Perimeter
8/6/2012
02:54 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

New USB Encryption Solution Protects At Risk Data, Prevents Data Breaches

Enigma module provides real-time full disk encryption for any USB mass storage class (MSC) drive

SAN JOSE, Calif., Aug. 6, 2012 ­ Building on its heritage of expertise in embedded encryption solutions, Enova Technology (http://www.enovatech.net/) today announced the launch of the Enigma module (http://www.enovatech.net/products/enigma.htm), a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for any USB mass storage class (MSC) drive.

A recent study released by the Ponemon Institute revealed that when compared to the potential damage caused by data disclosure, the cost of encryption is a fraction of the value it provides to businesses around the world. In all surveyed countries, the expected benefits of full disk encryption exceeded the estimated costs of implementing a solution by a factor ranging from four to 20. By leveraging Enova¹s real-time encryption technology, the Enigma module provides complete protection of data-at-rest, eliminating the risk of a damaging breach.

Key Features: - Automatic and Transparent Encryption: Data written to the USB drive through the Enigma module is automatically and transparently encrypted, whereas data read out from the drive is automatically decrypted, requiring no additional hardware or software. All data is protected on your drive using the Enigma module. - Trusted Security Standards: NIST (National Institute of Standards and Technology)/CSE (Communications Security Establishment) certified hardware AES (Advanced Encryption Standard) ECB/CBC engines up to 256-bit strength. - Encryption of Off the Shelf USB Drives: Encrypts any number of USB disk drives, solid state drives, thumb drives, Blu-ray, DVD+/- RW, CD-R drives and card reader media, including SD and MMC. - Multi Platform Compatibility: Compatible with any Windows, Mac, Linux or Android platform. - Protection from Viruses and Malware: Creates a ³Read Only² function on the USB drive that protects users from potentially harmful viruses, spyware and malware. - Complete USB Compliance: Compliant with any USB 1.0/1.1/2.0/3.0 MSC protocols. - Easy to Use: Simple design with no new programming for the user to learn or sophisticated graphical user interface for the user to navigate. - Built in Initializer: Initialization software is stored on the device for easy and immediate deployment.

Supporting Quotes: - Robert Wann, CEO, Enova Technology, said: ³Often, the implementation of data encryption solutions is a retroactive endeavor after a major data breach. To aid organizations in proactively securing their data at rest, we¹ve taken our expertise in data encryption and packaged it into an easy to use USB solution. The Enigma module will add a much needed layer of security to sensitive consumer and enterprise data.²

- Charles Kolodgy, research vice president, security products, IDC, said: ³As the frequency and severity of data breaches grows, endpoint security is increasingly critical to consumers and organizations looking to secure their sensitive information. External storage devices in particular, such as USB hard drives and thumb drives, are often unprotected and therefore vulnerable to data theft or device loss. Hardware solutions that provide ease of use and comprehensive capabilities are a huge asset to both organizations and individual users in protecting data-at-rest.²

About Enova Technology: Enova Technology is a global leader in hardware-based cryptographic solutions that address the increasing requirement for privacy and confidentiality, satisfying the growing demand for data security across the globe. Enova¹s advanced real-time cryptographic solutions are designed to meet the performance and encryption standards of the most demanding government and enterprise customers. For more information, visit the Enova Technology website: http://www.enovatech.net.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio