Perimeter
8/6/2012
02:54 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New USB Encryption Solution Protects At Risk Data, Prevents Data Breaches

Enigma module provides real-time full disk encryption for any USB mass storage class (MSC) drive

SAN JOSE, Calif., Aug. 6, 2012 ­ Building on its heritage of expertise in embedded encryption solutions, Enova Technology (http://www.enovatech.net/) today announced the launch of the Enigma module (http://www.enovatech.net/products/enigma.htm), a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for any USB mass storage class (MSC) drive.

A recent study released by the Ponemon Institute revealed that when compared to the potential damage caused by data disclosure, the cost of encryption is a fraction of the value it provides to businesses around the world. In all surveyed countries, the expected benefits of full disk encryption exceeded the estimated costs of implementing a solution by a factor ranging from four to 20. By leveraging Enova¹s real-time encryption technology, the Enigma module provides complete protection of data-at-rest, eliminating the risk of a damaging breach.

Key Features: - Automatic and Transparent Encryption: Data written to the USB drive through the Enigma module is automatically and transparently encrypted, whereas data read out from the drive is automatically decrypted, requiring no additional hardware or software. All data is protected on your drive using the Enigma module. - Trusted Security Standards: NIST (National Institute of Standards and Technology)/CSE (Communications Security Establishment) certified hardware AES (Advanced Encryption Standard) ECB/CBC engines up to 256-bit strength. - Encryption of Off the Shelf USB Drives: Encrypts any number of USB disk drives, solid state drives, thumb drives, Blu-ray, DVD+/- RW, CD-R drives and card reader media, including SD and MMC. - Multi Platform Compatibility: Compatible with any Windows, Mac, Linux or Android platform. - Protection from Viruses and Malware: Creates a ³Read Only² function on the USB drive that protects users from potentially harmful viruses, spyware and malware. - Complete USB Compliance: Compliant with any USB 1.0/1.1/2.0/3.0 MSC protocols. - Easy to Use: Simple design with no new programming for the user to learn or sophisticated graphical user interface for the user to navigate. - Built in Initializer: Initialization software is stored on the device for easy and immediate deployment.

Supporting Quotes: - Robert Wann, CEO, Enova Technology, said: ³Often, the implementation of data encryption solutions is a retroactive endeavor after a major data breach. To aid organizations in proactively securing their data at rest, we¹ve taken our expertise in data encryption and packaged it into an easy to use USB solution. The Enigma module will add a much needed layer of security to sensitive consumer and enterprise data.²

- Charles Kolodgy, research vice president, security products, IDC, said: ³As the frequency and severity of data breaches grows, endpoint security is increasingly critical to consumers and organizations looking to secure their sensitive information. External storage devices in particular, such as USB hard drives and thumb drives, are often unprotected and therefore vulnerable to data theft or device loss. Hardware solutions that provide ease of use and comprehensive capabilities are a huge asset to both organizations and individual users in protecting data-at-rest.²

About Enova Technology: Enova Technology is a global leader in hardware-based cryptographic solutions that address the increasing requirement for privacy and confidentiality, satisfying the growing demand for data security across the globe. Enova¹s advanced real-time cryptographic solutions are designed to meet the performance and encryption standards of the most demanding government and enterprise customers. For more information, visit the Enova Technology website: http://www.enovatech.net.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5312
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.

CVE-2012-6662
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.

CVE-2014-1424
Published: 2014-11-24
apparmor_parser in the apparmor package before 2.8.95~2430-0ubuntu5.1 in Ubuntu 14.04 allows attackers to bypass AppArmor policies via unspecified vectors, related to a "miscompilation flaw."

CVE-2014-7817
Published: 2014-11-24
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

CVE-2014-7821
Published: 2014-11-24
OpenStack Neutron before 2014.1.4 and 2014.2.x before 2014.2.1 allows remote authenticated users to cause a denial of service (crash) via a crafted dns_nameservers value in the DNS configuration.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?