Overview of Data Security Methods: Passwords, Encryption, and Erase

Size: px
Start display at page:

Download "Overview of Data Security Methods: Passwords, Encryption, and Erase"

Transcription

1 Overview of Data Security Methods: Passwords, Encryption, and Erase Chris Budd SMART High Reliability Solutions Santa Clara, CA 1

2 Overview of Data Security Methods Introduction Data Protection Passwords Encryption Write Protect Questions to Ask Conclusion Data Elimination Erasing Overwrite External Triggers Santa Clara, CA 2

3 Introduction Data security important in all areas of storage Data security has two main components Data Protection Data Elimination Opposites? No. Both guard data from unauthorized access Santa Clara, CA 3

4 Introduction Data protection guards data from access First step of data security Keeps data for use only by authorized users Includes passwords and encryption Santa Clara, CA 4

5 Introduction Data elimination guards data from access Must be last step before adversary obtains drive Removes data before adversary can access it Includes erasing encryption key, and possibly data Santa Clara, CA 5

6 Introduction Additional features for military and industrial Write protect Overwrite after an erase External erase triggers Santa Clara, CA 6

7 Data Protection Passwords Passwords are similar to combination lock on storage shed ATA specifies 32-byte password Binary: 1 in or 1 in 1.16 x ASCII: 1 in or 1 in 1.94 x Automatically locks after reset or power cycle 5 attempts to unlock; then drive must be reset Santa Clara, CA 7

8 Data Protection Encryption Self-Encrypting Drives (SED) No user or host intervention Could erase encryption key in milliseconds If user did not erase before adversary acquires the drive, then encryption is worthless without a password Santa Clara, CA 8

9 Data Protection Encryption If no password, adversary has access to data If password set, adversary must break password or remove flash chips Wear leveling places data randomly Similar to jigsaw puzzle with picture distorted Santa Clara, CA 9

10 Data Protection Write Protect Reasons Protect collected data after mission Protect map data during flight Activation Vendor specific ATA command External pins, but implementation varies Santa Clara, CA 10

11 Data Elimination Erase First step for SED is erase encryption key Crypto or cryptographic erase Normal read/write access useless Encrypted data remains in NAND Santa Clara, CA 11

12 Data Elimination Erase Some SSDs may erase data blocks If user set a password, and if SSD includes crypto and block erase Adversary removing flash chips is similar to jigsaw puzzle with all pieces same shape and same blank picture Santa Clara, CA 12

13 Data Elimination Overwrite Crypto and block erase not always sufficient Some agencies require overwrite IRIG , Chapter 10 Two overwrites: 0x55, then 0xAA All blocks processed; no exclusions Santa Clara, CA 13

14 Data Elimination External Triggers If cannot rely on SW erase command Erase based on hardware input Push button or electrical switch Implementation varies Front or back Shorted or power Santa Clara, CA 14

15 Questions to Ask Crypto or block erase? If block erase, which blocks? Mapping information? User data? Entire contents of NAND flash? Overwrite blocks? Santa Clara, CA 15

16 Questions to Ask How does user know when drive done? LEDs for states: normal, erasing, initializing? Software commands (S.M.A.R.T. attributes)? Does the drive resume after power cycle? Can end user read entire contents of NAND flash to verify? Santa Clara, CA 16

17 Conclusion Data protection Passwords and encryption Keeps data only for authorized users Data elimination Crypto erase and block erase No more data; not even for authorized users Santa Clara, CA 17

18 Conclusion Additional requirements For military and industrial applications Write protect, overwrite, & external erase triggers Ask your SSD vendor tough questions Complete your overall system security design Pass the scrutiny of IA security officer Santa Clara, CA 18

19 Conclusion SMART High Reliability Solutions Has over 20 years of experience in solid-state storage Knows well the data security requirements of military and industrial applications Ask us your data security questions See us in booth #627 Santa Clara, CA 19

Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant

Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052

More information

Encrypted SSDs: Self-Encryption Versus Software Solutions

Encrypted SSDs: Self-Encryption Versus Software Solutions Encrypted SSDs: Self-Encryption Versus Software Solutions Michael Willett Storage Security Strategist and VP Marketing Bright Plaza Flash Memory Summit 2015 Santa Clara, CA 1 The Problem 2005-2013: over

More information

XTREMIO DATA AT REST ENCRYPTION

XTREMIO DATA AT REST ENCRYPTION White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains

More information

Industrial Flash Storage Trends in Software and Security

Industrial Flash Storage Trends in Software and Security January 22, 2013 Industrial Flash Storage Trends in Software and Security Many flash storage devices in embedded applications are used to save data but also function as disks for the OS. Most users are

More information

ATA Flash Drive 187. RoHS Compliant. High-capacity Product Specifications. February 6 th, 2014. Version 1.0. Apacer Technology Inc.

ATA Flash Drive 187. RoHS Compliant. High-capacity Product Specifications. February 6 th, 2014. Version 1.0. Apacer Technology Inc. RoHS Compliant ATA Flash Drive 187 High-capacity Product Specifications February 6 th, 2014 Version 1.0 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan, R.O.C Tel:

More information

Keep Your Data Secure: Fighting Back With Flash

Keep Your Data Secure: Fighting Back With Flash Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up

More information

Industrial Grade Embedded Flash Storage Devices

Industrial Grade Embedded Flash Storage Devices Product Line Data Sheet Industrial Grade Embedded Flash Storage Devices L ong Life Cycles - Fixed BOM Control I ndustry Leading: R ugged, Reliable, Based on select SLC NAND components Handling of Unexpected

More information

Solid-State Drives with Self-Encryption: Solidly Secure

Solid-State Drives with Self-Encryption: Solidly Secure Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on

More information

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10. Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting

More information

Serial ATA Flash Drive

Serial ATA Flash Drive RoHS Compliant Serial ATA Flash Drive msata Mini M4 Product Specifications November 7 th, 2012 Version 1.1 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei Hsien

More information

Data Security using Encryption in SwiftStack

Data Security using Encryption in SwiftStack Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and

More information

Serial ATA Flash Drive

Serial ATA Flash Drive RoHS Compliant Serial ATA Flash Drive SAFD25M4 Product Specifications June 13 th, 2013 Version 1.5 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei Hsien 221,

More information

Serial ATA Flash Drive

Serial ATA Flash Drive RoHS Compliant Serial ATA Flash Drive msata M4 Product Specifications May 4 th, 2012 Version 1.3 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei Hsien 221,

More information

Serial ATA Flash Drive

Serial ATA Flash Drive RoHS Compliant Serial ATA Flash Drive SFD25A Product Specifications July 10 th, 2014 Version 1.1 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan, R.O.C Tel: +886-2-2267-8000

More information

Challenges and Solutions for Effective SSD Data Erasure

Challenges and Solutions for Effective SSD Data Erasure Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional

More information

Serial ATA Flash Drive

Serial ATA Flash Drive RoHS Compliant Serial ATA Flash Drive msata A1 Product Specifications July 10 th, 2014 Version 1.3 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan, R.O.C Tel: +886-2-2267-8000

More information

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy

More information

Measuring Interface Latencies for SAS, Fibre Channel and iscsi

Measuring Interface Latencies for SAS, Fibre Channel and iscsi Measuring Interface Latencies for SAS, Fibre Channel and iscsi Dennis Martin Demartek President Santa Clara, CA 1 Demartek Company Overview Industry analysis with on-site test lab Lab includes servers,

More information

Samsung SED Security in Collaboration with Wave Systems

Samsung SED Security in Collaboration with Wave Systems Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically

More information

Serial ATA Flash Drive

Serial ATA Flash Drive RoHS Recast Compliant Serial ATA Flash Drive msata M4 Product Specifications April 22 nd, 2013 Version 1.8 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei Hsien

More information

Serial ATA Flash Drive

Serial ATA Flash Drive RoHS Recast Compliant Serial ATA Flash Drive msata M4 -M Product Specifications March 12 th, 2013 Version 1.8 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei

More information

Serial ATA Flash Drive

Serial ATA Flash Drive RoHS Compliant Serial ATA Flash Drive SFD25A -M Product Specifications September 19 th, 2014 Version 1.6 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan, R.O.C

More information

Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates

Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification

More information

CHAPTER 11: Flip Flops

CHAPTER 11: Flip Flops CHAPTER 11: Flip Flops In this chapter, you will be building the part of the circuit that controls the command sequencing. The required circuit must operate the counter and the memory chip. When the teach

More information

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology

More information

HP FutureSmart Firmware Device Hard Disk Security

HP FutureSmart Firmware Device Hard Disk Security HP FutureSmart Firmware Device Hard Disk Security Summary: This document discusses hard disk security for HP FutureSmart Firmware printing devices. Contents: Overview... 2 Secure Erase Commands... 2 1.

More information

SSD Server Hard Drives for IBM

SSD Server Hard Drives for IBM New for 2011! Axiom is introducing a new line of SSD Hot-Swap Server Hard Drives. Our high performance SSD hard drives have been paired with system specific Hot-Swap trays to deliver seamless integration

More information

FLASH USB 2. 0. Introduction ENGLISH

FLASH USB 2. 0. Introduction ENGLISH ENGLISH FLASH RED LED (LOCKED) GREEN LED (UNLOCKED) KEY BUTTON PIN KEYS BLUE LED (ACTIVITY) Introduction Thank you for purchasing the Corsair Your new Flash Padlock 2 is a 256-bit hardware encrypted USB

More information

Strategies for Firmware Support of Self-Encrypting Drives

Strategies for Firmware Support of Self-Encrypting Drives presented by Strategies for Firmware Support of Self-Encrypting Drives UEFI Winter Plugfest February 21-23, 2011 Presented by Jeff Bobzin (Insyde Software, Inc.) Updated 2011-06-01 UEFI Plugfest February

More information

Destroying Flash Memory-Based Storage Devices (draft v0.9)

Destroying Flash Memory-Based Storage Devices (draft v0.9) Destroying Flash Memory-Based Storage Devices (draft v0.9) Dr. Steven Swanson Director, Non-volatile Systems Laboratory Department of Computer Science and Engineering University of California, San Diego

More information

Features. SSD370S SATA III 6Gb/s SSD. Advanced Global Wear-Leveling and Block management for reliability

Features. SSD370S SATA III 6Gb/s SSD. Advanced Global Wear-Leveling and Block management for reliability SSD370S SATA III 6Gb/s SSD Due to Ultra-slim (fit the standard dimensions of 2.5 SATA Hard Disk Drives), huge capacity, SATA 6Gb/s speed, and low power consumption, Solid State Drive is the perfect replacement

More information

Montgomery Auditorium

Montgomery Auditorium Montgomery Auditorium Projector Screen Document Camera Computer Monitor Smart Classroom Quick Start Guide Orientation Montgomery Auditorium Computer Monitor Document Camera AMX Remote Booth Phone Cabinet

More information

Intel Solid State Drive Toolbox

Intel Solid State Drive Toolbox 3.3.5 Document Number: 325993-026US Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending

More information

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or helpdesk@unmc.edu with questions. How it works Basically, BitLocker

More information

3.1 Backup and Recovery System

3.1 Backup and Recovery System 3.1 Backup and Recovery System FriendlyARM English User Manual 197 In the development process, we often need to constantly update the programmer and system debugging, and sometimes you will be with the

More information

1. System Requirements

1. System Requirements BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data

More information

DESIGNING SECURE USB-BASED DONGLES

DESIGNING SECURE USB-BASED DONGLES DESIGNING SECURE USB-BASED DONGLES By Dhanraj Rajput, Applications Engineer Senior, Cypress Semiconductor Corp. The many advantages of USB Flash drives have led to their widespread use for data storage

More information

AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD

AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD Integral Encrypted USB Product Range About Integral Memory plc Integral Memory was established in 1989 and has been involved in the flash storage industry

More information

Opal SSDs Integrated with TPMs

Opal SSDs Integrated with TPMs Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security

More information

Flash Memory Solutions for Small Business

Flash Memory Solutions for Small Business Optimization Techniques Change the Competitive Landscape Jered Floyd CTO, Permabit Technology Corp. Flash Memory Summit 2013 Santa Clara, CA 1 Permabit and Albireo Overview Headquarters: Cambridge, MA

More information

SOLID STATE DRIVES AND PARALLEL STORAGE

SOLID STATE DRIVES AND PARALLEL STORAGE SOLID STATE DRIVES AND PARALLEL STORAGE White paper JANUARY 2013 1.888.PANASAS www.panasas.com Overview Solid State Drives (SSDs) have been touted for some time as a disruptive technology in the storage

More information

Can Flash help you ride the Big Data Wave? Steve Fingerhut Vice President, Marketing Enterprise Storage Solutions Corporation

Can Flash help you ride the Big Data Wave? Steve Fingerhut Vice President, Marketing Enterprise Storage Solutions Corporation Can Flash help you ride the Big Data Wave? Steve Fingerhut Vice President, Marketing Enterprise Storage Solutions Corporation Forward-Looking Statements During our meeting today we may make forward-looking

More information

Tufts University. COMP116 Introduction to Computer Security. Recovery After Losing the Physical Device

Tufts University. COMP116 Introduction to Computer Security. Recovery After Losing the Physical Device Tufts University COMP116 Introduction to Computer Security Recovery After Losing the Physical Device Dec. 11 th 2014 Author: Haoyang Mao Mentor: Ming Chow 1 Abstract The only truly secure system is one

More information

This is an example of MFP password entry in the administration mode for hard-disk protection:

This is an example of MFP password entry in the administration mode for hard-disk protection: Data security Hard disk password protection The built-in hard disk of the MFP is automatically protected by a password. This password is stored in the hard disk BIOS and prevents access to the hard disk

More information

New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise

New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise Contents Addressing Common Encryption Issues... 2 Always-On Encryption... 2 Timesavings...

More information

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE 256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20

More information

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE 256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20

More information

Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.

Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust. Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery

More information

Acceptable Encryption Usage for UTHSC

Acceptable Encryption Usage for UTHSC This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged

More information

Intel Solid State Drive Toolbox

Intel Solid State Drive Toolbox 3.3.6 Document Number: 325993-027US Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending

More information

APPLICATION NOTE. AT07175: SAM-BA Bootloader for SAM D21. Atmel SAM D21. Introduction. Features

APPLICATION NOTE. AT07175: SAM-BA Bootloader for SAM D21. Atmel SAM D21. Introduction. Features APPLICATION NOTE AT07175: SAM-BA Bootloader for SAM D21 Atmel SAM D21 Introduction Atmel SAM Boot Assistant (Atmel SAM-BA ) allows In-System Programming (ISP) from USB or UART host without any external

More information

Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution

Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution 1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales

More information

1-10 The USB PIC K150 microcontroller programmer Hardware version V2.0 File version V2.0 Product Image

1-10 The USB PIC K150 microcontroller programmer Hardware version V2.0 File version V2.0 Product Image 1-10 The USB PIC K150 microcontroller programmer Hardware version V2.0 File version V2.0 Product Image 2-10 Product Description: K150 is the latest of a low-cost high-performance PIC programmer, support

More information

High-Performance SSD-Based RAID Storage. Madhukar Gunjan Chakhaiyar Product Test Architect

High-Performance SSD-Based RAID Storage. Madhukar Gunjan Chakhaiyar Product Test Architect High-Performance SSD-Based RAID Storage Madhukar Gunjan Chakhaiyar Product Test Architect 1 Agenda HDD based RAID Performance-HDD based RAID Storage Dynamics driving to SSD based RAID Storage Evolution

More information

This user guide describes features that are common to most models. Some features may not be available on your computer.

This user guide describes features that are common to most models. Some features may not be available on your computer. RAID User Guide Copyright 2011 Hewlett-Packard Development Company, L.P. Intel is a trademark of Intel Corporation in the U.S. and other countries. Microsoft and Windows are U.S. registered trademarks

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

Testing SSD s vs. HDD s. The Same But Different. August 11, 2009 Santa Clara, CA Anthony Lavia President & CEO

Testing SSD s vs. HDD s. The Same But Different. August 11, 2009 Santa Clara, CA Anthony Lavia President & CEO Testing SSD s vs. HDD s The Same But Different August 11, 2009 Santa Clara, CA Anthony Lavia President & CEO Introduction HDD vs. SSD Is SSD technology disruptive? Customer Expectations Factors Affecting

More information

Solid Security: The Rise of Self-Encrypting. Solid State Drives. Thomas Coughlin

Solid Security: The Rise of Self-Encrypting. Solid State Drives. Thomas Coughlin Self-Encrypting PRESENTATION TITLE GOES HERE Solid State Drives Thomas Coughlin Marketing Chair, SNIA Solid State Storage Initiative President, Coughlin Associates About the Presenter Tom Coughlin, Marketing

More information

GSM Smart Switch USER GUIDE

GSM Smart Switch USER GUIDE GSM Smart Switch USER GUIDE GSM Smart Switch allows switching almost any appliance ON and OFF remotely via mobile network. It is designed to receive start/stop commands from specially coded messages or

More information

Two Factor Authentication. Software Version (SV) 1.0

Two Factor Authentication. Software Version (SV) 1.0 Two Factor Authentication Software Version (SV) 1.0 Property of: Worldwide Interactive Services, Inc. 5025 South Orange Avenue Orlando, FL 32809 The data contained in this documentation is PROPRIETARY

More information

Intel Solid-State Drive 320 Series

Intel Solid-State Drive 320 Series Intel Solid-State Drive 320 Series Enterprise Server/Storage Application Product Specification Addendum Form Factors: 1.8-inch and 2.5-inch Capacity: 80/160/300 GB (1.8-inch) 40/80/120/160/300/600 GB (2.5-inch)

More information

Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual

Imation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual Imation Clip USB 2.0 Flash Drive Imation Drive Manager Software User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Handling and Operating Recommendations... 4 Driver Installation...

More information

Full Drive Encryption Security Problem Definition - Encryption Engine

Full Drive Encryption Security Problem Definition - Encryption Engine 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles

More information

IBM Crypto Server Management General Information Manual

IBM Crypto Server Management General Information Manual CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.

More information

Nasir Memon Polytechnic Institute of NYU

Nasir Memon Polytechnic Institute of NYU Nasir Memon Polytechnic Institute of NYU SSD Drive Technology Overview SSD Drive Components NAND FLASH Microcontroller SSD Drive Forensics Challenges Overview SSD s are fairly new to the market Whereas

More information

HIGHSEC eid App Administration User Manual

HIGHSEC eid App Administration User Manual HIGHSEC eid App Administration User Manual Contents 1 Introduction... 3 2 Application overview... 3 3 Managing HIGHSEC eid App... 3 3.1 Deleting card pairings... 4 4 Inspecting smart card contents... 5

More information

Solid State Drive (SSD) FAQ

Solid State Drive (SSD) FAQ Solid State Drive (SSD) FAQ Santosh Kumar Rajesh Vijayaraghavan O c t o b e r 2 0 1 1 List of Questions Why SSD? Why Dell SSD? What are the types of SSDs? What are the best Use cases & applications for

More information

SecureStore I.CA. User manual. Version 2.16 and higher

SecureStore I.CA. User manual. Version 2.16 and higher User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR

More information

PowerProtector: Superior Data Protection for NAND Flash

PowerProtector: Superior Data Protection for NAND Flash PowerProtector: Superior Data Protection for NAND Flash Introduction The unstable power conditions of outdoor applications such as transportation, telecommunications/networking and embedded systems run

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Intel RAID Controller Premium Feature Key Training

Intel RAID Controller Premium Feature Key Training Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID

More information

Calsoft Webinar - Debunking QA myths for Flash- Based Arrays

Calsoft Webinar - Debunking QA myths for Flash- Based Arrays Most Trusted Names in Data Centre Products Rely on Calsoft! September 2015 Calsoft Webinar - Debunking QA myths for Flash- Based Arrays Agenda Introduction to Types of Flash-Based Arrays Challenges in

More information

Seagate Instant Secure Erase Deployment Options

Seagate Instant Secure Erase Deployment Options Technology Paper Seagate Instant Secure Erase Introduction When hard drives are retired and moved outside the data centre into the hands of others, the data on those drives is put at significant risk.

More information

Scaling from Datacenter to Client

Scaling from Datacenter to Client Scaling from Datacenter to Client KeunSoo Jo Sr. Manager Memory Product Planning Samsung Semiconductor Audio-Visual Sponsor Outline SSD Market Overview & Trends - Enterprise What brought us to NVMe Technology

More information

Unlock the value of data with smarter storage solutions.

Unlock the value of data with smarter storage solutions. Unlock the value of data with smarter storage solutions. Data is the currency of the new economy.... At HGST, we believe in the value of data, and we re helping the world harness its power.... Data is

More information

How to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914

How to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914 How to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914 How to Install and Setup a Fujitsu MHZ2-CJ Series FDE HDD

More information

Flash Storage: Trust, But Verify

Flash Storage: Trust, But Verify Flash Storage: Trust, But Verify A better, vendor-independent way to analyze flash performance Leah Schoeb, Evaluator Group Peter Murray, Load DynamiX 1 Introductions 2 Speakers Leah Schoeb Senior Partner

More information

QuickSpecs. SATA (Serial ATA) Hard Drives for HP Workstations. Introduction. SATA (Serial ATA) Hard Drives for HP Workstations.

QuickSpecs. SATA (Serial ATA) Hard Drives for HP Workstations. Introduction. SATA (Serial ATA) Hard Drives for HP Workstations. Overview Introduction Commercial grade SATA 7200 rpm drives are our standard high bandwidth hard drive storage option. Storage capacities for the 7200 rpm drives range up to a massive 4.0TB. This enables

More information

miniflash User Manual

miniflash User Manual miniflash User Manual 1 miniflash 2015 Cloud-9 All Rights Reserved All portions of this hardware are copyrighted and are the proprietary and trade secret information of Cloud-9. Use, reproduction or publication

More information

Active Directory (AD) Self-Service

Active Directory (AD) Self-Service Active Directory (AD) Self-Service TETRA IT has implemented a way for you to: 1. Set-Up/Maintain AD Contact Information (Use this option to create an AD Self-Serve Account and/or Maintain your AD Contact

More information

Configuring Drobo Sync for Offsite Backup with Drobo model B800fs

Configuring Drobo Sync for Offsite Backup with Drobo model B800fs The Drobo 8-bay File Sharing Storage for Busines (model B800fs) with Drobo Sync is an ideal solution for file sharing and data replication activities in a small to medium business (SMB). Drobo Sync is

More information

Advances in Storage Security Standards Jason Cox Intel Corporation

Advances in Storage Security Standards Jason Cox Intel Corporation Advances in Storage Security Standards Jason Cox Intel Corporation Objectives Overview of Trusted Computing Group (TCG) Storage Work Group Review of TCG Document types and Goals Describe recent specifications

More information

Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13

Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13 User s Manual Table of Contents About the istorage diskashur Secure Hard Drive 4 Package contents 4 istorage diskashur button panel 5 istorage diskashur - Getting Started 6 Before you begin 6 Connecting

More information

Using AES 256 bit Encryption

Using AES 256 bit Encryption Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State

More information

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts. Overview Introduction Solid State Drives (SSDs) are fast becoming a real force with respect to storage in the computer industry. With no moving parts, storage is no longer bound by mechanical barriers

More information

SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications. A TCS Space & Component Technology White Paper

SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications. A TCS Space & Component Technology White Paper SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications A TCS Space & Component Technology White Paper Introduction As with most storage technologies, NAND Flash vendors

More information

KT-1 Key Chain Token. QUICK Reference. Copyright 2005 CRYPTOCard Corporation All Rights Reserved 051004

KT-1 Key Chain Token. QUICK Reference. Copyright 2005 CRYPTOCard Corporation All Rights Reserved 051004 KT-1 Key Chain Token QUICK Reference Copyright 2005 CRYPTOCard Corporation All Rights Reserved 051004 http://www.cryptocard.com Table of Contents OVERVIEW... 1 Token control... 1 OPERATING MODES & OPTIONS...

More information

Firmware Update Instructions for Crucial Client SSDs

Firmware Update Instructions for Crucial Client SSDs Firmware Update Instructions for Crucial Client SSDs Overview By using this guide, a user can perform a firmware update on Crucial Client SSDs installed in a personal computing environment, referred to

More information

How To Set Up A Hard Drive With A Harddrive With A 2Gb Hard Drive (I386) And 2Gb Drive (Amd64) On A Hardrive (I219) (Iee) (Amd66) (Ai219

How To Set Up A Hard Drive With A Harddrive With A 2Gb Hard Drive (I386) And 2Gb Drive (Amd64) On A Hardrive (I219) (Iee) (Amd66) (Ai219 1 Package Contents Device User manual Power adapter Power cord USB 2.0 Cable FireWire 800 Cable (IEEE1394.B) esata cable 2 Front View of the Device A Drive eject button B LED indicator C Front door panel

More information

Flash vs. Hard disks FFS problems New problems. SSDs und LogFS. Jörn Engel. Lazybastard.org. November 12, 2009

Flash vs. Hard disks FFS problems New problems. SSDs und LogFS. Jörn Engel. Lazybastard.org. November 12, 2009 Lazybastard.org November 12, 2009 Market Research SmartMedia Approach Modern SSDs The good Lower random access times More IO/s More robust against mechanical failures Less noise Lower power consumption

More information

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4 BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Security Technical Overview Published: 2014-01-17 SWD-20140117135425071 Contents 1 New in this release...10 2 Overview...

More information

Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file

Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file You may use your Medium Assurance Certificate(s) on any computer that you wish to by importing them

More information

USB Secure Management for ProCurve Switches

USB Secure Management for ProCurve Switches ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3

More information

SATA-Disk Module 5. RoHS Recast Compliant. SDM5 7P/180D Slim2 Product Specifications. July 17 th, 2014. Version 1.2. Apacer Technology Inc.

SATA-Disk Module 5. RoHS Recast Compliant. SDM5 7P/180D Slim2 Product Specifications. July 17 th, 2014. Version 1.2. Apacer Technology Inc. RoHS Recast Compliant SATA-Disk Module 5 SDM5 7P/180D Slim2 Product Specifications July 17 th, 2014 Version 1.2 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan,

More information

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally

More information

Technologies Supporting Evolution of SSDs

Technologies Supporting Evolution of SSDs Technologies Supporting Evolution of SSDs By TSUCHIYA Kenji Notebook PCs equipped with solid-state drives (SSDs), featuring shock and vibration durability due to the lack of moving parts, appeared on the

More information

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1 BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1 Version: 5.0 Service Pack: 3 Security Technical Overview Published: 2012-01-17 SWD-1936256-0117012253-001 Contents 1 Document revision history...

More information

OmniAccess 3500 Nonstop Laptop Guardian. Release 2.2. What s New?

OmniAccess 3500 Nonstop Laptop Guardian. Release 2.2. What s New? OmniAccess 3500 Nonstop Laptop Guardian Release 2.2 What s New? Document Version: 1.0 Part Number: 060294-00 Published: 12.20.2009 Legal Notice Alcatel-Lucent Proprietary 2009 Alcatel-Lucent. All rights

More information

NAND Flash Memories. Using Linux MTD compatible mode. on ELNEC Universal Device Programmers. (Quick Guide)

NAND Flash Memories. Using Linux MTD compatible mode. on ELNEC Universal Device Programmers. (Quick Guide) NAND Flash Memories Using Linux MTD compatible mode on ELNEC Universal Device Programmers (Quick Guide) Application Note April 2012 an_elnec_linux_mtd, version 1.04 Version 1.04/04.2012 Page 1 of 16 As

More information

SecureD Technical Overview

SecureD Technical Overview WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD

More information