Automatic Drive Locking: Securing Digital Content Storage in the Digital Home

Size: px
Start display at page:

Download "Automatic Drive Locking: Securing Digital Content Storage in the Digital Home"

Transcription

1 Automatic Drive Locking: Securing Digital Content Storage in the Digital Home January 2007

2 Silicon Image White Paper Table of Contents Table of Contents... 1 Introduction... 2 Disk based storage is expanding in new directions... 2 Physical Security of External Hard Drives... 2 Introducing Automatic Drive Locking... 4 Storage Processors and Automatic Drive Locking Applications and Benefits... 6 Conclusion

3 White Paper Silicon Image Introduction External hard drives are an easy way to add digital storage to a variety of electronic devices. Consequently they have become very popular among consumers, with the market projected to grow by over 263% between 2005 and As useful as external drives are, storing data outside the host device creates a new set of problems for users, corporations, and government agencies. The portability of external hard drives creates a security risk, and the stakes are raised by ever increasing drive sizes, as well as by backup programs that copy all of a users important data to the external hard drive. In addition, as external hard drives begin to proliferate in the consumer electronics space, their portability introduces new potential problems for manufacturers who have to balance providing expandable storage to consumers with the requirements of content providers who want a digital rights management scheme that ensures that premium content is being used as intended. Automatic drive locking on a storage processor uses an access-control approach to provide content security for hard drive based storage. It uses a unique, well hidden password burned into the storage processor to lock the drive to the storage processor, rendering the drive inoperable if not attached to its specific host. A major advantage of enabling this feature on a storage processor is that it requires no user intervention. Automatic drive locking provides benefits for a wide range of users, from consumers, to corporations, to government agencies, and across a range of devices that supports internal or external hard drive storage. Automatic drive locking can also be used as a component in an overall content protection strategy by manufacturers who wish to add additional protection of premium content. Disk Based Storage is Expanding in New Directions External hard drives started as a convenient means of adding storage, or backing up data off computers. This is especially true for laptops, which generally have limited internal expansion capabilities. In fact, many external drives come packaged with easy-to-use backup tools that can be executed with the push of a button. Recently, external drives have begun growing into the consumer electronics space, adding capacity to DVRs and HDTV/PVRs and providing more space to store videos, music and pictures. Even video game consoles are jumping on the bandwagon; the PlayStation 3 has a built in hard drive while the Xbox 360 includes an option to add an external hard drive. The additional storage allows users to download games, movie trailers and other premium content directly onto their game console. Physical Security of External Hard Drives Ironically, many of the features that make external drives an attractive and convenient option for consumers also make them attractive targets for theft. The weak physical security of external hard drives creates a 1 Source: IDC, Worldwide Hard Disk Drive Forecast and Analysis: Record-Breaking Years Lie Ahead, Doc #201478, May

4 Silicon Image White Paper problem for everyone who is storing or backing up sensitive data onto an external drive, from home videos and photos, to sensitive business documents, and government personnel records. The increasing popularity of system backups to external drives presents another security risk. System backups create a copy of all of the data on the system to the external drives. While this helps protect a user from losing data due to a system or drive failure, without security mechanisms on the external drives, system backups can actually make data or identity theft easier. The consequences of theft grows as the size of external hard drives increases to allow for a more comprehensive and historical collection of personal information. The recent highly publicized case of data theft at the Department of VA in May of 2006, including a laptop and external hard drive with 26.5 million personnel records of active and retired members of the armed services, underscored all too clearly the dangers of unprotected external storage. 2 After the VA incident, the House of Representatives committee on Government Reform asked various government agencies to provide details about cases of data theft in their departments. One of the primary conclusions of this investigation was that "Physical security of data is essential. Only a small number of the data breaches reported to the Committee were caused by hackers breaking into computer systems online. The vast majority of data loss arose from physical thefts of portable computers, drives, and disks, or unauthorized use of data by employees. 3 [italics added] Manufacturers of consumer electronics devices also have reason to be interested in methods to secure content. Ports for attaching external drives have become commonplace on consumer electronic devices such as DVRs. Much if not all of the content being stored on those drives is considered "premium content". This is content that is under copyright and that has restrictions on where or when it is to be played. The ability to lock a drive to a specific set top box (STB) or DVR adds another layer of content security over existing encryption schemes. In summary, the relatively weak physical security of external hard drives means that data stored on them is vulnerable, and the type of data on them makes them attractive targets. This issue affects everyone who values their content, from families who wish to keep their personal videos, photos, tax returns and bank account information private, to corporations and governments who wish to protect sensitive and confidential data. Consumer electronic manufacturers also have an interest in securing external devices using access control as part of an overall strategy to protect copyrighted content. These are real problems plaguing the industry, and they require a solution that helps protect an external drive by providing access-control level protection. Automatic drive locking on storage processors from Silicon Image meets this need with a complete, automatic, easy-to-use solution. 2 Source: 3 Source: Committee on Government Reform, Staff Report Agency Data Breaches Since January 1, 2003; Oct

5 White Paper Silicon Image Introducing Automatic Drive Locking There are three main approaches to physically secure externally stored data. The first approach attempts to prevent the theft of the drive by using a device such as a Kensington lock to physically secure the drive to it s location. The second approach is to encrypt the data stream, either before transmission from the host, or in some cases on the hard drive itself. The user must then provide proper authentication keys to decrypt the data. The third method involves controlling access to the drive. When combined with a well hidden password, access control is an especially strong form of security. Unlike encryption mechanisms, the access control approach allows no data to be passed until the correct password is provided. There is therefore no possibility that the data can be copied and decrypted without the password. To attain this level of security, automatic drive locking utilizes a unique 128-bit password burned onto a hidden, protected area of the storage processor. All of the approaches described above provides some level of protection and are complementary rather than competing techniques. Using all three in unison will provide the maximum security for the data stored on drives. How it Works Automatic drive locking as implemented on SteelVine storage processors uses the third approach, access control, to lock drives. The operation of all modern consumer hard drives are based on the ATA standard, which specifies how storage devices are attached to host systems. This standard includes a definition for a maximum security mode which, when activated, locks the hard drive until it receives the correct password. When an ATA compliant drive is attached to a storage processor with automatic drive locking and an enumeration command is sent to prepare the drive for writing. The maximum security mode is activated using a unique 128-bit password, which was burned into the ROM of the storage processor at the time of manufacture. As some SteelVine storage processors can 4

6 Silicon Image White Paper support multiple levels of drives (capacity expansion), it is important to note that all drives attached to the storage processor, including cascaded levels, are locked by this single password. Once the security mode is activated, every time the drive is power cycled or hot plugged, the drive automatically locks and will not allow data access until the proper password is given. Since the password in this case is a unique string stored inside the storage processor, only the storage processor can unlock the drive. If the drive is moved to a different host, even another host with a storage processor that supports auto drive locking, the drive will remain locked and the data will be inaccessible. The management of locking drives when first attached and unlocking drives when they are power cycled happens automatically without any user intervention. Security Benefits The access control approach to security has the advantage of not exposing any data without authorization. The drives attached to the storage processor are set to auto-lock on power up or mode change and are only unlocked when the proper password is provided. This prevents any possibility that the data stream could be intercepted and read without being attached to the proper storage processor. The 128-bit strength password is not readily susceptible to brute force attacks and is stored inside the processor s ROM in such a way that the host device has no means to access it. This prevents any attacks through the system or a PROM reader. Only the storage processor can retrieve the password, and it is never exposed to the host. The burned in 128-bit key is also more secure than manual password locking and encryption methods that depend on a diligent user to provide a difficult-to-guess password. Because the data on the drive is automatically locked by the storage processor itself without the need for user intervention, automatic drive locking is not dependent on a user providing a secure password to lock it, nor on the user remembering a password to access it. Ease of Use Automatic drive locking can be used with almost any consumer drive, as the ATA maximum security mode is a standard feature on most of the hard drives on the market. By adding the unique embedded 128-bit password and the total automatic management of the security mode, storage processors with automatic drive locking allow consumers to easily take advantage of the benefits of drive locking without the hassle of setup or management. Safety Mechanisms Part of providing security for the user is taking reasonable steps to ensure that the user is not handicapped by the security mechanisms put in place. At the factory, a verification procedure is used to ensure that each 128-bit password burned into a storage processor is unique. In addition, a delay is placed in the locking 5

7 White Paper Silicon Image mechanism which asks for a user confirmation before the drive will be enumerated (prepared for the first write). Finally, the ATA security mode implemented within a Silicon Image SteelVine processor provides two methods for recovery if the user accidentally locks a hard drive. The Secure Erase master password will erase all of the data on a locked hard drive and then unlock the drive. This tool is ideal for repurposing a drive when replacing or discarding the host device. As an alternative, the Service Center Index exposed by a SteelVine processor allows a user to return a drive to its manufacturer to be unlocked, without erasing the data on the drive. This is done via a service center index that protects the password on the drive at all times. Automatic Drive Locking and Digital Rights Management (DRM) Automatic drive locking is not a digital rights management technology. As a block level device, the storage processor does not provide rights management (which requires file system awareness). Instead, it controls the access of a hard drive attached to a storage processor. This supports digital rights management schemes by ensuring that data stored externally can only be accessed by the single host device it is locked to. Storage Processors and Automatic Drive Locking Applications and Benefits One of the strengths of a storage processor is the wide range of products in which it can be used. Storage processors operate independently of the host, taking over management of the hard drives attached to it and only presenting a single virtual drive to the host. This means that storage processors can be used anywhere hard drive based storage is needed, from external hard drives to embedded applications, from consumer electronics to PCs. However, because automatic drive locking is designed to lock drive(s) to a host device, storage processors that include automatic drive locking are specifically designed to be installed on the motherboard of the host device. If it is used on an external device or in a removable card, the security benefit is greatly reduced. Automatic drive locking provides security by itself, but it also complements the other methods of ensuring physical security, including data encryption and physically securing the device to the location. By providing a secure link between the host device and the external 6

8 Silicon Image White Paper drive automatic drive locking in effect makes the external hard drive part of the host, extending the security bubble of the host to the external drive. Automatic drive locking is useful for anyone who is concerned about the security of their data. Users who backup their data to an external hard drive can rest easier knowing that that drive data cannot be accessed if stolen. Corporations and government agencies can ensure that sensitive information stored on external hard drives remains safe even if theft of the media occurs. PVR and DVR manufacturers can add another tool to help them ensure that premium content stays connected to the DVR/PVR that wrote the content to the drive. While the pressing need for additional security on external drives means that the benefits of automatic drive locking are most easily conveyed in the context of these applications, using this solution with internal drives also yields security benefits. Internal drives are only slightly less vulnerable than external drives, as the time necessary to disassemble the host device to access the physical drive means they are not generally targets of casual malice. However, individuals intent on data theft can easily target internal hard drives. Automatic drive locking can be enabled on internal drives as easily as external drives, providing the same content security in both applications. Conclusion The implementation of automatic drive locking has benefits for consumers, corporations, governmental agencies, and manufacturers. Just one of several methods of securing content, it complements existing security mechanisms by providing a secure link between the storage processor and the host device using a hidden 128-bit key and an access control approach. Based on the ATA maximum security mode supported by almost every consumer hard drive on the market today, automatic drive locking extends the security mode s usefulness by automating the process on the chip, with zero input required from the user. Anyone who is concerned about the management of premium content or about sensitive or private data being stolen should use automatic drive locking to increase content security E. Arques Avenue Sunnyvale, CA T F Silicon Image, Inc. All rights reserved. Silicon Image, the Silicon Image logo and SteelVine are trademarks or registered trademarks of Silicon Image, Inc. in the United States and other countries. Other trademarks are property of their respective holders. Product specifications are subject to change without notice. Printed in the U.S.A 7

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware

More information

Aegis Padlock for business

Aegis Padlock for business Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE

TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE TOP FIVE RECOMMENDATIONS FOR ENCRYPTING LAPTOP DATA A BEST PRACTICES GUIDE TODAY S HIGHLY MOBILE WORKFORCE IS PLACING NEW DEMANDS ON IT TEAMS WHEN PROTECTING LAPTOP DATA To guard this corporate data at

More information

Self-Encrypting Hard Disk Drives in the Data Center

Self-Encrypting Hard Disk Drives in the Data Center Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

Navigating Endpoint Encryption Technologies

Navigating Endpoint Encryption Technologies Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS

More information

Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors

Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors Eclypt Hard Drive Encryption ACCREDITED DATA-AT-REST SECURITY HARDWARE IS YOUR DATA SAFE FROM BREACH? THINK AGAIN.» A laptop is stolen

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

DESIGNING SECURE USB-BASED DONGLES

DESIGNING SECURE USB-BASED DONGLES DESIGNING SECURE USB-BASED DONGLES By Dhanraj Rajput, Applications Engineer Senior, Cypress Semiconductor Corp. The many advantages of USB Flash drives have led to their widespread use for data storage

More information

What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros

What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros 20151019 What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros TABLE OF CONTENTS THE ELEPHANT IN THE ROOM 3 ADDRESSING EMPLOYEE CLOUD SECURITY PERCEPTIONS 4 1) COMPLETELY BLOCK

More information

IBM Managed Security Services Vulnerability Scanning:

IBM Managed Security Services Vulnerability Scanning: IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2

More information

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution NOTICE This Technology Brief may contain proprietary information protected by copyright. Information

More information

SecureD Technical Overview

SecureD Technical Overview WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD

More information

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services Pixius Advantage Outsourcing Managed Services Move forward with endpoint protection by understanding its unique requirements. As the number of information workers rises, so does the growth and importance

More information

HP ProtectTools User Guide

HP ProtectTools User Guide HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark

More information

Firmware security features in HP Compaq business notebooks

Firmware security features in HP Compaq business notebooks HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

Introduction to Encryption What it s all about

Introduction to Encryption What it s all about Introduction to Encryption What it s all about At MOA Project, we believe privacy and the ability to communicate without government or corporate eavesdropping is a basic right of all people. Some groups,

More information

Backup in a Data Driven World: Affordable Backup Options for Home and SMB

Backup in a Data Driven World: Affordable Backup Options for Home and SMB 1 A NEW NAS Experience a white paper Backup in a Data Driven World: Affordable Backup Options for Home and SMB September 2009 Table of Contents 2 Introduction 3 What is NAS? 3 Backup Methods and Features

More information

Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13

Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13 User s Manual Table of Contents About the istorage diskashur Secure Hard Drive 4 Package contents 4 istorage diskashur button panel 5 istorage diskashur - Getting Started 6 Before you begin 6 Connecting

More information

Keep Your Data Secure: Fighting Back With Flash

Keep Your Data Secure: Fighting Back With Flash Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up

More information

Best Practices for Protecting Laptop Data

Best Practices for Protecting Laptop Data Laptop Backup, Recovery, and Data Security: Protecting the Modern Mobile Workforce Today s fast-growing highly mobile workforce is placing new demands on IT. As data growth increases, and that data increasingly

More information

HOW TO PROTECT YOUR DATA

HOW TO PROTECT YOUR DATA HOW TO PROTECT YOUR DATA INTRODUCTION Every day in the news, we hear about data breaches. Are you concerned your sensitive business, customer and supplier data is not protected? Do you have a secret sauce

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement

Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement White paper Version: 1.0 Updated: Abstract: This white paper introduces Infortrend self-encrypting drive technology, or

More information

10 Top Tips for Data Protection in the New Workplace

10 Top Tips for Data Protection in the New Workplace 10 Top Tips for Data Protection in the New Workplace Balancing Workplace Security with Workforce Productivity One of the key things that keeps CIOs awake at night, is worrying about the loss or leakage

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Kaspersky Lab s Full Disk Encryption Technology

Kaspersky Lab s Full Disk Encryption Technology Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more

More information

Clickfree The Effortless Backup Solution

Clickfree The Effortless Backup Solution Reprint from May 2009 Clickfree The Effortless Backup Solution By Joel P. Bruckenstein One of the fundamental rules of computing is: Back up your data. To that fundamental rule we, at T3 add a few more:

More information

esata: A New Storage Paradigm (Survey and Report)

esata: A New Storage Paradigm (Survey and Report) esata: A New Storage Paradigm (Survey and Report) Thomas M. Coughlin Coughlin Associates, Inc. October 2007 2007 Coughlin Associates, Inc. www.tomcoughlin.com 408-871-8808 Table of Contents Table of Contents...

More information

Reducing the Cost and Complexity of Web Vulnerability Management

Reducing the Cost and Complexity of Web Vulnerability Management WHITE PAPER: REDUCING THE COST AND COMPLEXITY OF WEB..... VULNERABILITY.............. MANAGEMENT..................... Reducing the Cost and Complexity of Web Vulnerability Management Who should read this

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise Global security intelligence YoUR DAtA UnDeR siege: DeFenD it with encryption #enterprisesec kaspersky.com/enterprise Contents Your Data Under Siege: Defend it with Encryption 3 Steps Taken to Minimise

More information

Encrypting Personal Health Information on Mobile Devices

Encrypting Personal Health Information on Mobile Devices Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario Number 12 May 2007 Encrypting Personal Health Information on Mobile Devices Section 12 (1) of the Personal Health Information Protection

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

The virtual safe: A user-focused approach to data encryption

The virtual safe: A user-focused approach to data encryption The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

Secure USB Flash Drive. Biometric & Professional Drives

Secure USB Flash Drive. Biometric & Professional Drives Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE

More information

EndPoint Device Secures Cloud Storage

EndPoint Device Secures Cloud Storage EndPoint Device Secures Cloud Storage WeiTi Liu and Reid Augustin LucidPort Technology, Inc. www.lucidport.com Flash Memory Summit 2013 Santa Clara, CA 1 Increasing Need for Data Protection Data breaches

More information

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com 7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information

More information

WHITE PAPER. Altiris Recovery Products for DELL Customers. Produced By Product Management Altiris. August 6, 2003.

WHITE PAPER. Altiris Recovery Products for DELL Customers. Produced By Product Management Altiris. August 6, 2003. Altiris Recovery Products for DELL Customers Produced By Product Management Altiris August 6, 2003 By Todd Mitchell 2003 Altiris, Inc. All Rights Reserved Altiris Recovery Solution 5.7 Page 2 Notice The

More information

Samsung SED Security in Collaboration with Wave Systems

Samsung SED Security in Collaboration with Wave Systems Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically

More information

C6 Easy Imaging Total Computer Backup. Frequently Asked Questions

C6 Easy Imaging Total Computer Backup. Frequently Asked Questions Frequently Asked Questions (FAQs) C6 Easy Imaging Total Computer Backup Frequently Asked Questions (FAQs) Frequently Asked Questions (FAQs) Clickfree and the Clickfree logo are trademarks or registered

More information

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models

High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit

More information

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

HIPAA Security Rule Compliance and Health Care Information Protection

HIPAA Security Rule Compliance and Health Care Information Protection HIPAA Security Rule Compliance and Health Care Information Protection How SEA s Solution Suite Ensures HIPAA Security Rule Compliance Legal Notice: This document reflects the understanding of Software

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

Email Encryption Made Simple

Email Encryption Made Simple Email Encryption For Organizations Large or Small Table of Contents Introduction 3 Who is reading your email? 3 The Three Options Explained 3 Organization-to-organization encryption 3 Secure portal or

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

Hardware RAID vs. Software RAID: Which Implementation is Best for my Application?

Hardware RAID vs. Software RAID: Which Implementation is Best for my Application? STORAGE SOLUTIONS WHITE PAPER Hardware vs. Software : Which Implementation is Best for my Application? Contents Introduction...1 What is?...1 Software...1 Software Implementations...1 Hardware...2 Hardware

More information

Sharpen your document and data security HP Security solutions for imaging and printing

Sharpen your document and data security HP Security solutions for imaging and printing Sharpen your document and data security HP Security solutions for imaging and printing Recognize hidden risks You know how valuable data is to your organization. But the more data you acquire and share,

More information

Online Backup Solution Features

Online Backup Solution Features CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium

More information

White Paper BLU-RAY DISC NEXT-GENERATION OPTICAL STORAGE: PROTECTING CONTENT ON THE BD-ROM. t TM

White Paper BLU-RAY DISC NEXT-GENERATION OPTICAL STORAGE: PROTECTING CONTENT ON THE BD-ROM. t TM October 2006 White Paper October 2006 t TM BLU-RAY DISC NEXT-GENERATION OPTICAL STORAGE: PROTECTING CONTENT ON THE BD-ROM The Blu-ray Disc launch will occur in 2006 with broad support from the movie, consumer

More information

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)

Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1) Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)

More information

DIGITAL LIFE E-GUIDE How to Protect your Smartphone

DIGITAL LIFE E-GUIDE How to Protect your Smartphone A DIGITAL LIFE E-GUIDE How to Protect your Smartphone It s been said that information is the new currency. 1 Carrying a smartphone nowadays is like having a second wallet. Instead of containing money

More information

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9 Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with

More information

Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual

Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Contents For AP v2.10.0.0 Release For Windows 98/ME/2000/XP Version 1.1B (08/27/2004) Contents...1 Introduction...1 Features & Specifications...2

More information

OdysseyTM. removable hard disk storage system. secure. fast. expandable.

OdysseyTM. removable hard disk storage system. secure. fast. expandable. OdysseyTM removable hard disk storage system secure. fast. expandable. P o w e r f u l d a t a p r o t e c t i o n w i t h m i n i m a l e f f o r t Imation Corp. is the only company in the world solely

More information

Newtek, The Small Business Authority 855-2thesba www.thesba.com. thesba.com 855-2thesba

Newtek, The Small Business Authority 855-2thesba www.thesba.com. thesba.com 855-2thesba thesba.com 855-2thesba EMV Chip Technology, Secure Electronic Payments The world of payments is evolving. We are starting to see an evolution from typical static magnetic strip cards to more intelligent

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.

Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10. Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web

More information

How To Use Quantum Rbs Inc. Small Business Backup

How To Use Quantum Rbs Inc. Small Business Backup Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files

More information

The Encryption Anywhere Data Protection Platform

The Encryption Anywhere Data Protection Platform The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,

More information

How to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914

How to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914 How to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914 How to Install and Setup a Fujitsu MHZ2-CJ Series FDE HDD

More information

PROTECTING YOUR DIGITAL LIFE

PROTECTING YOUR DIGITAL LIFE PROTECTING YOUR DIGITAL LIFE Table of Contents What is a Digital Life?... 1 Missing: Five Years of Photos... 2 Are Your Files Safe?... 3 Everyday Risks... 4 Real People, Real Loss... 5 Forgot to Back Up?

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

Cortado Corporate Server

Cortado Corporate Server Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and

More information

HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security. assistance with implementation of the. security standards. This series aims to HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

ENISA s ten security awareness good practices July 09

ENISA s ten security awareness good practices July 09 July 09 2 About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the European

More information

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd. www.cryptomill.com

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd. www.cryptomill.com SEAhawk CryptoMill CryptoMill Technologies Ltd. www.cryptomill.com OVERVIEW S EAhawk is an endpoint and removable storage security solution for desktop PCs and laptops running the Microsoft Windows operating

More information

Innovative Secure Boot System (SBS) with a smartcard.

Innovative Secure Boot System (SBS) with a smartcard. Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable

More information

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing Tresorit s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities.

More information

SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions.

SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions. imagerunner ADVANCE Solutions SeCUritY Safeguarding information Within Documents and Devices ADVANCE to Canon MFP security solutions. Whether your business relies on paper documents, electronic documents,

More information

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks

White paper Security Solutions Advanced Theft Protection (ATP) Notebooks White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Online backup subscription service and security overview

Online backup subscription service and security overview Online backup subscription service and security overview Abstract This White Paper is a ready reckoner for Small and Medium Enterprises (SMEs) for their data storage needs. Traditional tape-based backups

More information

Managing BitLocker Encryption

Managing BitLocker Encryption Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate

More information

Microsoft Exchange ActiveSync Administrator s Guide

Microsoft Exchange ActiveSync Administrator s Guide Microsoft Exchange ActiveSync Administrator s Guide Copyright 2005 palmone, Inc. All rights reserved. palmone, HotSync, Treo, VersaMail, and Palm OS are among the trademarks or registered trademarks owned

More information

Securing end-user mobile devices in the enterprise

Securing end-user mobile devices in the enterprise IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate

More information

PCI Data Security Standards (DSS)

PCI Data Security Standards (DSS) ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants

More information

BitLocker To Go User Guide

BitLocker To Go User Guide BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

SSD Firmware Update Utility Guide

SSD Firmware Update Utility Guide SSD Firmware Update Utility Guide Crucial m4 2.5 SSD Firmware Revision 070H Firmware Update Guide for Windows 8 (Update from Rev 0001, 0002, 0009, 0309, 000F, 010G, 040H to Rev 070H) Introduction This

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information