Risk
7/15/2010
12:43 PM
50%
50%

Casper Speeds Backup Cloning Of PGP Encrypted Drives

Version 2.0 works with Windows 7, PGP Whole Disk Encryption version 10 and can create browsable, bootable encrypted backups.

Encrypting data on desktop and notebook computers, especially those outside of the office, isn't just a good idea, it should be the default. That's especially true given the ever-growing number of government and industry mandates regarding protection of sensitive information, the fines for leaving such information "exposed" even if no actual harm results, and the continual stream of lost, stolen, strayed or compromised notebooks and desktop computers.

But encrypting the drive, for example with Windows BitLocker, TrueCrypt, or PGP Whole Disk Encryption doesn't automatically encrypt any local backups you make to a USB external hard drive, or to a second drive in a laptop media bay. Using an encrypted hard drive, or encrypting the backup once it's made would protect it... but how many users in small-to-midsized businesses know to do this, and consistently will?

For Windows hard drives (or portions of) encrypted with PGP Whole Disk Encryption, Future Systems Solutions has just made doing encrypted backups even quicker and easier, with the release version 2.0 of its Casper Secure Drive Backup software. Casper Secure Drive Backup "clones" -- creates a completely encrypted copy of Windows system hard disk that is protected with PGP Whole Disk Encryption, including the operating system, applications, settings, and all your data. The software works from Windows, avoiding the need to stop using or restart the computer.

According to Marty Rubenstein, Product Manager, Future Systems Solutions, Casper Secure Drive Backup is the only product currently available that can create a one-step clone of a PGP Whole Disk encrypted drive from within Windows while maintaining the data in its original encrypted state.

The cloned encrypted image is not a single-file archive, emphasizes Rubenstein; the drive is immediately usable, e.g., it can be browsed and accessed through Windows Explorer, from -- assuming the user has the PGP key -- any computer. The drive can also be used as replacement bootable drive. If the system is new enough, you can even boot the copy from an external USB drive.

Beth Cohen, President of Luth Computer Specialists, an IT services consultancy, says, "This approach is useful for people who are encrypting their desktop or notebook, and are doing local backups."

Other uses for Casper Secure Drive Backup, according to the company, include enabling a user to move a PGP Whole Disk Encrypted system to a larger-capacity hard drive and having access to the full capacity of the new drive, or from a hard drive to a solid-state drive -- in all cases, without having to gothrough the decrypt/encrypt process required by other cloning approaches.

Even enterprises using PGP Whole Disk Encryption, who do network backup, may find Casper Secure Drive Backup useful for providing stand-alone backup and recovery.

Improvements and new features in Casper Secure Drive Backup 2.0, according to Rubenstein, include:

  • Support for PGP Desktop 10, "which was a significant upgrade to previous version,"
  • Support for Windows 7
  • Up to 50x faster operation, thanks to Future Systems' SmartClone Plus technology, which modifies the original cloned backup versus creating a full new one,
  • Support for solid-state drives (SSDs)
  • New features including enhanced backup scheduling.

Casper Secure Drive Backup 2.0 can, according to Rubenstein, also backup to, and restore from, flash drives, if the drive is initialized like a hard drive rather than like a super-floppy -- although, Rubenstein notes, "We do not yet officially support backing up to flash drives." (Flash drives that are factory-initialized like super-floppies or with a hybrid CD/super-floppy design can be re-initialized to appear like hard drives, at which point Casper can recognize and utilize them, Rubenstein notes.)

Casper Secure Drive Backup 2.0 for PGP Whole Disk Encryption supports all versions of Windows 7, Windows Vista, Windows XP, and Windows 2000. A single-system licenses is $89.95 (volume discounts available); registered users of version 1 can upgrade for $44.95, and anyone who bought version 1.0 after March 31, 2010 can upgrade at no cost.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

CVE-2015-4232
Published: 2015-07-03
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.

CVE-2015-4234
Published: 2015-07-03
Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127.

CVE-2015-4237
Published: 2015-07-03
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv0...

CVE-2015-4239
Published: 2015-07-03
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report