Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

Size: px
Start display at page:

Download "Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD"

Transcription

1

2 Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode PIN 256 bit AES in XTS mode smart card + PIN Who generated it? Where is it stored? How can it be destroyed? Functional diagram: RFID key or smart card + 8-digit PIN Authentication totally encrypted...invoice.pdf crm.sql......u%r\i6... Hardware Crypto-Engine... s.pst fina......j!$t%ä... Plain Data Transmission Encrypted Data Transmission

3 The most important criteria Data privacy and data security are extremely sensitive issues for companies. Again and again, business processes require the mobile availability of research, financial, customer or account information. For the storage and the transport of the data a company must be able to rely on absolute security. To ensure this, the main criteria are: Encryption The choice of an appropriate encryption is essential for data security. For high standards of data security, it is recommended to use at least an AES encryption with a key length of 256 bit in CBC mode. Access control The access control can range from a simple password to complex multi-factor authentication methods. A complex access method with a two-factor authentication (e.g. by smart card and PIN) offers a very high level of data security. Administration of the cryptographic key It should be known, how the cryptographic key was produced and if during the production or on the way to the user a copy of the key could have been made. It s also important to know where and how safe the key is stored for the use. In addition, it should be checked, if the cryptographic key can be destroyed, if it is necessary. Highest security provide storage devices on which the cryptographic key is stored externally and the user can generate, change and destroy the key by himself. For the selection of an appropriate security storage device always all 3 safety criteria need to be considered. If one of these criteria has a security hole, the whole security chain will be endagered.

4 Unique selling points of DIGITTRADE security storage devices widest portfolio of encrypted storage devices including high security external HDD/SSD storage devices are customized for different security requirements wide range: from a secure basic solution for private users to professional solutions for companies and government agencies user-friendly handling and plain user manuals all DIGITTRADE security storage devices are delivered with the Acronis True Image OEM Quick Backup software, with which data can be synchronized fast and easily.

5 Overview of the DIGITTRADE security storage devices The DIGITTRADE GmbH develops and produces external hard drives, SSDs and USB sticks with hardware encryption to protect business and private data extensively and securely against unauthorized access. DIGITTRADE USB Security Stick USS256 Secure solution for companies and private user Password protected access control, 256 bit AES hardware encryption in CFB mode, encrypted storage of the cryptographic key in the flash memory DIGITTRADE RFID Security HDD/SSD RS64 - Secure basic protection for private users Triple data protection: RFID access control, XOR hardware encryption, S.M.A.R.T. lock HDD lock, encrypted storage of the cryptographic key on the HDD DIGITTRADE RFID Security HDD/SSD RS128 Secure solution for private users RFID access control, 128 bit AES full disk hardware encryption in advanced ECB mode, encrypted storage of the cryptographic key on the HDD DIGITTRADE RFID Security HDD/SSD RS256 Secure solution for companies and private users RFID access control, 256 bit full disk hardware encryption in XTS mode, encrypted storage of the cryptographic key on the HDD, robust aluminum enclosure, integrated silicone Anti-Shock protectors, USB 3.0 DIGITTRADE High Security Festplatten HS128 und HS256 Professional solution for companies 2-factor authentication by smart card and PIN code, certified full disk hardware encryption according to 128 bit AES in ECB mode or 256 bit AES in CBC mode, external and encrypted storage of the cryptographic key on the smartcard DIGITTRADE High Security Festplatte HS256S Professional solution for government and companies Further development of the DIGITTRADE HS256 - provides the possibility to administrate the cryptographic key by the user (generate, change, copy and destroy). HS256S is in the certification process of the BSI (Certification ID: BSI-DSZ-CC-0825)

6 DIGITTRADE USB Security Stick USS256 secure solution for companies and private users The high resistance of the classy and robust metal case protects the DIGITTRADE USS256 stick additionally from light impacts. Features: password protected access control 256 bit AES hardware encryption in CFB mode encrypted storage of the cryptographic key in the flash memory all data will be stored automatically encrypted by the hardware encryption module in real-time epoxy sealing protects the hardware against manipulations and humidity freely selectable number of password misentries automatic delection of data after the preset number of password misentries is exceeded indicator for password security write protection switch for safe usage on different computers plug & play for all Windows OS compatible to USB 1.1 and 2.0 up to 16 GB storage capacity 2 years guarantee

7 DIGITTRADE USB Security Stick USS256 At home, at the office or during transport the USS256 protects sensitive data against unwanted looks. All data is stored by a 256 bit encryption according to AES in CFB mode. Thereby all data is protected against unwanted looks even in case of loss of the device. The integrated high-speed AES hardware-based encryption module operates independently of any software and is resistant to cold boot and similar attacks. The authentication works by password entry. To increase the safety of the USS256 it has a kind of self destruction mechanism. If an unauthorized access occurs and the preset number of password misentries is reached, the data stored on the stick will be destroyed and the USS256 will reset to factory defaults. The epoxy sealing protects the hardware against manipulations and humidity. With the DIGITTRADE USB Security Stick USS256 it is easy to guarantee a high level of data security. This storage device captivates also with its elegant and robust design. In addition, the DIGITTRADE USS256 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data. The USS256 offers a storage capacity of up to 16 GB. Due to its numerous security features this stick offers a high degree of security for your data.

8 DIGITTRADE RFID Security HDD RS64 secure basic protection for private users Features: RFID access control XOR full disk hardware encryption S.M.A.R.T. lock HDD lock (activates an ATA password which prevents from a readout of the HDD outside of the security enclosure) encrypted storage of the cryptographic key on the HDD no access to the DIGITTRADE Security HDD and your data without one of the two included RFID key automatic lock of the DIGITTRADE Security HDD as soon as it is disconnected from the PC all data will be stored automatically encrypted by the hardware encryption module in real-time bootable and independent of operating systems compatible to USB 1.1 and 2.0 available with 320GB, 500GB, 640GB, 750GB and 1TB as HDD and 120GB, 240GB as SSD available in black and white color 2 years guarantee

9 DIGITTRADE RFID Security external HDD/SSD RS64 All data stored on the DIGIT- TRADE RS64 is protected against unauthorized access by three essential safety functions. A combination of data encryption, S.M.A.R.T. lock and RFID access control offers private users and small companies a secure basic protection for portable data. The user authentication takes place by RFID access control with the included RFID keys. To lock or unlock the DIGITTRADE RS64 one of the RFID key will be placed above the RFID reader integrated in the HDD. Thanks to the combination of the hardware-based encryption module and RFID access control the security storage device works independent of any operating system and can be used flexibly. The integrated hardware encryption module stores data encrypted and in real-time. The S.M.A.R.T. lock function is automatically activated, if the HDD is removed from the enclosure, turns off or is locked by the RFID key. In this case an ATA password will be generated automatically to prevent from a readout of the HDD outside of the enclosure. The ATA password is not stored at any time and therefore it cannot be readout. The unauthorized access to the data will be complicated significantly. In addition, the DIGITTRADE RS64 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data.

10 DIGITTRADE RFID Security HDD RS128 secure solution for private users Features: RFID access control 128 bit AES full disk hardware encryption in advanced ECB mode encrypted storage of the cryptographic key on the HDD no access to the DIGITTRADE Security HDD and your data without one of the two included RFID key automatic lock of the DIGITTRADE Security HDD as soon as it is disconnected from the PC all data will be stored automatically encrypted by the hardware encryption module in real-time bootable and independent of operating systems compatible to USB 1.1 and 2.0 mini USB and integrated USB connector available with 320GB, 500GB, 640GB, 750GB and 1TB as HDD and 120GB, 240GB as SSD 3 years guarantee

11 DIGITTRADE RFID Security external HDD/SSD RS128 The DIGITTRADE RS128 RFID Security HDD protects sensitive data reliably against unwanted looks. The encryption of all data takes place with 128 bit AES in advanced ECB mode. In the process every sector uses additionally a different encryption vector. The integrated hardware encryption module stores data encrypted and in real-time. The user authentication takes place by RFID access control with the included RFID keys. To lock or unlock the DIGITTRADE RS128 one of the RFID keys will be placed above the RFID reader integrated in the HDD. The connection to the computer can be made directly using the integrated USB connector or via the included USB cable. Thanks to the combination of the hardware-based encryption module and RFID access control the security storage device works indepen- dent of any operating system and can be used flexibly. In addition, the DIGITTRADE RS128 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data.

12 DIGITTRADE RFID Security HDD RS256 secure solution for companies and private users Features: RFID access control 256 bit AES full disk hardware encryption in XTS mode encrypted storage of the AES key on the HDD no access to the DIGITTRADE Security HDD and your data without one of the two included RFID key automatic lock of the DIGITTRADE Security HDD as soon as it is disconnected from the PC all data will be stored automatically encrypted by the hardware encryption module in real-time integrated silicone Anti-Shock protectors robust aluminium enclosure protects against mechanical influences and electromagnetic waves bootable and independent of operating systems compatible to USB 3.0 and 2.0 available with 320GB, 500GB, 750GB and 1TB as HDD and 120GB, 240GB as SSD 3 years guarantee

13 DIGITTRADE RFID Security external HDD/SSD RS256 The DIGITTRADE RFID Security HDD RS256 is a secure solution for companies and private users. The computer magazine CHIP appreciated the mobile RFID Security HDD with the test result excellent (6/2012) and the PC WELT magazine has chosen the RS256 as the award winner and the best 2.5-inch hard drive with USB 3.0 (7/2012). All data on the DIGITTRADE RS256 is stored by a 256 bit full disk encryption according to AES in advanced XTS mode. The integrated hardware encryption module stores data encrypted and in real time. concussions and impacts. The data transmission and power supply can be made via a fast USB 3.0 connection. Thanks to the combination of the hardwarebased encryption module and RFID access control the security storage device works independent of any operating system and can be used flexibly. In addition, the DIGITTRADE RS256 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data. The user authentication takes place by RFID access control too. Thereby the access is only with one of the two included RFID keys possible. In addition the smart and robust aluminium enclosure protects the RS256 against mechanical influences and electromagnetic waves. The specifically developed silicone protectors increase the resistence against to

14 DIGITTRADE High Security HDD HS128/HS256 professional solution for companies Certified by The National Institute of Standards and Technology of the United States of America (NIST) Features: 2-factor authentication by smart card and 8-digit PIN certified full disk hardware encryption according to AES 128 bit in ECB mode or AES 256 bit in CBC mode external and encrypted storage of the cryptographic key on the smart card (prevents from the readout of the key from the HDD) access protection onto the smartcard with the 8-digit PIN certified encryption method (NIST: FIPS 197) all data will be stored automatically encrypted by the hardware encryption module in real-time automatic lock of the DIGITTRADE High Security HDD as soon as it is disconnected from the PC bootable and independent of operating systems compatible with USB 1.1, USB 2.0 and FireWire 100 / 200 / 400 / 800 available with 320GB, 500GB, 640GB, 750GB and 1TB as HDD and 120GB, 240GB as SSD 3 years guarantee

15 DIGITTRADE High Security external HDD/SSD HS128 and HS256 The DIGITTRADE High Security HDDs/SSDs use the worldwide unique 2-factor authentication to access the data. The 2-factor authentication works according to the having and knowing principle: Factor 1 (Having): It is verified, if the user has a smartcard with the correct cryptographic key. This verification is done by inserting the smart card into the HDD enclosure. Factor 2 (Knowing): It is verified, if the user knows the correct 8-digit PIN and consequently is authorized to use this smart card. This verification is done by the entry the 8-digit PIN. Thanks to the full disk hardware encryption according to the AES and the two-factor authentication, the DIGIT- TRADE HIGH SECURITY HDD combines the benefits of portable storage devices with highest security standards for data privacy. In addition, the DIGITTRADE HS128/HS256 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data. In case of any manipulation the smart card will be irrevocably destroyed and disabled. In that case the access to the data is prevented. If the HS128/HS256 has been unlocked successfully by smart card and PIN, the data will be transmitted like to a normal hard disk without a delay or an additional program.

16 DIGITTRADE High Security HDD HS256S professional solution for government and companies Certified by The National Institute of Standards and Technology of the United States of America (NIST) and in certification process of the German Federal Office for Information Security (BSI). Features: 2-factor authentication by smart card and 8-digit PIN 256 bit AES full disk hardware encryption in CBC mode external and encrypted storage of the cryptographic key on the smart card administration of the cryptographic key by the user (generate, change, copy and destroy) access protection onto the smart card with the 8-digit PIN certified encryption method (NIST: FIPS 197), in certification process of the BSI (BSI-DSZ- CC-0825) smart card Oberthur Cosmo 64 v5.4d certified according to FIPS Level 3 optionally available: smart card NXP J3A081 v2.4.1 R3 certified by BSI according to EAL 5 (Certification ID: BSI-DSZ-CC ) bootable and independent of operating systems compatible to USB 1.1, USB 2.0 and FireWire 100 / 200 / 400 / 800 available with 500GB and 1TB as HDD and 120GB, 240GB and 512GB as SSD 3 years guarantee

17 DIGITTRADE High Security external HDD/SSD HS256S The external High Security HS256S protects government, business and private data comprehensively and securely against unauthorized access. It had been developed according to the lastest requirements of the BSI (Federal Office for Information Security) for portable storage media and it is in the process of the certification BSI (BSI-DSZ- CC-0825). Data stored on the DIGITTRADE HS256S is protected against unauthorized access with regard to the data confidentiality, e.g. if the DIGITTRADE HS256S is lost, misplaced or stolen, as well as in the event of logical or physical attacks. The DIGITTRADE HS256S ensures the data confidentiality with these security mechanisms: - Encryption - Access control - Administration of the cryptographic key and PIN, the HS256S provides the possibility to administrate the cryptographic key independently of computer or software on the storage device. The user is able to generate, change, copy and in case of emergency to destroy the encryption key. The cryptographic key which is needed for de- and encryption is created and stored encrypted on the smart card. Thereby the cryptographic key is physically separated from the encrypted data. So it is impossible to read it out of the DIGITTRADE HS256S or to decrypt the stored data. With it s special security features this encrypted external storage device offers a lot of solutions for single users, companies and government agencies. In addition, the DIGITTRADE HS256S is also delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data. Besides the established 256 bit AES hardware encryption in CBC mode and the 2-factor authentication by smart card

18 Examples for special application possibilities of the HS256S: Secured and cost-effective data transport: If sensitive data needs to get from one location to another it is possible to send the HS256S easily by post. The matching smart cards are stored at the sender and the recipient and both know the matching PIN(s). If the HS256S gets lost during the transport, no one will have access to the data because the cryptographic key is not available but stored encrypted on the smart cards. Separating of storage device and authentication attributes: The access to the data can be regulated in a way, that it will be only possible by bringing to gether of e.g. three persons. Person X possesses the storage device, person Y possesses the smart card and person Z knows the smart card PIN. These three persons get together only for the data transfer at the receiving center and separate afterwards again. Person X,Y and Z seperately, are not able to access the data.

19 Multiple application possibilities of the DIGITTRADE security storage devices Traveling and field work If the storage device gets lost, no one will be able to access the data, because it is always stored encrypted. Business secrets It is possible to control which persons are able to access the security storage devices by selective handover of the authentication features (smart card and PIN, RFID key). Data security in case of break-ins In case of a break-in into an office, it is not possible to access the encrypted data. Independent of operating systems Because of the hardware encryption the security storage device can be used with every device that supports USB (computer, multimedia devices, machines etc.) DIGITTRADE offers with it s security storage devices solutions for different security requirements, which permit a broad data security in everyday working life without a big effort. Mobile Back-Up device With the help of the included Acronis Quick Backup software data can be synchronized easily and fast. Bootable All data, programs and operating software can be stored and started directly from the security storage device. No traces remain on the used PC or laptop.

20 Acronis Backup Software All DIGITTRADE security storage devices are delivered with the Acronis True Image OEM Quick Backup software. This program is not an encryption software but a special feature for a fast and easy data backup and recovery. Acronis True Image OEM Quick Backup is a program compilation for the preservation of all information on your computer. It can save the operating system, installed application, settings and all your data. In addition several partitions or complete HDDs can be saved. If the storage device is damaged or deseased by a virus or malware, the data can be restored quickly and easily. The Acronis software contains all the essential tools which are needed to restore a computer system in case of a disaster, for example by a data loss and accidentally deleting essential files.

21 Glossary XOR - exclusive-or operation, either or AES - Advanced Encryption Standard, symmetric encryption system, approved in the USA for top secret information CFB Mode - Cipher Feedback Mode, is an operation mode for block encryptions, that generate a chaining of the blocks. ECB Mode - Electronic Codebook Mode, is an operation mode for block encryptions. The plaintexts are encrypted separately from each other. CBC Mode - Cipher Block Chaining Mode, is an operation mode for block encryptions. The plaintext is XORed with the privious ciphertext before being encrypted. RFID - Radio Frequency Identification, is used for the access to the DIGITTRADE RFID security devices. Cryptographic key - the key which is needed for the de- and encryption of the data. Smart card - High Security storage on which the cryptographic key for DIGITTRADE High Security HDDs/SSDs is encrypted stored. It is part of the 2-factor authentication. Backup - refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. BSI - German Federal Office for Information Security XTS Mode - XEX-based tweaked codebook mode with ciphertext stealing, is an operation mode for block encryptions, for which 2 different keys are used.

22 Service and Support DIGITTRADE GmbH Ernst-Thälmann-Str Teutschenthal Web: Phone: +49 / 345 / Fax: +49 / 345 / support@digittrade.de DIGITTRADE is member of the IT Security Association Germany (TeleTrusT) Our consulting team can be reached during weekdays between 8.00 and h via or telephone. Source of supply: Germany Switzerland Austria

23

24

IT-Security News Data theft damage amounting to millions

IT-Security News Data theft damage amounting to millions IT-Security News Data theft damage amounting to millions The theft of mobile devices is booming. According to a study of the market research institute IDC do 92% of all European companies have lost a notebook

More information

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor

More information

SecureD Technical Overview

SecureD Technical Overview WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD

More information

The Encryption Technology of Automatic Teller Machine Networks

The Encryption Technology of Automatic Teller Machine Networks Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller

More information

Enova X-Wall LX Frequently Asked Questions

Enova X-Wall LX Frequently Asked Questions Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

Innovative Secure Boot System (SBS) with a smartcard.

Innovative Secure Boot System (SBS) with a smartcard. Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology

More information

How To Set Up A Hard Drive With A Harddrive With A 2Gb Hard Drive (I386) And 2Gb Drive (Amd64) On A Hardrive (I219) (Iee) (Amd66) (Ai219

How To Set Up A Hard Drive With A Harddrive With A 2Gb Hard Drive (I386) And 2Gb Drive (Amd64) On A Hardrive (I219) (Iee) (Amd66) (Ai219 1 Package Contents Device User manual Power adapter Power cord USB 2.0 Cable FireWire 800 Cable (IEEE1394.B) esata cable 2 Front View of the Device A Drive eject button B LED indicator C Front door panel

More information

Enova X-Wall XO Frequently Asked Questions--FAQs

Enova X-Wall XO Frequently Asked Questions--FAQs Enova X-Wall XO Frequently Asked Questions--FAQs Q: What is X-Wall XO? A: X-Wall XO is the fourth generation product that encrypts and decrypts the entire volume of the hard drive. The entire volume includes

More information

Aegis Padlock for business

Aegis Padlock for business Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

User Guide. G 4 Supreme. April 2010. AES 256 Encrypted USB Flash Drive. Prepared By: Md. Zakir Hosen

User Guide. G 4 Supreme. April 2010. AES 256 Encrypted USB Flash Drive. Prepared By: Md. Zakir Hosen G 4 Supreme AES 256 Encrypted USB Flash Drive User Guide April 2010 Copyright TwinMOS Technologies ME All Rights Reserved Product Introduction Thank you for your purchasing TwinMOS AES 256 Encryption USB

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16

2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

ENCRYPTION. The Perils of Using the Wrong Approach to USB Flash Drive Security. Only Hardware Ensures that Data Stays In and Malware Stays Out

ENCRYPTION. The Perils of Using the Wrong Approach to USB Flash Drive Security. Only Hardware Ensures that Data Stays In and Malware Stays Out ENCRYPTION The Perils of Using the Wrong Approach to USB Flash Drive Security Only Hardware Ensures that Data Stays In and Malware Stays Out January 9, 2008 IRONKEY ENCRYPTION 350 million USB flash drives

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Disk encryption... (not only) in Linux. Milan Brož mbroz@redhat.com

Disk encryption... (not only) in Linux. Milan Brož mbroz@redhat.com Disk encryption... (not only) in Linux Milan Brož mbroz@redhat.com FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Samsung Drive Manager FAQ

Samsung Drive Manager FAQ Samsung Drive Manager FAQ Installation Q: My Samsung External Hard Drive is connected but nothing is happening. A: Check the USB cable connection. If your Samsung External Hard Drive is connected properly,

More information

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security

More information

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared

More information

Full Drive Encryption Security Problem Definition - Encryption Engine

Full Drive Encryption Security Problem Definition - Encryption Engine 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles

More information

Disk Encryption. Aaron Howard IT Security Office

Disk Encryption. Aaron Howard IT Security Office Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

More information

DRAFT Standard Statement Encryption

DRAFT Standard Statement Encryption DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held

More information

Getting Started User s Guide

Getting Started User s Guide Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,

More information

TPM Key Backup and Recovery. For Trusted Platforms

TPM Key Backup and Recovery. For Trusted Platforms TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents

More information

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.

Introduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3. Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

2.8.1 Creating an Acronis account... 17 2.8.2 Subscription to Acronis Cloud... 17. 2.9 Parallels Desktop support...17 2.10 Backup list icons...

2.8.1 Creating an Acronis account... 17 2.8.2 Subscription to Acronis Cloud... 17. 2.9 Parallels Desktop support...17 2.10 Backup list icons... USER'S GUIDE Table of contents 1 Introduction...4 1.1 What is Acronis True Image 2016?... 4 1.2 New in this version... 4 1.3 System requirements... 5 1.4 Install, update or remove Acronis True Image 2016...

More information

Secure Storage. Lost Laptops

Secure Storage. Lost Laptops Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include

More information

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization Understanding Northwestern University s contract with Symantec Symantec Solutions for Cost Reduction & Optimization Chris Hagelin and Shane Scholes Symantec Account Manager and Symantec Sales Engineer

More information

IronKey Data Encryption Methods

IronKey Data Encryption Methods IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication

More information

How Endpoint Encryption Works

How Endpoint Encryption Works WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint

More information

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature

More information

Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual

Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual Installing a hard disk 1. Power off the unit. 2. Remove the bottom cover from the unit by removing four screws. 3. Insert the 2.5 HDD to the

More information

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

Guide to Data Field Encryption

Guide to Data Field Encryption Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations

More information

Countering the Threat to the Digital Lifestyle

Countering the Threat to the Digital Lifestyle Encryption and USB Drives: Whitepaper Countering the Threat to the Digital Lifestyle Encryption and USB Drives 8GB of Data 2,000 songs - or your company marketing strategies 2,500 vacation pictures - or

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

Introduction to BitLocker FVE

Introduction to BitLocker FVE Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk

More information

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0

Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 German Federal Office for Information Security PO Box 20 03 63 D-53133 Bonn Tel.:

More information

Managed Portable Security Devices

Managed Portable Security Devices Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of

More information

2.5 SATA Hard Drive Secure Enclosure User Manual

2.5 SATA Hard Drive Secure Enclosure User Manual 2.5 SATA Hard Drive Secure Enclosure User Manual Index CHAPTER 1 INTRODUCTION... 1 1.1 General Information... 1 1.1.1 Product Features...1 1.1.2 System Requirements...1 1.1.3 Package Contents...2 1.1.4

More information

Secure USB Flash Drive. Biometric & Professional Drives

Secure USB Flash Drive. Biometric & Professional Drives Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE

More information

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015 Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is

More information

Restoring a Windows 8.1 system from complete HDD failure - drivesnapshot

Restoring a Windows 8.1 system from complete HDD failure - drivesnapshot Restoring a Windows 8.1 system from complete HDD failure - drivesnapshot Drivesnapshot is available at http://www.drivesnapshot.de/ http://www.drivesnapshot.de/en/down.htm is the download page. If you

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

PROXKey Tool User Manual

PROXKey Tool User Manual PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7

More information

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES 256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES integralmemoryusa.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20 years of sales

More information

Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors

Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors Eclypt Hard Drive Encryption ACCREDITED DATA-AT-REST SECURITY HARDWARE IS YOUR DATA SAFE FROM BREACH? THINK AGAIN.» A laptop is stolen

More information

ProtectDrive. User Manual Revision: B00

ProtectDrive. User Manual Revision: B00 ProtectDrive User Manual Revision: B00 THIS PAGE INTENTIONALLY LEFT BLANK ProtectDrive User Manual Preface Preface Copyright All intellectual property is copyright. All trademarks and product names used

More information

Acceptable Encryption Usage for UTHSC

Acceptable Encryption Usage for UTHSC This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged

More information

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...

More information

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES 256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES integralmemoryusa.com Integral and the Crypto SSD range Introducing Integral Memory plc are one of the largest digital memory producers in Europe with

More information

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE 256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Automatic Drive Locking: Securing Digital Content Storage in the Digital Home

Automatic Drive Locking: Securing Digital Content Storage in the Digital Home Automatic Drive Locking: Securing Digital Content Storage in the Digital Home January 2007 Silicon Image White Paper Table of Contents Table of Contents... 1 Introduction... 2 Disk based storage is expanding

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE 256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20

More information

Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13

Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13 User s Manual Table of Contents About the istorage diskashur Secure Hard Drive 4 Package contents 4 istorage diskashur button panel 5 istorage diskashur - Getting Started 6 Before you begin 6 Connecting

More information

Multifactor authentication systems Jiří Sobotka, Radek Doležel

Multifactor authentication systems Jiří Sobotka, Radek Doležel Multifactor authentication systems Jiří Sobotka, Radek Doležel Fakulta elektrotechniky a komunikačních technologií VUT v Brně Email: sobotkaj@feec.vutbr.cz Fakulta elektrotechniky a komunikačních technologií

More information

Token User Guide. Version 1.0/ July 2013

Token User Guide. Version 1.0/ July 2013 Token User Guide Version 1.0/ July 2013 Index Overview... 3 Usage requirements... 4 KIT contents... 5 Smart Card installation... 6 Reader driver installation... 7 In the case of Windows XP... 7 In the

More information

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host

More information

AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD

AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD Integral Encrypted USB Product Range About Integral Memory plc Integral Memory was established in 1989 and has been involved in the flash storage industry

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

EMC VMAX3 DATA AT REST ENCRYPTION

EMC VMAX3 DATA AT REST ENCRYPTION EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,

More information

User s Manual. Home CR-H212. 2.5 2-BAY RAID Storage Enclosure

User s Manual. Home CR-H212. 2.5 2-BAY RAID Storage Enclosure User s Manual Home CR-H212 2.5 2-BAY RAID Storage Enclosure 1 Introduction 1.1 Features - 2-Bay Bus Powered Portable RAID Enclosure -Works with SATA HDD or SSD -Supports Big (JBOD), RAID0, RAID1, and Normal

More information

Dell ControlPoint Security Manager

Dell ControlPoint Security Manager Dell ControlPoint Security Manager www.dell.com support.dell.com Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject

More information

Acronis True Image 2015 REVIEWERS GUIDE

Acronis True Image 2015 REVIEWERS GUIDE Acronis True Image 2015 REVIEWERS GUIDE Table of Contents INTRODUCTION... 3 What is Acronis True Image 2015?... 3 System Requirements... 4 INSTALLATION... 5 Downloading and Installing Acronis True Image

More information

EMC Symmetrix Data at Rest Encryption

EMC Symmetrix Data at Rest Encryption Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

SafeGuard Enterprise User help. Product version: 7

SafeGuard Enterprise User help. Product version: 7 SafeGuard Enterprise User help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Enterprise 7.0...5 2 SafeGuard Enterprise on Windows endpoints...7 3 Security best practices...9

More information

2big Quadra ENTERPRISE CLASS. Professional 2-Disk RAID DESIGN BY NEIL POULTON. esata 3Gb/s FireWire 800 & 400 USB 2.0

2big Quadra ENTERPRISE CLASS. Professional 2-Disk RAID DESIGN BY NEIL POULTON. esata 3Gb/s FireWire 800 & 400 USB 2.0 2big Quadra ENTERPRISE CLASS DESIGN BY NEIL POULTON Professional 2-Disk RAID esata 3Gb/s FireWire 800 & 400 USB 2.0 The Enterprise Class Difference The LaCie 2big Quadra Enterprise Class has been developed

More information

Convenience and security

Convenience and security Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.

More information

XTREMIO DATA AT REST ENCRYPTION

XTREMIO DATA AT REST ENCRYPTION White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains

More information

USB Flash Drives Overview By Mikio Moriyasu

USB Flash Drives Overview By Mikio Moriyasu USB Flash Drives Overview By Mikio Moriyasu USB Flash Drives What are they? Portable storage devices Nonvolatile electronically encoded Flash Memory Originally designed for use in BIOS USB Flash Drives

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,

More information

1:9 High Speed HDD/SSD Duplicator PRO

1:9 High Speed HDD/SSD Duplicator PRO INTRODUCTION The latest Addonics 1:9 HDD (Hard Disk Drive) Duplicator can copy as many as nine target drives from a single source, making this the ideal solution for production or data distribution applications.

More information

Windows BitLocker and Paragon s Backup Solutions

Windows BitLocker and Paragon s Backup Solutions PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com Windows

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

Design tricks for great products at FIPS-140-2 Level 2 and 3. Robert W. Baldwin, Plus Five Consulting, Inc.

Design tricks for great products at FIPS-140-2 Level 2 and 3. Robert W. Baldwin, Plus Five Consulting, Inc. Design tricks for great products at FIPS-140-2 Level 2 and 3 Robert W. Baldwin,, Inc. Abstract This presentation may be downloaded from: http://www.plusfive.com/reports.html or RSA Conference site over

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Waspmote Encryption Libraries. Programming guide

Waspmote Encryption Libraries. Programming guide Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7

More information

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...

More information