Perimeter
8/6/2012
02:54 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New USB Encryption Solution Protects At Risk Data, Prevents Data Breaches

Enigma module provides real-time full disk encryption for any USB mass storage class (MSC) drive

SAN JOSE, Calif., Aug. 6, 2012 ­ Building on its heritage of expertise in embedded encryption solutions, Enova Technology (http://www.enovatech.net/) today announced the launch of the Enigma module (http://www.enovatech.net/products/enigma.htm), a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for any USB mass storage class (MSC) drive.

A recent study released by the Ponemon Institute revealed that when compared to the potential damage caused by data disclosure, the cost of encryption is a fraction of the value it provides to businesses around the world. In all surveyed countries, the expected benefits of full disk encryption exceeded the estimated costs of implementing a solution by a factor ranging from four to 20. By leveraging Enova¹s real-time encryption technology, the Enigma module provides complete protection of data-at-rest, eliminating the risk of a damaging breach.

Key Features: - Automatic and Transparent Encryption: Data written to the USB drive through the Enigma module is automatically and transparently encrypted, whereas data read out from the drive is automatically decrypted, requiring no additional hardware or software. All data is protected on your drive using the Enigma module. - Trusted Security Standards: NIST (National Institute of Standards and Technology)/CSE (Communications Security Establishment) certified hardware AES (Advanced Encryption Standard) ECB/CBC engines up to 256-bit strength. - Encryption of Off the Shelf USB Drives: Encrypts any number of USB disk drives, solid state drives, thumb drives, Blu-ray, DVD+/- RW, CD-R drives and card reader media, including SD and MMC. - Multi Platform Compatibility: Compatible with any Windows, Mac, Linux or Android platform. - Protection from Viruses and Malware: Creates a ³Read Only² function on the USB drive that protects users from potentially harmful viruses, spyware and malware. - Complete USB Compliance: Compliant with any USB 1.0/1.1/2.0/3.0 MSC protocols. - Easy to Use: Simple design with no new programming for the user to learn or sophisticated graphical user interface for the user to navigate. - Built in Initializer: Initialization software is stored on the device for easy and immediate deployment.

Supporting Quotes: - Robert Wann, CEO, Enova Technology, said: ³Often, the implementation of data encryption solutions is a retroactive endeavor after a major data breach. To aid organizations in proactively securing their data at rest, we¹ve taken our expertise in data encryption and packaged it into an easy to use USB solution. The Enigma module will add a much needed layer of security to sensitive consumer and enterprise data.²

- Charles Kolodgy, research vice president, security products, IDC, said: ³As the frequency and severity of data breaches grows, endpoint security is increasingly critical to consumers and organizations looking to secure their sensitive information. External storage devices in particular, such as USB hard drives and thumb drives, are often unprotected and therefore vulnerable to data theft or device loss. Hardware solutions that provide ease of use and comprehensive capabilities are a huge asset to both organizations and individual users in protecting data-at-rest.²

About Enova Technology: Enova Technology is a global leader in hardware-based cryptographic solutions that address the increasing requirement for privacy and confidentiality, satisfying the growing demand for data security across the globe. Enova¹s advanced real-time cryptographic solutions are designed to meet the performance and encryption standards of the most demanding government and enterprise customers. For more information, visit the Enova Technology website: http://www.enovatech.net.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?