USB DISK. Hardware encryption for USB mass-storage peripherals IT IS IDEAL FOR: ADVANTAGES

Similar documents
ScoMIS Encryption Service

Vs Encryption Suites

Step by Step. Transfer a Library File from one PC to Another. This How To article explains how to move a library file from one PC to another

Secure your Privacy. jrsys, Inc. All rights reserved.

ScoMIS Encryption Service

Sending Files to a Social Security Laptop

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Features of AnyShare

Back Office Recorder Dig04 Installation Guide

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Secured Cloud Storage for Disaster Recovery. Dr. Ngair TeowHin SecureAge Technology

TPM. (Trusted Platform Module) Installation Guide V2.1

DESIGNING SECURE USB-BASED DONGLES

USER GUIDE. General Information The BeAnywhere Service BeAnywhere Server BeAnywhere DRIVE Security... 2

Network Attached Storage. Jinfeng Yang Oct/19/2015

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution

for Lync Interaction Recording

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

RAM: 2 Gb Hard Drive: 168 hours of recording per Gb of disk space available NIC : 2 NIC cards required for IP Recording.

Archiving User Guide Outlook Plugin. Manual version 3.1

User Manual (DA-70155)

Backup and Recovery. Introduction. Benefits. Best-in-class offering. Easy-to-use Backup and Recovery solution.

USB TO SERIAL CONVERTER

Acronis True Image 10 Home Reviewer s Guide

Instructions for downloading and installing the GPS Map update

SP Widget. Users Manual

USB Portable Storage Device: Security Problem Definition Summary

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Virtual FAX Function in Vigor IPPBX 2820 Series

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version PROMISE Technology, Inc. All Rights Reserved.

T-BOX MY MEDIA WINDOWS 7 QUICK START GUIDE

Ash Capture Control User Guide

File Management and File Storage

IT Networking and Security

Managing Devices. Lesson 5

Connecting your Blackberry to Aliant Hosted Exchange. Instructions for connecting Blackberry hand-held devices to Aliant Hosted Exchange

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise

Technical Description. DigitalSign 3.1. State of the art legally valid electronic signature. The best, most secure and complete software for

USB VoIP Dialpad Quick Start Guide

Enova X-Wall LX Frequently Asked Questions

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

Omniquad Exchange Archiving

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

HDDtoGO. User Guide. User Manual Version CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

Arkivum's Digital Archive Managed Service

Online Backup by Mozy. Common Questions

Quick Start Guide. GV-Redundant Server GV-Failover Server. 1 Introduction. Packing List

MFR IT Technical Guides

LED TV Firmware Upgrade v.1 - PC USERS

McAfee epolicy Orchestrator * Deep Command *

Securing Cloud Computing by GED-i

HP-1000 Powerline USB Adapter

HomePNA PCI Adapter. User s Manual

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version

EDMS Operation Manual. 1. Install the USB Driver. 1.3 Click next

Network DK2 DESkey Installation Guide

Getting Started User s Guide

Lesson 5. Managing Devices. Learning Objectives. ODN Skills

Integration of DTV Recorder Generator DVRG into a TCP/IP Network

Managing Remote Access

USB 3.0 PCI Express. 2-Ports Host Controller Card. User Manual. HUSB302PCX

HP-1000 Powerline Ethernet Adapter

Xopero Backup Build your private cloud backup environment. Getting started

What Salespeople Need to Know About Video Conferencing

SafeGuard Enterprise 5.50 Installation

NETASQ MIGRATING FROM V8 TO V9

Case Study for Layer 3 Authentication and Encryption

Installing and Upgrading to Windows 7

Unified Communications Installation & Configuration Guide

Smart Queue Management System Using GSM Technology

Diamond II v2.3 Service Pack 4 Installation Manual

Copyright 2012 Trend Micro Incorporated. All rights reserved.

SV8100 Licensing Manual. Version 2.0 for R9 System Software

PC computer configurations & Windows optimizations (Updated November 2012)

Motorola Phone Tools. Quick Start

MobileLite Wireless G2 5-in-1 Mobile Companion User Manual

Secure file sharing and collaborative working solution

WinClon 6 User Guide. With Screenshots. A Windows Embedded Partner

VidyoConferencing Network Administrators Guide

Installation and Setup: Setup Wizard Account Information

REMOTE BACKUP-WHY SO VITAL?

The following items are trademarks or registered trademarks of Kaba Mas in the United States and/or other countries. GITCON

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

How to Use Local Storage in ACTi Cameras

Total Backup Recovery 7

Clickfree C6 Easy Imaging October 24, 2011

Practical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR

Transcription:

USB DISK Hardware encryption for USB mass-storage peripherals IT IS IDEAL FOR: Anyone who wants to protect their data easily and safely housing them on an external memory (USB disk or USB key) The protection of files of any nature (legal documents, addresses, price lists, patents, technical drawings, images, video files, audio files, etc.) so as to share them only with people allowed to. 1. Carry out a complete backup to protect your files by saving them on an unlimited number of USB memories ( max dimension : 2TBs each ) in total safety. 2. Use an unlimited number of protected USB memories, everywhere you are. 3. Carry out a structural encryption so that the disk seems to be unformatted if Independencekey is not present. 4. Share only with those you have allowed to.

USB DISK Hardware encryption for USB mass-storage peripherals IT IS IDEAL FOR: Anyone who wants to protect their data easily and safely housing them on an external memory (USB disk or USB key) The protection of files of any nature (legal documents, addresses, price lists, patents, technical drawings, images, video files, audio files, etc.) so as to share them only with people allowed to. 1. Carry out a complete backup to protect your files by saving them on an unlimited number of USB memories ( max dimension : 2TBs each ) in total safety. 2. Use an unlimited number of protected USB memories, everywhere you are. 3. Carry out a structural encryption so that the disk seems to be unformatted if Independencekey is not present. 4. Share only with those you have allowed to.

USB DISK Hardware encryption for USB mass-storage peripherals WHAT IT DOES IndependenceKey encrypts any USB memory up to a max dimension of 2TBs and gives access to your data only to other IndependenceKey users you will have previously allowed to: your memory is protected, unlimited and shared only with the ones you want to! USB host PORT how it works In real time and at hardware level, it formats and encrypts all the USB memory sectors, cluster by cluster. All this, thanks to its USB 2.0 High speed HOST port. Now the service is very easy to use: if a protected disk is inserted behind your IndependenceKey you can see it and use it on your PC as you have always done. Otherwise, if you connect it directly to a PC USB port, the USB memory will not be recognised. Its entire content is encrypted, including the MBR (Master Boot Record) so the operative system will regard this storage device as a device to be initialized. In fact, it will contain all the user s data thoroughly protected inside. The data protection is fully hardware processed by acting on the SCSI commands that the computer sends during the data reading/writing phases inside the file system. USB memory writing speed File system used Power supply absorbed by IndependenceKey Up to 160 Mbps Irrelevant <200mW To learn more about us visit our website www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610

CRYPT AND SHARE Data protection and sharing through a safe and exclusive Network. IT IS IDEAL FOR Those who want to share information using common exchange/sharing channels with no need to worry about security (mail attachments, Skype, etc). You can give access to your information only to the people you trust. You can create your own exclusive and independent file sharing Network with a simple pairing/association process. You can decide what and with whom you want to share your information on a case-tocase basis.

CRYPT AND SHARE Data protection and sharing through a safe and exclusive Network. IT IS IDEAL FOR Those who want to share information using common exchange/sharing channels with no need to worry about security (mail attachments, Skype, etc). You can give access to your information only to the people you trust. You can create your own exclusive and independent file sharing Network with a simple pairing/association process. You can decide what and with whom you want to share your information on a case-tocase basis.

CRYPT AND SHARE Data protection and sharing through a safe and exclusive Network. WHAT IT DOES The Crypt&Share function allows you to choose the people with whom you want to share your encrypted data, simply creating an association with other users and enabling any of them to access (at your choice) some or all your files. This process creates your private and protected Network. HOW IT DOES A protected file can be shared with whomever you want after the association/pairing process (either remote of physical) between users IndependenceKey. The physical association/pairing requires to simply connecting two IndependenceKeys through the USB host port. The remote association/pairing requires a simple operation through IndependenceKey software interface. The individual association/pairing keys between users are uniquely generated and safely kept inside each IndependenceKey. The device uses hardware anti-cloning and unique authentication systems, which make impossible any replay and man in the middle attacks. Every time a user wants to protect and share a file or a USB memory disk with another associated user, he/ she will just have to allow the other user to access his/her own files and thus be able to send them using common communication services (e.g. mail attachments, Skype, etc) The paring/association among IndependenceKeys allows users to create and freely use their safe Network of contacts. To learn more about this, visit www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610

QDISK Hardware encrypted virtual disks on PCs. Optimized also for Cloud usage. IT IS IDEAL FOR Anyone who wants to work on confidential files whilst keeping them in his own PC in a constantly protected area. Anyone who wants to keep his own classified files in the Cloud. You can create a restricted and protected area always available inside your PC. You can automatically encrypt and decrypt files/folders by simply inserting or removing them from the protected area. You can make your virtual disks visible and available only with the use of your IndependenceKey. You can freely use the Cloud being sure that your data are fully protected regardless of the service provider.

QDISK Hardware encrypted virtual disks on PCs. Optimized also for Cloud usage. IT IS IDEAL FOR Anyone who wants to work on confidential files whilst keeping them in his own PC in a constantly protected area. Anyone who wants to keep his own classified files in the Cloud. You can create a restricted and protected area always available inside your PC. You can automatically encrypt and decrypt files/folders by simply inserting or removing them from the protected area. You can make your virtual disks visible and available only with the use of your IndependenceKey. You can freely use the Cloud being sure that your data are fully protected regardless of the service provider.

QDISK Hardware encrypted virtual disks on PCs. Optimized also for Cloud usage. WHAT IT DOES The QDISK function of IndependenceKey allows you to encrypt a custom size portion of your hard disk. HOW IT DOES Using the software interface of IndependenceKey, you create an encrypted disk by naming and associating it to a specific portion of your hard disk space. When IndependenceKey plugs into the PC, the operative system detects a disk drive as if it was a removable disk physically plugged into the PC; in reality, this does not correspond to a physical storage peripheral but to a file in the computer, a file container accessible only if IndependenceKey is plugged in. If you remove IndependenceKey from the computer, the protected virtual disk and all the files and folders in it will be no longer visible and accessible. This service has been specifically designed to be Cloud friendly, i.e. designed so that the QDISK synchronization operates at its best with the user s Cloud storage system. In fact, if the user modifies a file, protected and stored in the Cloud, only its modified blocks will be changed, therefore the synchronization engine of the Cloud service has to transfer onto the net only the minimum required information. To learn more about this, visit www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610

TRASPARENT FILE ENCRYPTION Transparent use of encrypted files and folders without usage of decoded copies, thus leaving no trace behind. it is ideal for Those who want to work safely on their classified documents without wasting time and using the applications they have always used without changing their working habits. Access your files safely without decrypting them. Work freely; being sure that no decoded copies will be saved on your PC, not even temporarily. Open your files with a simple double click and use them normally without changing working habits.

TRASPARENT FILE ENCRYPTION Transparent use of encrypted files and folders without usage of decoded copies, thus leaving no trace behind. it is ideal for Those who want to work safely on their classified documents without wasting time and using the applications they have always used without changing their working habits. Access your files safely without decrypting them. Work freely; being sure that no decoded copies will be saved on your PC, not even temporarily. Open your files with a simple double click and use them normally without changing working habits.

TRASPARENT FILE ENCRYPTION Transparent use of encrypted files and folders without usage of decoded copies, thus leaving no trace behind. WHAT IT DOES IndependenceKey allows you to daily work without changing your habits, sure to use top safety levels. Once files are encrypted, you can access them with a simple double click. open any encrypted files WITH A DOUBLE CLICK HOW IT DOES Through a specific driver integrated with the file system of Operative System, IndependenceKey can directly work on encrypted files, making the necessary modifications without decrypting them first and without leaving any clear traces of the files in the PC. When the user double clicks on a file to open it, the request is detected by the driver installed in the computer and sent inside IndependenceKey to check for the correct encryption key. If we have the right to access the file, IndependenceKey (in real time and without delays) allows the application (e.g. Word) to open it, keeping it protected even during its modification phase, without ever exposing it to make it vulnerable. To learn more about this, visit www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610

safe voip Real Time Hardware encrypted online calls. IT IS IDEAL FOR Anyone who wants to make a completely protected call, safely and easily. You can communicate as you have always done, just as in a normal call; directly, fast and with unparalleled security. Your call is absolutely safe call against any type of unlawful use: it is encrypted before entering the PC thus making any illegal attack vain, either on the PC or in the Net.

safe voip Real Time Hardware encrypted online calls. IT IS IDEAL FOR Anyone who wants to make a completely protected call, safely and easily. You can communicate as you have always done, just as in a normal call; directly, fast and with unparalleled security. Your call is absolutely safe call against any type of unlawful use: it is encrypted before entering the PC thus making any illegal attack vain, either on the PC or in the Net.

SAFE VOIP Real Time Hardware encrypted online calls. WHAT IT DOES The SAFE VOIP service of IndependenceKey generates and controls totally encrypted audio VoIP streams at the hardware level, in real time and with the utmost protection available. SUSAN MARK PC HOW IT DOES Using IndependenceKey s software and a normal USB headset connected to it, it is possible to call anyone who belongs to our private Network and is online at the time of the call. Once we call our contact with a simple click on the CALL button on the software screen, the audio stream will be encrypted on the basis of the association/pairing key previously established with the user with whom we want to talk to. Every VoIP session uses a unique encryption key, which will be different every time you need to make a call. Compared to common similar systems, the great advantage of IndependenceKey is that the audio stream is already encrypted before entering the computer, thus preventing any possible detection carried out by a software installed on the PC without the user knowing it. The audio VoIP packages physically enter the PC already encrypted by IndependenceKey, whilst the computer serves only as a transport channel towards the other user s PC. Should these packages ever be detected, it would be impossible to decode their content. To learn more about this, visit www.independencekey.com QUANTEC SA Corso San Gottardo, 86-6830 Chiasso, Switzerland Telephone: +41 (0) 91.6961616 - Fax: +41 (0) 91.6961610