Risk
6/4/2007
12:10 PM
50%
50%

Utimaco Upgrades SafeGuard

SafeGuard RemovableMedia Portable function enables encrypted data to be exchanged without the need to install encryption software

WOKING, U.K. -- Anyone using removable media will now find it easier to exchange encrypted data with colleagues or business partners, with Utimaco's SafeGuard RemovableMedia 1.10. The new SafeGuard RemovableMedia Portable function enables encrypted data to be exchanged without the need to install encryption software on the computer that is receiving and using the data.

SafeGuard Removable Media works via a drag&drop mechanism that does not need the usual administrator rights. The user inserts their removable data medium, that has been secured and encrypted using SafeGuard RemovableMedia, into a PC. They are then automatically prompted to enter their password, so they can gain both read and write access to the encrypted files.

No matter whether a USB memory stick, memory card, external hard disk, diskette or optical CD/DVD is used, SafeGuard RemovableMedia protects data from unauthorised access at all times, even if the storage medium is removed or is lost.

Any medium can hold either data which is entirely encrypted, or a mixture of encrypted files and plain text data, whichever option best suits your company's security policy. The administrator, working at the central management console, has the option of defining security policies that are restrictive and, at the same time, extremely flexible. They can, for example, specify whether or not the portable function can be copied to the removable storage medium.

A new feature in Version 1.10 is that key back-ups can now be used flexibly on any computer. Every key can now be stored securely on a network or on individual memory media and uploaded again if the PC is damaged in any way. As a result, users can easily exchange keys with each another. SafeGuard RemovableMedia's central logging functionality records the most important events, such as new key generation, key restoration, or any other change made to the security policy.

It also supports the distribution of company keys during setup, which means encrypted data can be exchanged quickly and easily within the company. In Windows Explorer every encrypted file is shown with an icon superimposed on it, which means a user can tell at a glance whether a file is encrypted.

"At present, four out of five mobile memory media have inadequate encryption. We discovered this in a world-wide survey of more than one thousand business users", explained Robert Zeh, Product Manager at Utimaco. "SafeGuard RemovableMedia provides this data security, not only in your own IT infrastructure but also, if needed, for all your communications partners and the removable media they use."

Utimaco Safeware AG

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.