Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors



Similar documents
How Endpoint Encryption Works

Sample Data Security Policies

How Drive Encryption Works

SecureD Technical Overview

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Innovative Secure Boot System (SBS) with a smartcard.

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

OdysseyTM. removable hard disk storage system. secure. fast. expandable.

White Paper: Whole Disk Encryption

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Managed Portable Security Devices

Symantec Drive Encryption for Windows

Enterprise Data Protection

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Protection of Computer Data and Software

Symantec Backup Exec.cloud

nfrascale BACKUP Total Data Protection Physical, VM & Cloud

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

White Paper. BD Assurity Linc Software Security. Overview

Protecting your information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

L-3 Guardian SME PED Frequently Asked Questions

Aegis Padlock for business

Client side. DESlock + Data Encryption

Protecting Your Data On The Network, Cloud And Virtual Servers

Storage, backup, transfer, encryption of data

Managing BitLocker With SafeGuard Enterprise

DRAFT Standard Statement Encryption

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

Driving Company Security is Challenging. Centralized Management Makes it Simple.

THE LOGICAL CHOICE FOR ONLINE DATA PROTECTION. Brought to you by

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

SAS Data Set Encryption Options

Storing and securing your data

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Using End User Device Encryption to Protect Sensitive Information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Samsung SED Security in Collaboration with Wave Systems

Hardware RAID vs. Software RAID: Which Implementation is Best for my Application?

EMC Symmetrix Data at Rest Encryption

WhitePaper THIN CLIENTS

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

Full Drive Encryption Security Problem Definition - Encryption Engine

Encryption Buyers Guide

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Kaspersky Lab s Full Disk Encryption Technology

McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices

How To Protect Your Data From Being Hacked

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

The virtual safe: A user-focused approach to data encryption

Guidelines on use of encryption to protect person identifiable and sensitive information

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

SECURITY POLICY REMOTE WORKING

Hosted File Back-up for business. Keep your data safe with our cloud back-up service

Data storage, collaboration, backup, transfer and encryption

Building Robust Security Solutions Using Layering And Independence

Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD

Industry Security Notice

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

Countering and reducing ICT security risks 1. Physical and environmental risks

Data Access Request Service

FileMaker Pro 11. Running FileMaker Pro 11 on Citrix XenApp

etoken Single Sign-On 3.0

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

User Guide. G 4 Supreme. April AES 256 Encrypted USB Flash Drive. Prepared By: Md. Zakir Hosen

Managing BitLocker Encryption

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

Virginia Commonwealth University School of Medicine Information Security Standard

Achieving HIPAA Compliance with Red Hat

TPM. (Trusted Platform Module) Installation Guide V2.1

Achieving HIPAA Compliance with Red Hat

Securing the endpoint and your data

EMC VMAX3 DATA AT REST ENCRYPTION

Healthcare Compliance Solutions

SERVER, DESKTOP AND PORTABLE SECURITY. September Version 3.0

Hosted File Backup for business. Keep your data safe with our cloud backup service

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Transcription:

Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors

Eclypt Hard Drive Encryption ACCREDITED DATA-AT-REST SECURITY HARDWARE IS YOUR DATA SAFE FROM BREACH? THINK AGAIN.» A laptop is stolen every 53 seconds, and there s one in ten chance that your laptop will be stolen this year. Millions of computers are lost or stolen annually, putting classified and sensitive data at risk of breach. Eclypt data-at-rest security hardware has been accredited by government organizations worldwide to protect data of any classification level from top secret to unclassified. In the event of computer theft, loss, or attack, Eclypt ensures that your data is completely protected, secure, and unstealable.

If It Can Happen To Them, It Can Happen To You. Millions of Computers Go Missing Each Year, Putting Classified and Sensitive Data At Risk of Breach.

Inside Your Computer EMBEDDED DATA PROTECTION AT YOUR COMPUTER S CORE ECLYPT CORE INTERNAL HARD DRIVES Direct hardware-encrypted replacement for a standard internal hard drive. Protection Levels: Full Range of Accredited Variants UK: Enhanced Top Secret through Unclassified US: Contact ViaSat for more information (*Expected to be submitted for US government certification) Canada: Top Secret through Unclassified NATO: Secret through Unclassified WORKSTATION INLINE MEDIA ENCRYPTOR Positioned between a computer s processor and hard drive, this Eclypt device protects data-at-rest on classified desktop and server computers. Certified Protection for US and NATO Top Secret & Below Outside Your Computer THE FREEDOM TO WORK ON THE GO AND SWITCH COMPUTERS WITH PORTABLE DATA PROTECTION ECLYPT FREEDOM EXTERNAL HARD DRIVES External USB hardware-encypted hard drive that can store, archive or back-up data and easily transport to different computers. Protection Levels: Full Range of Accredited Variants UK: Enhanced Top Secret through Unclassified US: Contact ViaSat for more information (*Expected to be submitted for US government certification) Canada: Top Secret through Unclassified NATO: Secret through Unclassified ECLYPT NANO USB MEMORY STICK Encrypted USB memory stick delivers AES-256 full-disk encryption and military-grade rugged, waterproof performance in a portable thumb drive. Protection Levels: Full Range of Accredited Variants UK: Enhanced Top Secret through Unclassified US: Contact ViaSat for more information (*Expected to be submitted for US government certification) Canada: Top Secret through Unclassified NATO: Secret through Unclassified PORTABLE INLINE MEDIA ENCRYPTOR External device that houses and encrypts a 2.5 ATA-6 classified hard drive, and connects via USB to your laptop. Certified Protection for US and NATO Top Secret & Below

Eclypt Data-at-Rest Protection ACCREDITED HARDWARE-BASED ENCRYPTION FOR OPTIMAL HARD DRIVE SECURITY UNITED KINGDOM PROTECTIVE MARKING UNITED STATES CLASSIFICATION CANADA PROTECTIVE MARKING NATO ACCREDITATIONS PROTECTION LEVEL 800» KG-200 (IME)» KG-201 (IME) 600» Core 600 (Internal)» Freedom 600 (External)» Nano 600 (USB Stick) 400» Core 400 (Internal)» Freedom 400 (External)» Nano 400 (USB Stick) Enhanced: Secures Top Secret & Secret; Reduces Protective Marking by 2 levels Baseline+: Secures up to Confidential (Impact Level 4); Reduces Protective Marking by 1 level Secures Top Secret & Below; Encrypted data is rendered Unclassified Contact ViaSat for more information * Expected to be submitted for US government certification Secures Top Secret, Secret, Confidential, & Protected C Data; Reduces security classification down 2 levels Secures NATO Cosmic Top Secret & Below; Encrypted data is rendered Unclassified Secures up to NATO Secret Data; Reduces security classification down 2 levels 300» Core 300 (Internal)» Freedom 300 (External)» Nano 300 (USB Stick) Baseline: Secures up to Restricted (Impact Level 3); Reduces Protective Marking by 1 level Secures up to NATO Restricted Data; Encrypted data is rendered Unclassified 200» Core 200 (Internal)» Freedom 200 (External)» Nano 200 (USB Stick) Secures up to Protect (Impact Levels 1 & 2) Secures Sensitive (Unclassified) Data Secures Protected A&B (Unclassified) Data Secures Sensitive (NATO Unclassified) Data

Eclypt Core Direct hardware-encrypted replacement for a standard internal hard drive. Full range of protection levels offered through Core 600, 400, 300, and 200 variants to deliver the optimal level of security for your data AES-256 bit encryption Operating system and service-pack independent Application software independent Up to 128 user accounts per drive 3-tiered user management system Supports imaging, partitioning, and diagnostic applications Eclypt Freedom External USB hardware-encrypted hard drive that can go anywhere with you to store, archive or back-up data, and easily transport to different computers. Full range of protection levels offered through Freedom 600, 400, 300, and 200 variants to deliver the optimal level of security for your data USB plug & play connectivity AES-256 bit encryption Application software independent Up to 128 user accounts per drive 3-tiered user management system Supports imaging, partitioning, and diagnostic applications Eclypt Orion Server-Based Remote Management System for Eclypt Core 200, Freedom 200, and Nano 200 devices. With Eclypt Orion software, you can: Remotely define authentication parameters Create account policies Track device usage Use logging and audit facilities

Eclypt Nano Encrypted USB memory stick delivers AES-256 full-disk encryption and military-grade rugged, waterproof performance in a portable thumb drive. MIL-STD-810F ruggedized and waterproof USB flash drive Full range of protection levels offered through Freedom 600, 400, 300, and 200 variants to deliver the optimal level of security for your data USB plug & play connectivity AES-256 bit encryption Application software independent Up to 128 user accounts per drive 3-tiered user management system Supports imaging, partitioning, and diagnostic applications Custom Encryption Systems For special encrypted data storage requirements, we can design and deliver fast encrypted data storage systems tailored to your specific needs. Our bespoke systems are based the same attack-resistant technologies used in our Eclypt products, and customized to your security level, ruggedization, form factor, or platform requirements. Contact us to discuss your mission needs. KG-200 & KG-201 Inline Media Encryptors NSA-certified Type 1 encryption devices that are positioned in line between the computer processor and hard drive to ensure that anything stored to the hard drive gets encrypted and anything retrieved from the hard drive gets decrypted. Certified protection for US and NATO Top Secret & Below KG-200 (Workstation IME): Quickly secures the hard drive inside your desktop, workstation, or server PC KG-201 (Portable IME): External storage device that supports multiple users, protects TS/SCI, and connects via USB 2.0 interface on your computer Encryption renders the disk drive unclassified, freeing you from logistics associated with storing and transporting classified data

Contact Us UK Sandford Lane, Wareham BH20 4DY, England Tel +44 (0) 1929 55 44 00 Fax +44 (0) 1929 55 25 25 Email sales@viasat.uk.com Web www.viasat.uk.com USA 6155 El Camino Real Carlsbad, CA 92009 Tel 888.ViaSat.1 (888-842-7281) Fax 760.683.6815 Email insidesales@viasat.com Web www.viasat.com Copyright 2010-2011 ViaSat, Inc. All rights reserved. ViaSat and the ViaSat logo are registered trademarks of ViaSat, Inc. Eclypt, Flagstone, and the Eclypt logo are registered trademarks of ViaSat UK Limited. Microsoft and Windows are registered trademarks of Microsoft Corporation. All other trademarks mentioned are the sole property of their respective companies. Specifications and product availability are subject to change without notice. Source: Gartner, Inc. research study. *Expected to be submitted for US government certification. 110805-026