Risk
6/4/2007
12:10 PM
Connect Directly
RSS
E-Mail
50%
50%

Utimaco Upgrades SafeGuard

SafeGuard RemovableMedia Portable function enables encrypted data to be exchanged without the need to install encryption software

WOKING, U.K. -- Anyone using removable media will now find it easier to exchange encrypted data with colleagues or business partners, with Utimaco's SafeGuard RemovableMedia 1.10. The new SafeGuard RemovableMedia Portable function enables encrypted data to be exchanged without the need to install encryption software on the computer that is receiving and using the data.

SafeGuard Removable Media works via a drag&drop mechanism that does not need the usual administrator rights. The user inserts their removable data medium, that has been secured and encrypted using SafeGuard RemovableMedia, into a PC. They are then automatically prompted to enter their password, so they can gain both read and write access to the encrypted files.

No matter whether a USB memory stick, memory card, external hard disk, diskette or optical CD/DVD is used, SafeGuard RemovableMedia protects data from unauthorised access at all times, even if the storage medium is removed or is lost.

Any medium can hold either data which is entirely encrypted, or a mixture of encrypted files and plain text data, whichever option best suits your company's security policy. The administrator, working at the central management console, has the option of defining security policies that are restrictive and, at the same time, extremely flexible. They can, for example, specify whether or not the portable function can be copied to the removable storage medium.

A new feature in Version 1.10 is that key back-ups can now be used flexibly on any computer. Every key can now be stored securely on a network or on individual memory media and uploaded again if the PC is damaged in any way. As a result, users can easily exchange keys with each another. SafeGuard RemovableMedia's central logging functionality records the most important events, such as new key generation, key restoration, or any other change made to the security policy.

It also supports the distribution of company keys during setup, which means encrypted data can be exchanged quickly and easily within the company. In Windows Explorer every encrypted file is shown with an icon superimposed on it, which means a user can tell at a glance whether a file is encrypted.

"At present, four out of five mobile memory media have inadequate encryption. We discovered this in a world-wide survey of more than one thousand business users", explained Robert Zeh, Product Manager at Utimaco. "SafeGuard RemovableMedia provides this data security, not only in your own IT infrastructure but also, if needed, for all your communications partners and the removable media they use."

Utimaco Safeware AG

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio