cost-effectively to facilitate the addition of CPUs or servers as an organisation s needs expand. From an operational standpoint, VMware enables easy backup and restore, while also supporting advanced fault tolerance and load balancing. Verbatim Control System (VCS) Interface: USB 2.0 (also compatible with USB 1.1 ports) Capacities: 2GB, 4GB, 8GB, 16GB Windows 2000, XP, Vista, 7 Windows 2003 Server Contents: Secure Data USB Drive FIPS 140-2, Quick Start Guide Product Dimensions: 70mm (L) x 19.3mm (W) x 19.3mm (H) Centralised management of corporate security policies for secure USB drives Centralised file tracing and trail auditing of corporate secure USB drives Remotely securing of data on lost or misplaced corporate flash drives Simple drive provisioning and attachment to the corporate VCS Secured management-client communication Integration with IT infrastructure, e.g. Directory Services VMware virtual appliance optimises scalability and manageability Secure Data USB Drive FIPS GB Secure Data USB Drive FIPS GB Secure Data USB Drive FIPS GB Simplified maintenance and improved security enforcement for IT administrators Easily accessible web-based management console Secured and hardened Linux-based infrastructure PROF ESSI SI ONAL 10 11

7 Secure Data HDD Backup PowerBay DataBank Secure Data SSD 6,35cm (2,5 ) The Verbatim PowerBay DataBank 4 Bay NAS Hard Drive provides robust data security for small and medium sized businesses, allowing documents to be safely shared across a network and on the Internet for employees to access. Designed specifically for network storage, a NAS tends to be easier to manage than a file server. All data recorded to the RAID volume can be encrypted with AES 256bit hardware encryption. You can mirror the encrypted volume through the external esata port and the mirrored volume will also be encrypted. The System Administrator can also lock the entire volume by setting the passwords in user interface (GUI). The locked volume can be unlocked by typing in the password. A USB drive can be used as an unlock key for a locked volume. If the PowerBay DataBank 4 Bay NAS Hard Drive is turned on without the USB unlock key, the volume cannot be accessed, protecting against theft. After the volume starts up with the USB unlock key, you can take out the USB key. Bundled Software: Acronis True Image Software for PowerBay provides backup, restore, data protection and Disaster Recovery capabilities. Mechanical anti-theft security Powerbay has a key lock on the front panel to prevent cartridges being removed by unauthorised people. It also has a slot for Kensington lock on the back panel. LAN Replication Removable, enclosed hard drive cartridge system (hot swappable) 256 bit AES encryption RAID 6, the most redundant RAID setting (also RAID 0, 1+spare, 5, 5+spare) High quality, industrial build for maximised uptime Acronis Backup Software: 5 licenses esata port for fast mirroring LAN replication POWERBAY DataBank 4 Bay NAS Hard Drive 500GB POWERBAY DataBank 4 Bay NAS Hard Drive 1TB POWERBAY DataBank 4 Bay NAS Hard Drive 2TB Compatible with Kensington lock SSION AL You can now upgrade your two year old notebook from HDD storage to cutting-edge SSD technology with all its benefits; faster start-up because no spin-up is required faster random access because there is no read/write head faster boot and application launch times consistent read performance because physical location of data is irrelevant for SSDs silent operation due to the lack of moving parts low power consumption less heat when in use high mechanical reliability, due to the lack of moving parts the ability to endure extreme shock, high altitude, vibration and extremes of temperature Additionally to all of these benefits, with the Verbatim Secure Data SSD, you also get 256bit ; so you can get an SSD technology upgrade together with full drive security at a cheaper price than buying a new and unsecure laptop. Solid state mobile advantages Military-strength encryption Mandatory password entry 100% data encryption guaranteed Available: Q4/2010 Secure Data Solid State Drive 6,35cm (2.5 ) Specifications: SSIONAL Interface: USB 2.0 / SATA Capacities: 64GB, 128GB, 256GB Win 2000 (SP2), XP (SP4), Vista, Windows 7, Contents: Solid State Drive 6,35cm (2.5 ) mini USB/ SATA, mini USB cable, Quick Start Guide Product Dimensions: 100 (L) x 70 (W) x 8.9 (H) mm Product Weight: 65.3g Solid State Drive 6,35cm (2.5 ) - mini USB/SATA 64GB Solid State Drive 6,35cm (2.5 ) - mini USB/SATA 128GB Solid State Drive 6,35cm (2.5 ) - mini USB/SATA 256GB Register for Release information at Visit for more information:

8 Secure Data Software EasyLock Secure Data DVD EasyLock is an enterprise-grade portable data encryption solution which enables any computer user, from novice to expert, to turn any mobile storage device into a portable data safe. Featuring an intuitive drag and drop interface, EasyLock offers users a simple way to deal with the risk posed by data being lost or stolen. Using secure encryption while at the same time preserving mobility, EasyLock can be used on any mobile device such as USB sticks, portable hard disks and even your beloved mp3 player. Verbatim is the world s largest manufacturer of optical media. All the key DVD, CD and Blu-ray drive manufacturers use Verbatim s optical media to test their products. They select our media for its consistently high quality level and this ensures that our media is optimised for the drives that are being used by today s consumers and professionals. Sensitive data is regularly saved onto optical discs contracts, blueprints, software, personal correspondence, records, to list just a few. It goes without saying that security measures should be put in place to ensure that this data doesn t get into the wrong hands. Verbatim s SecureDVD provides the solution. SecureData DVD is a perfect way of mailing sensitive data to a recipient. The password can be ed or transmitted separately to ensure privacy. Data can also be added until the disc is full so the disc could be used to return information if required. Runs with any removable storage device No administration rights required 256bit AES software encryption Enforced encryption (in combination with Endpoint Protector 2010) Reliable optical storage Software encryption No software installation Plug n play Effortless to save and protect files Windows 7 compatible SSION SION AL Secure Data Software EasyLock Specifications: Windows Vista, XP, 2000, Windows 7 Software Download: Specifications: AES 256 encryption Password protected Hybrid disc technology - DVD-R with integrated software. 4.5GB of secure storage SecureSave DVD 4.5GB

9 Product Overview What product fits my purpose? Features for reliable security Military Strength Software EasyLock Software DVD Media Software USB Business Secure Data USB / SSD Remote USB / SSD AntiVirus USB FIPS HDD Backup 6,35cm (2,5 ) SSD Algorithm 256-bit AES 256-bit AES 256-bit AES 256-bit AES 256-bit AES 256-bit AES 256-bit AES 256-bit AES Unique Identification Number Plug n play Administrative rights required NO NO NO NO NO NO NO YES Mandatory Password Entry Password strength 6 characters 8 characters Complex Complex Complex Complex Complex Complex Scalable rules and policies Cryptographic Hash Password Data encryption 100% guaranteed User Identification Multi Password support Brute-force Password Attack Protection Physical Anti Tamper Protection On-the-fly / Pipelined Decryption AntiVirus Protection embedded AntiVirus Updates AntiVirus Scan of any other PC Zero Footprint FIPS level 3 Application Update Security on demand All inclusive security-on-demand security-on-demand Remote Device Management (lock - unlock Password / Poison Pill erase content) Central Manageability / Verbatim Control System (VCS) Server Software English OS German OS French OS Italian OS Spanish OS Windows 2000 (SP2) XP (SP4) Vista Windows 7 Gigabyte 4,5GB USB 2GB, 4GB, 8GB, 16GB, 32GB USB 2GB, 4GB, 8GB, 16GB, 32GB Express- Card: 16GB, 32GB, 64GB USB 2GB, 4GB, 8GB, 16GB Express- Card: 16GB, 32GB, 64GB 2GB, 4GB, 8GB, 16GB From 4x 500GB Up to 4x 2TB 32GB, 64GB, 128GB, 256GB, 512GB Yes Secure Data USB AntiVirus (Page 9) Verbatim Control System (Page 10) I need to secure less important data Software Secure DVD Media (Page 15) EasyLock Software (Page 14) USB Do I want to be able to mange my devices remotely Yes Do I want to be sure no Virus can be stored No Secure Data USB Remote (Page 8) No Secure Data USB Business (Page 7) How do I protect my data Yes Secure Data SSD AntiVirus (Page 9) Verbatim Control System (Page 10) Express Card Do I want to be able to mange my devices remotely Yes Do I want to be sure no Virus can be stored I need to secure sensitive data SSD No Secure Data SSD Remote (Page 8) Which format fits best? 2,5 (Page 13) HDD Secure Data HDD Backup PowerBay (Page 12) Note: From time to time product specification may vary slightly without prior notice, however basic product functionality will remain unchanged 16 17

10 Verbatim Security Micropage Best practise 10 Tips for Dummies Keep up-to-date - Visit us at 1. Identify Your Sensitive Data In order to protect your data you first have to identify which of your data is sensitive and needs protection. 2. Use Encrypted Storage for All Sensitive Data encryption may be more expensive than everyday drives but is still affordable, and safer than software encryption. Don t give hackers and people who d like to expose your loss on the Web a chance! 3. Set a Data Protection Policy Setting up a policy to govern your data protection is crucial. Best practice shows that it takes time to set up a proper policy. In the meantime, your data leakage goes on, so you have to start protecting at the same time. Policy and introduction of hardware comes together. 4. Introduce Mandatory Passwords Making passwords mandatory is the right choice to guarantee 100 per cent data encryption and protect your assets. You can get password-secured USB sticks that destroy themselves by formatting the whole content when someone tries to crack the password. You only get so many attempts to fill in the password. So when someone who s not authorised to access the drive enters the password incorrectly more than a certain number of times, all data on the stick is deleted (so make sure you have a backup of your data). 5. Benefit from Multi-passwords If everyone encrypts their data with a secret key known only to the owner of the data, how can you share information with others? It doesn t make sense to secure your data in a way that blocks users doing what they have to do. Multi-password capability is the solution. With multi-password capability you can define owner and guest user accounts. The file owner can then limit and control guest file operations. This way only users who are authorised are able to use the information. Without this feature, users will use unsecure drives again or open their secure drives for full drag and drop to an unsecured one. 6. Use Personal Online Management Personal online management is a second line of defence. If someone unauthorised manages to get hold of your device, personal online management gives you the ability to block or unblock your drive remotely so no one can even enter a password any longer. Or you can even set a poison pill and, without the unauthorised person even realising it, all data will be deleted next time he or she goes online. This extra protection helps to increase security. 7. Manage Remotely Depending on the size of business it makes sense to manage all secure drives through the IT manager. In this case, your IT manager has access to all USB sticks out there and can control their access, blocking one if needed (for example, if some bright spark s left their mobile storage in a taxi). 8. Protect Against Viruses Too Besides encrypting your data, you also need to ensure that it s virus free. Anti-virus software exists on host computers (laptops or PCs). Or, for example, Verbatim offers USB drives or Express Cards with anti-virus software embedded, so you can keep your data safe even if you re outside your company environment simply by using an anti-virusembedded USB stick. 9. Use ExpressCards SSD ExpressCards don t stick out and are therefore almost invisible. You can use them easily in modern laptops and notebooks, and they don t increase the physical footprint of the computer. 10. Act Now! Don t wait until your data s gone. You have a legal obligation to secure sensitive data. Losses can harm your organisation and your private assets. Mobile Data Leakage for Dummies By Guy Bunker and Gareth Fraser-King WILEY-VCH Verlag GmbH & Co. KGaA 18 19

11 Contact Details Verbatim Limited Prestige House, High Street, Egham, Surrey TW20 9DU UK Tel. +44 (0) Fax. +44 (0) Verbatim France, Middle East and Africa 4 Allée Armand Camus RUEIL MALMAISON CEDEX France Tel. +33 (0) Fax. +33 (0) info.france@verbatim-europe.com infomideastafrica@verbatim-europe.com Verbatim GmbH Düsseldorfer Str. 13, D Eschborn Germany Tel. +49 (0) Fax. +49 (0) info.germany@verbatim-europe.com Verbatim Italia Spa a socio unico Via Roma Cassina de Pecchi MI Italy Tel Fax info.italy@verbatim-europe.com Verbatim España S.A Carretera Real, 122-B, 5 2a, Sant Just Desvern, Barcelona Spain Tel. +34 (0) Fax. +34 (0) info.spain@verbatim-europe.com Verbatim Central/East Europe Düsseldorfer Str. 13, D Eschborn Germany Tel. +49 (0) Fax. +49 (0) info.central-east@verbatim-europe.com Verbatim Southern Africa First Floor, Building 4, Pinewood Office Park 33 Riley Road, Woodmead South Africa Tel. +27 (0) Fax. +27 (0) info.sa@verbatim-europe.com Verbatim Nordic Skelstedet 2A, 2950 Vedbæk Denmark Tel Fax info.nordic@verbatim-europe.com Московское представительство Verbatim GmbH Бизнес центр Ситидел ул. Земляной Вал, Москва Тел.: +7 (495) /18 Факс: +7 (495) info.central-east@verbatim.com info@verbatim-europe.com Verbatim 24 month Limited Warranty Microsoft, Windows, and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Mac and the Mac logo are trademarks of Apple Computer, Inc, registered in the U.S. and other countries. All other trademarks are the property of their respective holders. VERBATIM and logo are the trademarks of Mitsubishi Kagaku Media Co., Ltd. registered in EU and other countries. EUROPE Verbatim Ltd. Egham, UK. USA Verbatim Americas LLC. Charlotte, NC. Verbatim AUSTRALIA Pty. Ltd. Melbourne /GB/2500/1004

Small Business Solutions

Small Business Solutions Small Business Solutions Secure Data USB Hardware Endpoint Protection Software Doctors - Sensitive patient data Architects - Valuable drawings T Ta x Consultant - Private tax data Marketing Y - Yo ur campaign

More information

PowerBay. Robust Data Security for Professionals. - DataBank 4 Bay NAS (Network Attached Storage) - Removable Hard Drive System (Single Bay)

PowerBay. Robust Data Security for Professionals. - DataBank 4 Bay NAS (Network Attached Storage) - Removable Hard Drive System (Single Bay) PowerBay Robust Data Security for Professionals - DataBank 4 Bay NAS (Network Attached Storage) - Removable Hard Drive System (Single Bay) PowerBay DataBank 4 Bay NAS Hard Drive - Designed for maximum

More information

Flash Memory Range. www.verbatim-europe.com

Flash Memory Range. www.verbatim-europe.com Flash Memory Range Memory Cards - SD. microsd. CompactFlash USB - Store 'n' Go Series SSD - SSD ExpressCard, Internal/External SSD Security - Secure 'n' Go Series www.verbatim-europe.com Introduction The

More information

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE 256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20

More information

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE 256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20

More information

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES 256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES integralmemoryusa.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20 years of sales

More information

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES 256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES integralmemoryusa.com Integral and the Crypto SSD range Introducing Integral Memory plc are one of the largest digital memory producers in Europe with

More information

Brighter Choice... LED Lighting from Verbatim. Quality. Performance. Technology. Mitsubishi Chemical Holdings Group

Brighter Choice... LED Lighting from Verbatim. Quality. Performance. Technology. Mitsubishi Chemical Holdings Group Brighter Choice... LED Lighting from Verbatim Quality. Performance. Technology. Mitsubishi Chemical Holdings Group A new era in lighting... Delivering a better user experience in commercial and domestic

More information

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices 1 EasyLock User Manual Intuitive Encryption Application for portable Storage Devices User Manual Version 1.0.0.8 2004-2010 CoSoSys Ltd. 2 Table of Contents Table of Contents... 2 1. Introduction... 3 2.

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD

AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD Integral Encrypted USB Product Range About Integral Memory plc Integral Memory was established in 1989 and has been involved in the flash storage industry

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

SecureD Technical Overview

SecureD Technical Overview WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD

More information

Self-Encrypting Hard Disk Drives in the Data Center

Self-Encrypting Hard Disk Drives in the Data Center Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional

More information

AES 256 BIT ENCRYPTED USB FLASH DRIVES FIPS ACCREDITED

AES 256 BIT ENCRYPTED USB FLASH DRIVES FIPS ACCREDITED AES 256 BIT ENCRYPTED USB FLASH DRIVES FIPS ACCREDITED Security Features Integral Crypto AES 256-bit hardware encrypted USB Drives USB Flash Drive security is a challenge facing all IT departments and

More information

AES 256 BIT ENCRYPTED USB FLASH DRIVES FIPS ACCREDITED

AES 256 BIT ENCRYPTED USB FLASH DRIVES FIPS ACCREDITED AES 256 BIT ENCRYPTED USB FLASH DRIVES FIPS ACCREDITED Integral Crypto AES 256-bit hardware encrypted USB Drives MR. B. SUMMERS USB Flash Drive security is a challenge facing all IT departments COMPTON

More information

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN

More information

OdysseyTM. removable hard disk storage system. secure. fast. expandable.

OdysseyTM. removable hard disk storage system. secure. fast. expandable. OdysseyTM removable hard disk storage system secure. fast. expandable. P o w e r f u l d a t a p r o t e c t i o n w i t h m i n i m a l e f f o r t Imation Corp. is the only company in the world solely

More information

Securing Data on Portable Media. www.roxio.com

Securing Data on Portable Media. www.roxio.com Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16

2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

1. System Requirements

1. System Requirements BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data

More information

Hi-Speed USB 2.0 Flash Disk. User s Manual

Hi-Speed USB 2.0 Flash Disk. User s Manual Hi-Speed USB 2.0 Flash Disk User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Before Use... 4 Driver Installation... 5 Driver Installation for Windows 98/98SE... 5 Disk Partitions

More information

Encryption Buyers Guide

Encryption Buyers Guide Encryption Buyers Guide Today your organization faces the dual challenges of keeping data safe without affecting user productivity. Encryption is one of the most effective ways to protect information from

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Secure USB Flash Drive. Biometric & Professional Drives

Secure USB Flash Drive. Biometric & Professional Drives Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE

More information

USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB)

USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB) USB flash drive (128MB,256MB,512MB,1GB,2GB,4GB) Despite the different brands and names you've heard for USB flash drives JumpDrives, Pocket drives, Pen drives, and Thumb drives they all pretty much operate

More information

SMART. SIMPLE. SAFE. Imation RDX. removable hard disk storage system

SMART. SIMPLE. SAFE. Imation RDX. removable hard disk storage system SMART. SIMPLE. SAFE. Imation RDX removable hard disk storage system IMATION CORP Imation is a leading global developer and marketer of branded products that enable people to capture, save and enjoy digital

More information

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate

More information

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW

More information

MyUSBOnly User Guide Menu

MyUSBOnly User Guide Menu MyUSBOnly User Guide Menu Welcome - Lock the Bad Guys out of your USB ports!... 2 System Requirement... 4 Important Notes... 4 FAQ How to install a trial version MyUSBOnly?... 5 FAQ How to buy and install

More information

Aegis Padlock for business

Aegis Padlock for business Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses

More information

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce Windows To Go: Empower And Secure The Mobile Workforce CONTENTS 2 Windows To Go: Support New Levels of Secure Mobility 3 Benefits of IT-Managed Windows Workspaces 5 Mobile Workforce Use Cases 5 Superior

More information

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data Security Kit Outline How do you protect your critical

More information

Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual

Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual Imation Clip USB 2.0 Flash Drive Imation Drive Manager Software User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Handling and Operating Recommendations... 4 Driver Installation...

More information

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Outline How do you protect your critical confidential data?

More information

Activatiecode voor NovaBackup Professional voor 3 pc. Omschrijving NovaBACKUP Professional 14.1

Activatiecode voor NovaBackup Professional voor 3 pc. Omschrijving NovaBACKUP Professional 14.1 Talen English Korte omschrijving Activatiecode voor NovaBackup Professional voor 3 pc. Omschrijving NovaBACKUP Professional 14.1 Windows Backup Software for Laptops, PCs, and Workstations Easy to install,

More information

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services Pixius Advantage Outsourcing Managed Services Move forward with endpoint protection by understanding its unique requirements. As the number of information workers rises, so does the growth and importance

More information

Chapter 8: Security Measures Test your knowledge

Chapter 8: Security Measures Test your knowledge Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such

More information

BEST PRACTICE GUIDE TO ENCRYPTION.

BEST PRACTICE GUIDE TO ENCRYPTION. BEST PRACTICE GUIDE TO ENCRYPTION. CONTENTS 1. INTRODUCTION...2 Page 2. BEST PRACTICE APPROACHES...3 3. POLICY FIRST TECHNOLOGY SECOND...4 4. FULL DISK ENCRYPTION OR FILE LEVEL ENCRYPTION?...5 5. ENFORCE

More information

Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide

Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide Seagate Business Storage NAS User Guide 2013 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

GV-Hot Swap Backup Center System (Rev. B) 3U, 16 / 8-Bay

GV-Hot Swap Backup Center System (Rev. B) 3U, 16 / 8-Bay -1- GV-Hot Swap Backup Center System (Rev. B) 3U, 16 / 8-Bay Introduction The GV Hot Swap Backup Center System, designed for large scale video surveillance deployments, provides a secure remote backup

More information

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems Built-in Security to Protect Sensitive Data without Sacrificing Performance What is an SED? A self-encrypting drive performs

More information

d2 Quadra ENTERPRISE CLASS Professional Hard Disk DESIGN BY NEIL POULTON esata 3Gb/s FireWire 800 & 400 USB 2.0

d2 Quadra ENTERPRISE CLASS Professional Hard Disk DESIGN BY NEIL POULTON esata 3Gb/s FireWire 800 & 400 USB 2.0 d2 Quadra ENTERPRISE CLASS DESIGN BY NEIL POULTON Professional Hard Disk esata 3Gb/s FireWire 800 & 400 USB 2.0 The Difference The LaCie d2 Quadra is the most complete hard disk solution for professionals

More information

10GbE Ethernet for Transfer Speeds of Over 1150MB/s

10GbE Ethernet for Transfer Speeds of Over 1150MB/s Ultimate Performance 10GbE Ethernet for Transfer Speeds of Over 1150MB/s N16000PRO SAMBA Performance High-end data centers often need a level of speed that today s average Ethernet connection cannot provide.

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

Acronis True Image 2015 REVIEWERS GUIDE

Acronis True Image 2015 REVIEWERS GUIDE Acronis True Image 2015 REVIEWERS GUIDE Table of Contents INTRODUCTION... 3 What is Acronis True Image 2015?... 3 System Requirements... 4 INSTALLATION... 5 Downloading and Installing Acronis True Image

More information

Computer Backup Strategies

Computer Backup Strategies Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

RDX. removable hard disk storage system. smart. simple. safe.

RDX. removable hard disk storage system. smart. simple. safe. RDX removable hard disk storage system smart. simple. safe. D a t a b a c k u p j u s t b e c a m e e a s i e r Imation Corp. is the only company in the world solely focused on the development, manufacture

More information

3 Port PCI Express 2.0 SATA III 6 Gbps RAID Controller Card w/ msata Slot and HyperDuo SSD Tiering

3 Port PCI Express 2.0 SATA III 6 Gbps RAID Controller Card w/ msata Slot and HyperDuo SSD Tiering 3 Port PCI Express 2.0 SATA III 6 Gbps RAID Controller Card w/ msata Slot and HyperDuo SSD Tiering StarTech ID: PEXMSATA343 The PEXMSATA343 3-Port PCI Express 2.0 SATA Card with HyperDuo adds an internal

More information

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

NETWORK AND INTERNET SECURITY POLICY STATEMENT

NETWORK AND INTERNET SECURITY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Best Practices for Protecting Laptop Data

Best Practices for Protecting Laptop Data Laptop Backup, Recovery, and Data Security: Protecting the Modern Mobile Workforce Today s fast-growing highly mobile workforce is placing new demands on IT. As data growth increases, and that data increasingly

More information

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization Understanding Northwestern University s contract with Symantec Symantec Solutions for Cost Reduction & Optimization Chris Hagelin and Shane Scholes Symantec Account Manager and Symantec Sales Engineer

More information

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Protecting Your Data On The Network, Cloud And Virtual Servers

Protecting Your Data On The Network, Cloud And Virtual Servers Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan LAW OFFICE SECURITY for Small Firms and Sole Practitioners Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan 1. Introduction CONTENTS 2. Security Consciousness Having a Firm Security

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Managing BitLocker With SafeGuard Enterprise

Managing BitLocker With SafeGuard Enterprise Managing BitLocker With SafeGuard Enterprise How Sophos provides one unified solution to manage device encryption, compliance and Microsoft BitLocker By Robert Zeh, Product Manager Full-disk encryption

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table

CSG & Cyberoam Endpoint Data Protection. Ubiquitous USBs - Leaving Millions on the Table CSG & Cyberoam Endpoint Data Protection Ubiquitous USBs - Leaving Millions on the Table Contents USBs Making Data Movement Easy Yet Leaky 3 Exposing Endpoints to the Wild. 3 Data Breach a Very Expensive

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

LaCie 5big Backup Server

LaCie 5big Backup Server LaCie 5big Backup Server DESIGN BY NEIL POULTON Centralized Backup Appliance for Small Businesses Back Up 10 PCs and 25 Macs 10TB * Gigabit Ethernet The Right Backup Solution for Small Business Delivering

More information

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

BlackArmor NAS 440/420 User Guide

BlackArmor NAS 440/420 User Guide BlackArmor NAS 440/420 User Guide BlackArmor NAS 440/420 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery. Investment and Governance Division 614.995.9928 tel Ted Strickland, Governor 30 East Broad Street, 39 th Floor 614.644.9152 fax R. Steve Edmonson, Director / State Chief Information Officer Columbus, Ohio

More information

Samsung SED Security in Collaboration with Wave Systems

Samsung SED Security in Collaboration with Wave Systems Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically

More information

THE. solution. STORe it. SHARE it.

THE. solution. STORe it. SHARE it. THE small business solution THE HP Storageworks X510 Data Vault STORe it. SECURE it. SHARE it. T H E H P S t o r a g e w o r k s X 51 0 D a t a V a u l t data protection just got less puzzling If, like

More information

Backup in a Data Driven World: Affordable Backup Options for Home and SMB

Backup in a Data Driven World: Affordable Backup Options for Home and SMB 1 A NEW NAS Experience a white paper Backup in a Data Driven World: Affordable Backup Options for Home and SMB September 2009 Table of Contents 2 Introduction 3 What is NAS? 3 Backup Methods and Features

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,

More information

How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS

How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS How would lost data impact your business? What you don t know could hurt you You

More information

Open Source and License Source Information

Open Source and License Source Information BlackArmor NAS 220 BlackArmor NAS 220 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks of Seagate

More information

Taurus Super-S3 LCM. Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives. User Manual March 31, 2014 v1.2 www.akitio.

Taurus Super-S3 LCM. Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives. User Manual March 31, 2014 v1.2 www.akitio. Dual-Bay RAID Storage Enclosure for two 3.5-inch Serial ATA Hard Drives User Manual March 31, 2014 v1.2 www.akitio.com EN Table of Contents Table of Contents 1 Introduction... 1 1.1 Technical Specifications...

More information

Samsung Magician v.4.5 Introduction and Installation Guide

Samsung Magician v.4.5 Introduction and Installation Guide Samsung Magician v.4.5 Introduction and Installation Guide 1 Legal Disclaimer SAMSUNG ELECTRONICS RESERVES THE RIGHT TO CHANGE PRODUCTS, INFORMATION AND SPECIFICATIONS WITHOUT NOTICE. Products and specifications

More information

Innovative Secure Boot System (SBS) with a smartcard.

Innovative Secure Boot System (SBS) with a smartcard. Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable

More information

The virtual safe: A user-focused approach to data encryption

The virtual safe: A user-focused approach to data encryption The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with

More information

BlackArmor NAS 110 User Guide

BlackArmor NAS 110 User Guide BlackArmor NAS 110 User Guide BlackArmor NAS 110 User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks

More information

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology 20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business

More information

Laptop USB KVM Switch USER MANUAL CS661

Laptop USB KVM Switch USER MANUAL CS661 Laptop USB KVM Switch USER MANUAL CS661 FCC Information This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits

More information

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1) Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)

More information