Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD
|
|
- Jeremy Toby Rose
- 7 years ago
- Views:
Transcription
1
2 Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode PIN 256 bit AES in XTS mode smart card + PIN Who generated it? Where is it stored? How can it be destroyed? Functional diagram: RFID key or smart card + 8-digit PIN Authentication totally encrypted...invoice.pdf crm.sql......u%r\i6... Hardware Crypto-Engine... s.pst fina......j!$t%ä... Plain Data Transmission Encrypted Data Transmission
3 The most important criteria Data privacy and data security are extremely sensitive issues for companies. Again and again, business processes require the mobile availability of research, financial, customer or account information. For the storage and the transport of the data a company must be able to rely on absolute security. To ensure this, the main criteria are: Encryption The choice of an appropriate encryption is essential for data security. For high standards of data security, it is recommended to use at least an AES encryption with a key length of 256 bit in CBC mode. Access control The access control can range from a simple password to complex multi-factor authentication methods. A complex access method with a two-factor authentication (e.g. by smart card and PIN) offers a very high level of data security. Administration of the cryptographic key It should be known, how the cryptographic key was produced and if during the production or on the way to the user a copy of the key could have been made. It s also important to know where and how safe the key is stored for the use. In addition, it should be checked, if the cryptographic key can be destroyed, if it is necessary. Highest security provide storage devices on which the cryptographic key is stored externally and the user can generate, change and destroy the key by himself. For the selection of an appropriate security storage device always all 3 safety criteria need to be considered. If one of these criteria has a security hole, the whole security chain will be endagered.
4 Unique selling points of DIGITTRADE security storage devices widest portfolio of encrypted storage devices including high security external HDD/SSD storage devices are customized for different security requirements wide range: from a secure basic solution for private users to professional solutions for companies and government agencies user-friendly handling and plain user manuals all DIGITTRADE security storage devices are delivered with the Acronis True Image OEM Quick Backup software, with which data can be synchronized fast and easily.
5 Overview of the DIGITTRADE security storage devices The DIGITTRADE GmbH develops and produces external hard drives, SSDs and USB sticks with hardware encryption to protect business and private data extensively and securely against unauthorized access. DIGITTRADE USB Security Stick USS256 Secure solution for companies and private user Password protected access control, 256 bit AES hardware encryption in CFB mode, encrypted storage of the cryptographic key in the flash memory DIGITTRADE RFID Security HDD/SSD RS64 - Secure basic protection for private users Triple data protection: RFID access control, XOR hardware encryption, S.M.A.R.T. lock HDD lock, encrypted storage of the cryptographic key on the HDD DIGITTRADE RFID Security HDD/SSD RS128 Secure solution for private users RFID access control, 128 bit AES full disk hardware encryption in advanced ECB mode, encrypted storage of the cryptographic key on the HDD DIGITTRADE RFID Security HDD/SSD RS256 Secure solution for companies and private users RFID access control, 256 bit full disk hardware encryption in XTS mode, encrypted storage of the cryptographic key on the HDD, robust aluminum enclosure, integrated silicone Anti-Shock protectors, USB 3.0 DIGITTRADE High Security Festplatten HS128 und HS256 Professional solution for companies 2-factor authentication by smart card and PIN code, certified full disk hardware encryption according to 128 bit AES in ECB mode or 256 bit AES in CBC mode, external and encrypted storage of the cryptographic key on the smartcard DIGITTRADE High Security Festplatte HS256S Professional solution for government and companies Further development of the DIGITTRADE HS256 - provides the possibility to administrate the cryptographic key by the user (generate, change, copy and destroy). HS256S is in the certification process of the BSI (Certification ID: BSI-DSZ-CC-0825)
6 DIGITTRADE USB Security Stick USS256 secure solution for companies and private users The high resistance of the classy and robust metal case protects the DIGITTRADE USS256 stick additionally from light impacts. Features: password protected access control 256 bit AES hardware encryption in CFB mode encrypted storage of the cryptographic key in the flash memory all data will be stored automatically encrypted by the hardware encryption module in real-time epoxy sealing protects the hardware against manipulations and humidity freely selectable number of password misentries automatic delection of data after the preset number of password misentries is exceeded indicator for password security write protection switch for safe usage on different computers plug & play for all Windows OS compatible to USB 1.1 and 2.0 up to 16 GB storage capacity 2 years guarantee
7 DIGITTRADE USB Security Stick USS256 At home, at the office or during transport the USS256 protects sensitive data against unwanted looks. All data is stored by a 256 bit encryption according to AES in CFB mode. Thereby all data is protected against unwanted looks even in case of loss of the device. The integrated high-speed AES hardware-based encryption module operates independently of any software and is resistant to cold boot and similar attacks. The authentication works by password entry. To increase the safety of the USS256 it has a kind of self destruction mechanism. If an unauthorized access occurs and the preset number of password misentries is reached, the data stored on the stick will be destroyed and the USS256 will reset to factory defaults. The epoxy sealing protects the hardware against manipulations and humidity. With the DIGITTRADE USB Security Stick USS256 it is easy to guarantee a high level of data security. This storage device captivates also with its elegant and robust design. In addition, the DIGITTRADE USS256 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data. The USS256 offers a storage capacity of up to 16 GB. Due to its numerous security features this stick offers a high degree of security for your data.
8 DIGITTRADE RFID Security HDD RS64 secure basic protection for private users Features: RFID access control XOR full disk hardware encryption S.M.A.R.T. lock HDD lock (activates an ATA password which prevents from a readout of the HDD outside of the security enclosure) encrypted storage of the cryptographic key on the HDD no access to the DIGITTRADE Security HDD and your data without one of the two included RFID key automatic lock of the DIGITTRADE Security HDD as soon as it is disconnected from the PC all data will be stored automatically encrypted by the hardware encryption module in real-time bootable and independent of operating systems compatible to USB 1.1 and 2.0 available with 320GB, 500GB, 640GB, 750GB and 1TB as HDD and 120GB, 240GB as SSD available in black and white color 2 years guarantee
9 DIGITTRADE RFID Security external HDD/SSD RS64 All data stored on the DIGIT- TRADE RS64 is protected against unauthorized access by three essential safety functions. A combination of data encryption, S.M.A.R.T. lock and RFID access control offers private users and small companies a secure basic protection for portable data. The user authentication takes place by RFID access control with the included RFID keys. To lock or unlock the DIGITTRADE RS64 one of the RFID key will be placed above the RFID reader integrated in the HDD. Thanks to the combination of the hardware-based encryption module and RFID access control the security storage device works independent of any operating system and can be used flexibly. The integrated hardware encryption module stores data encrypted and in real-time. The S.M.A.R.T. lock function is automatically activated, if the HDD is removed from the enclosure, turns off or is locked by the RFID key. In this case an ATA password will be generated automatically to prevent from a readout of the HDD outside of the enclosure. The ATA password is not stored at any time and therefore it cannot be readout. The unauthorized access to the data will be complicated significantly. In addition, the DIGITTRADE RS64 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data.
10 DIGITTRADE RFID Security HDD RS128 secure solution for private users Features: RFID access control 128 bit AES full disk hardware encryption in advanced ECB mode encrypted storage of the cryptographic key on the HDD no access to the DIGITTRADE Security HDD and your data without one of the two included RFID key automatic lock of the DIGITTRADE Security HDD as soon as it is disconnected from the PC all data will be stored automatically encrypted by the hardware encryption module in real-time bootable and independent of operating systems compatible to USB 1.1 and 2.0 mini USB and integrated USB connector available with 320GB, 500GB, 640GB, 750GB and 1TB as HDD and 120GB, 240GB as SSD 3 years guarantee
11 DIGITTRADE RFID Security external HDD/SSD RS128 The DIGITTRADE RS128 RFID Security HDD protects sensitive data reliably against unwanted looks. The encryption of all data takes place with 128 bit AES in advanced ECB mode. In the process every sector uses additionally a different encryption vector. The integrated hardware encryption module stores data encrypted and in real-time. The user authentication takes place by RFID access control with the included RFID keys. To lock or unlock the DIGITTRADE RS128 one of the RFID keys will be placed above the RFID reader integrated in the HDD. The connection to the computer can be made directly using the integrated USB connector or via the included USB cable. Thanks to the combination of the hardware-based encryption module and RFID access control the security storage device works indepen- dent of any operating system and can be used flexibly. In addition, the DIGITTRADE RS128 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data.
12 DIGITTRADE RFID Security HDD RS256 secure solution for companies and private users Features: RFID access control 256 bit AES full disk hardware encryption in XTS mode encrypted storage of the AES key on the HDD no access to the DIGITTRADE Security HDD and your data without one of the two included RFID key automatic lock of the DIGITTRADE Security HDD as soon as it is disconnected from the PC all data will be stored automatically encrypted by the hardware encryption module in real-time integrated silicone Anti-Shock protectors robust aluminium enclosure protects against mechanical influences and electromagnetic waves bootable and independent of operating systems compatible to USB 3.0 and 2.0 available with 320GB, 500GB, 750GB and 1TB as HDD and 120GB, 240GB as SSD 3 years guarantee
13 DIGITTRADE RFID Security external HDD/SSD RS256 The DIGITTRADE RFID Security HDD RS256 is a secure solution for companies and private users. The computer magazine CHIP appreciated the mobile RFID Security HDD with the test result excellent (6/2012) and the PC WELT magazine has chosen the RS256 as the award winner and the best 2.5-inch hard drive with USB 3.0 (7/2012). All data on the DIGITTRADE RS256 is stored by a 256 bit full disk encryption according to AES in advanced XTS mode. The integrated hardware encryption module stores data encrypted and in real time. concussions and impacts. The data transmission and power supply can be made via a fast USB 3.0 connection. Thanks to the combination of the hardwarebased encryption module and RFID access control the security storage device works independent of any operating system and can be used flexibly. In addition, the DIGITTRADE RS256 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data. The user authentication takes place by RFID access control too. Thereby the access is only with one of the two included RFID keys possible. In addition the smart and robust aluminium enclosure protects the RS256 against mechanical influences and electromagnetic waves. The specifically developed silicone protectors increase the resistence against to
14 DIGITTRADE High Security HDD HS128/HS256 professional solution for companies Certified by The National Institute of Standards and Technology of the United States of America (NIST) Features: 2-factor authentication by smart card and 8-digit PIN certified full disk hardware encryption according to AES 128 bit in ECB mode or AES 256 bit in CBC mode external and encrypted storage of the cryptographic key on the smart card (prevents from the readout of the key from the HDD) access protection onto the smartcard with the 8-digit PIN certified encryption method (NIST: FIPS 197) all data will be stored automatically encrypted by the hardware encryption module in real-time automatic lock of the DIGITTRADE High Security HDD as soon as it is disconnected from the PC bootable and independent of operating systems compatible with USB 1.1, USB 2.0 and FireWire 100 / 200 / 400 / 800 available with 320GB, 500GB, 640GB, 750GB and 1TB as HDD and 120GB, 240GB as SSD 3 years guarantee
15 DIGITTRADE High Security external HDD/SSD HS128 and HS256 The DIGITTRADE High Security HDDs/SSDs use the worldwide unique 2-factor authentication to access the data. The 2-factor authentication works according to the having and knowing principle: Factor 1 (Having): It is verified, if the user has a smartcard with the correct cryptographic key. This verification is done by inserting the smart card into the HDD enclosure. Factor 2 (Knowing): It is verified, if the user knows the correct 8-digit PIN and consequently is authorized to use this smart card. This verification is done by the entry the 8-digit PIN. Thanks to the full disk hardware encryption according to the AES and the two-factor authentication, the DIGIT- TRADE HIGH SECURITY HDD combines the benefits of portable storage devices with highest security standards for data privacy. In addition, the DIGITTRADE HS128/HS256 is delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data. In case of any manipulation the smart card will be irrevocably destroyed and disabled. In that case the access to the data is prevented. If the HS128/HS256 has been unlocked successfully by smart card and PIN, the data will be transmitted like to a normal hard disk without a delay or an additional program.
16 DIGITTRADE High Security HDD HS256S professional solution for government and companies Certified by The National Institute of Standards and Technology of the United States of America (NIST) and in certification process of the German Federal Office for Information Security (BSI). Features: 2-factor authentication by smart card and 8-digit PIN 256 bit AES full disk hardware encryption in CBC mode external and encrypted storage of the cryptographic key on the smart card administration of the cryptographic key by the user (generate, change, copy and destroy) access protection onto the smart card with the 8-digit PIN certified encryption method (NIST: FIPS 197), in certification process of the BSI (BSI-DSZ- CC-0825) smart card Oberthur Cosmo 64 v5.4d certified according to FIPS Level 3 optionally available: smart card NXP J3A081 v2.4.1 R3 certified by BSI according to EAL 5 (Certification ID: BSI-DSZ-CC ) bootable and independent of operating systems compatible to USB 1.1, USB 2.0 and FireWire 100 / 200 / 400 / 800 available with 500GB and 1TB as HDD and 120GB, 240GB and 512GB as SSD 3 years guarantee
17 DIGITTRADE High Security external HDD/SSD HS256S The external High Security HS256S protects government, business and private data comprehensively and securely against unauthorized access. It had been developed according to the lastest requirements of the BSI (Federal Office for Information Security) for portable storage media and it is in the process of the certification BSI (BSI-DSZ- CC-0825). Data stored on the DIGITTRADE HS256S is protected against unauthorized access with regard to the data confidentiality, e.g. if the DIGITTRADE HS256S is lost, misplaced or stolen, as well as in the event of logical or physical attacks. The DIGITTRADE HS256S ensures the data confidentiality with these security mechanisms: - Encryption - Access control - Administration of the cryptographic key and PIN, the HS256S provides the possibility to administrate the cryptographic key independently of computer or software on the storage device. The user is able to generate, change, copy and in case of emergency to destroy the encryption key. The cryptographic key which is needed for de- and encryption is created and stored encrypted on the smart card. Thereby the cryptographic key is physically separated from the encrypted data. So it is impossible to read it out of the DIGITTRADE HS256S or to decrypt the stored data. With it s special security features this encrypted external storage device offers a lot of solutions for single users, companies and government agencies. In addition, the DIGITTRADE HS256S is also delivered with the Acronis True Image OEM Quick Backup software. This software can be used for backup and recovery of data. Besides the established 256 bit AES hardware encryption in CBC mode and the 2-factor authentication by smart card
18 Examples for special application possibilities of the HS256S: Secured and cost-effective data transport: If sensitive data needs to get from one location to another it is possible to send the HS256S easily by post. The matching smart cards are stored at the sender and the recipient and both know the matching PIN(s). If the HS256S gets lost during the transport, no one will have access to the data because the cryptographic key is not available but stored encrypted on the smart cards. Separating of storage device and authentication attributes: The access to the data can be regulated in a way, that it will be only possible by bringing to gether of e.g. three persons. Person X possesses the storage device, person Y possesses the smart card and person Z knows the smart card PIN. These three persons get together only for the data transfer at the receiving center and separate afterwards again. Person X,Y and Z seperately, are not able to access the data.
19 Multiple application possibilities of the DIGITTRADE security storage devices Traveling and field work If the storage device gets lost, no one will be able to access the data, because it is always stored encrypted. Business secrets It is possible to control which persons are able to access the security storage devices by selective handover of the authentication features (smart card and PIN, RFID key). Data security in case of break-ins In case of a break-in into an office, it is not possible to access the encrypted data. Independent of operating systems Because of the hardware encryption the security storage device can be used with every device that supports USB (computer, multimedia devices, machines etc.) DIGITTRADE offers with it s security storage devices solutions for different security requirements, which permit a broad data security in everyday working life without a big effort. Mobile Back-Up device With the help of the included Acronis Quick Backup software data can be synchronized easily and fast. Bootable All data, programs and operating software can be stored and started directly from the security storage device. No traces remain on the used PC or laptop.
20 Acronis Backup Software All DIGITTRADE security storage devices are delivered with the Acronis True Image OEM Quick Backup software. This program is not an encryption software but a special feature for a fast and easy data backup and recovery. Acronis True Image OEM Quick Backup is a program compilation for the preservation of all information on your computer. It can save the operating system, installed application, settings and all your data. In addition several partitions or complete HDDs can be saved. If the storage device is damaged or deseased by a virus or malware, the data can be restored quickly and easily. The Acronis software contains all the essential tools which are needed to restore a computer system in case of a disaster, for example by a data loss and accidentally deleting essential files.
21 Glossary XOR - exclusive-or operation, either or AES - Advanced Encryption Standard, symmetric encryption system, approved in the USA for top secret information CFB Mode - Cipher Feedback Mode, is an operation mode for block encryptions, that generate a chaining of the blocks. ECB Mode - Electronic Codebook Mode, is an operation mode for block encryptions. The plaintexts are encrypted separately from each other. CBC Mode - Cipher Block Chaining Mode, is an operation mode for block encryptions. The plaintext is XORed with the privious ciphertext before being encrypted. RFID - Radio Frequency Identification, is used for the access to the DIGITTRADE RFID security devices. Cryptographic key - the key which is needed for the de- and encryption of the data. Smart card - High Security storage on which the cryptographic key for DIGITTRADE High Security HDDs/SSDs is encrypted stored. It is part of the 2-factor authentication. Backup - refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. BSI - German Federal Office for Information Security XTS Mode - XEX-based tweaked codebook mode with ciphertext stealing, is an operation mode for block encryptions, for which 2 different keys are used.
22 Service and Support DIGITTRADE GmbH Ernst-Thälmann-Str Teutschenthal Web: Phone: +49 / 345 / Fax: +49 / 345 / support@digittrade.de DIGITTRADE is member of the IT Security Association Germany (TeleTrusT) Our consulting team can be reached during weekdays between 8.00 and h via or telephone. Source of supply: Germany Switzerland Austria
23
24
IT-Security News Data theft damage amounting to millions
IT-Security News Data theft damage amounting to millions The theft of mobile devices is booming. According to a study of the market research institute IDC do 92% of all European companies have lost a notebook
More informationwww.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
More informationSecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
More informationThe Encryption Technology of Automatic Teller Machine Networks
Software Engineering 4C03 Winter 2005 The Encryption Technology of Automatic Teller Machine Networks Researcher: Shun Wong Last revised: April 2nd, 2005 1 Introduction ATM also known as Automatic Teller
More informationEnova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
More informationInnovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
More information2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationUsing BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationFIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
More informationHow To Set Up A Hard Drive With A Harddrive With A 2Gb Hard Drive (I386) And 2Gb Drive (Amd64) On A Hardrive (I219) (Iee) (Amd66) (Ai219
1 Package Contents Device User manual Power adapter Power cord USB 2.0 Cable FireWire 800 Cable (IEEE1394.B) esata cable 2 Front View of the Device A Drive eject button B LED indicator C Front door panel
More informationEnova X-Wall XO Frequently Asked Questions--FAQs
Enova X-Wall XO Frequently Asked Questions--FAQs Q: What is X-Wall XO? A: X-Wall XO is the fourth generation product that encrypts and decrypts the entire volume of the hard drive. The entire volume includes
More informationAegis Padlock for business
Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses
More informationSecure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
More informationUser Guide. G 4 Supreme. April 2010. AES 256 Encrypted USB Flash Drive. Prepared By: Md. Zakir Hosen
G 4 Supreme AES 256 Encrypted USB Flash Drive User Guide April 2010 Copyright TwinMOS Technologies ME All Rights Reserved Product Introduction Thank you for your purchasing TwinMOS AES 256 Encryption USB
More informationHow to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More information2.8.1 Creating an Acronis account... 15 2.8.2 Subscription to Acronis Cloud... 16. 3 Creating bootable rescue media... 16
USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...
More informationENCRYPTION. The Perils of Using the Wrong Approach to USB Flash Drive Security. Only Hardware Ensures that Data Stays In and Malware Stays Out
ENCRYPTION The Perils of Using the Wrong Approach to USB Flash Drive Security Only Hardware Ensures that Data Stays In and Malware Stays Out January 9, 2008 IRONKEY ENCRYPTION 350 million USB flash drives
More informationAssessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
More informationDisk encryption... (not only) in Linux. Milan Brož mbroz@redhat.com
Disk encryption... (not only) in Linux Milan Brož mbroz@redhat.com FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationCHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
More informationOverview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
More informationSamsung Drive Manager FAQ
Samsung Drive Manager FAQ Installation Q: My Samsung External Hard Drive is connected but nothing is happening. A: Check the USB cable connection. If your Samsung External Hard Drive is connected properly,
More informationVASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
More informationSymantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
More informationFull Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
More informationDisk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
More informationDRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
More informationGetting Started User s Guide
Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,
More informationTPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
More informationSECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
More informationTable of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
More informationIntroduction. Where Is The Threat? Encryption Methods for Protecting Data. BOSaNOVA, Inc. Phone: 866-865-5250 Email: info@theq3.com Web: www.theq3.
Introduction Within the last ten years, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has
More informationAdvanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
More information2.8.1 Creating an Acronis account... 17 2.8.2 Subscription to Acronis Cloud... 17. 2.9 Parallels Desktop support...17 2.10 Backup list icons...
USER'S GUIDE Table of contents 1 Introduction...4 1.1 What is Acronis True Image 2016?... 4 1.2 New in this version... 4 1.3 System requirements... 5 1.4 Install, update or remove Acronis True Image 2016...
More informationSecure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
More informationUnderstanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization
Understanding Northwestern University s contract with Symantec Symantec Solutions for Cost Reduction & Optimization Chris Hagelin and Shane Scholes Symantec Account Manager and Symantec Sales Engineer
More informationIronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
More informationHow Endpoint Encryption Works
WHITE PAPER: HOW ENDPOINT ENCRYPTION WORKS........................................ How Endpoint Encryption Works Who should read this paper Security and IT administrators Content Introduction to Endpoint
More informationAn Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation
Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature
More informationDigital Photo Bank / Portable HDD Pan Ocean E350 User Manual
Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual Installing a hard disk 1. Power off the unit. 2. Remove the bottom cover from the unit by removing four screws. 3. Insert the 2.5 HDD to the
More informationEncrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
More informationGuide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
More informationCountering the Threat to the Digital Lifestyle
Encryption and USB Drives: Whitepaper Countering the Threat to the Digital Lifestyle Encryption and USB Drives 8GB of Data 2,000 songs - or your company marketing strategies 2,500 vacation pictures - or
More informationACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
More informationRecipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
More informationIntroduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
More informationProtection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0
Protection Profile for Portable Storage Media (PSMPP) Common Criteria Protection Profile BSI-CC-PP-0081-2012 Version 1.0 German Federal Office for Information Security PO Box 20 03 63 D-53133 Bonn Tel.:
More informationManaged Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
More information2.5 SATA Hard Drive Secure Enclosure User Manual
2.5 SATA Hard Drive Secure Enclosure User Manual Index CHAPTER 1 INTRODUCTION... 1 1.1 General Information... 1 1.1.1 Product Features...1 1.1.2 System Requirements...1 1.1.3 Package Contents...2 1.1.4
More informationSecure USB Flash Drive. Biometric & Professional Drives
Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE
More informationWhitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
More informationRestoring a Windows 8.1 system from complete HDD failure - drivesnapshot
Restoring a Windows 8.1 system from complete HDD failure - drivesnapshot Drivesnapshot is available at http://www.drivesnapshot.de/ http://www.drivesnapshot.de/en/down.htm is the download page. If you
More informationTechnical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
More informationPROXKey Tool User Manual
PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7
More information256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES
256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES integralmemoryusa.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20 years of sales
More informationEclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors
Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors Eclypt Hard Drive Encryption ACCREDITED DATA-AT-REST SECURITY HARDWARE IS YOUR DATA SAFE FROM BREACH? THINK AGAIN.» A laptop is stolen
More informationProtectDrive. User Manual Revision: B00
ProtectDrive User Manual Revision: B00 THIS PAGE INTENTIONALLY LEFT BLANK ProtectDrive User Manual Preface Preface Copyright All intellectual property is copyright. All trademarks and product names used
More informationAcceptable Encryption Usage for UTHSC
This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged
More informationWindows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
More information256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES
256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES integralmemoryusa.com Integral and the Crypto SSD range Introducing Integral Memory plc are one of the largest digital memory producers in Europe with
More information256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE
256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20
More informationHow Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
More informationAutomatic Drive Locking: Securing Digital Content Storage in the Digital Home
Automatic Drive Locking: Securing Digital Content Storage in the Digital Home January 2007 Silicon Image White Paper Table of Contents Table of Contents... 1 Introduction... 2 Disk based storage is expanding
More informationDigital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
More informationTrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More information256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE
256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20
More informationTable of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13
User s Manual Table of Contents About the istorage diskashur Secure Hard Drive 4 Package contents 4 istorage diskashur button panel 5 istorage diskashur - Getting Started 6 Before you begin 6 Connecting
More informationMultifactor authentication systems Jiří Sobotka, Radek Doležel
Multifactor authentication systems Jiří Sobotka, Radek Doležel Fakulta elektrotechniky a komunikačních technologií VUT v Brně Email: sobotkaj@feec.vutbr.cz Fakulta elektrotechniky a komunikačních technologií
More informationToken User Guide. Version 1.0/ July 2013
Token User Guide Version 1.0/ July 2013 Index Overview... 3 Usage requirements... 4 KIT contents... 5 Smart Card installation... 6 Reader driver installation... 7 In the case of Windows XP... 7 In the
More informationA8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
More informationAES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD
AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD Integral Encrypted USB Product Range About Integral Memory plc Integral Memory was established in 1989 and has been involved in the flash storage industry
More informationSmart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
More informationCryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
More informationEMC VMAX3 DATA AT REST ENCRYPTION
EMC VMAX3 DATA AT REST ENCRYPTION ABSTRACT In the interconnected world, data and intellectual property is the highest value currency which can be held by corporations. From recent newsworthy examples,
More informationUser s Manual. Home CR-H212. 2.5 2-BAY RAID Storage Enclosure
User s Manual Home CR-H212 2.5 2-BAY RAID Storage Enclosure 1 Introduction 1.1 Features - 2-Bay Bus Powered Portable RAID Enclosure -Works with SATA HDD or SSD -Supports Big (JBOD), RAID0, RAID1, and Normal
More informationDell ControlPoint Security Manager
Dell ControlPoint Security Manager www.dell.com support.dell.com Notes NOTE: A NOTE indicates important information that helps you make better use of your computer. Information in this document is subject
More informationAcronis True Image 2015 REVIEWERS GUIDE
Acronis True Image 2015 REVIEWERS GUIDE Table of Contents INTRODUCTION... 3 What is Acronis True Image 2015?... 3 System Requirements... 4 INSTALLATION... 5 Downloading and Installing Acronis True Image
More informationEMC Symmetrix Data at Rest Encryption
Detailed Review Abstract This white paper provides a detailed description of EMC Symmetrix Data at Rest Encryption features and operations. March 2011 Copyright 2010, 2011 EMC Corporation. All rights reserved.
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationSafeGuard Enterprise User help. Product version: 7
SafeGuard Enterprise User help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Enterprise 7.0...5 2 SafeGuard Enterprise on Windows endpoints...7 3 Security best practices...9
More information2big Quadra ENTERPRISE CLASS. Professional 2-Disk RAID DESIGN BY NEIL POULTON. esata 3Gb/s FireWire 800 & 400 USB 2.0
2big Quadra ENTERPRISE CLASS DESIGN BY NEIL POULTON Professional 2-Disk RAID esata 3Gb/s FireWire 800 & 400 USB 2.0 The Enterprise Class Difference The LaCie 2big Quadra Enterprise Class has been developed
More informationConvenience and security
Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.
More informationXTREMIO DATA AT REST ENCRYPTION
White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains
More informationUSB Flash Drives Overview By Mikio Moriyasu
USB Flash Drives Overview By Mikio Moriyasu USB Flash Drives What are they? Portable storage devices Nonvolatile electronically encoded Flash Memory Originally designed for use in BIOS USB Flash Drives
More informationGuidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
More informationStep by step guide how to password protect your USB flash drive
Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos
More informationUsing Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
More information1:9 High Speed HDD/SSD Duplicator PRO
INTRODUCTION The latest Addonics 1:9 HDD (Hard Disk Drive) Duplicator can copy as many as nine target drives from a single source, making this the ideal solution for production or data distribution applications.
More informationWindows BitLocker and Paragon s Backup Solutions
PARAGON Software GmbH Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com Windows
More informationGoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey
GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With
More informationDesign tricks for great products at FIPS-140-2 Level 2 and 3. Robert W. Baldwin, Plus Five Consulting, Inc.
Design tricks for great products at FIPS-140-2 Level 2 and 3 Robert W. Baldwin,, Inc. Abstract This presentation may be downloaded from: http://www.plusfive.com/reports.html or RSA Conference site over
More informationSecure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
More informationWaspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
More informationTPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
More information