Perimeter
8/6/2012
02:54 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

New USB Encryption Solution Protects At Risk Data, Prevents Data Breaches

Enigma module provides real-time full disk encryption for any USB mass storage class (MSC) drive

SAN JOSE, Calif., Aug. 6, 2012 ­ Building on its heritage of expertise in embedded encryption solutions, Enova Technology (http://www.enovatech.net/) today announced the launch of the Enigma module (http://www.enovatech.net/products/enigma.htm), a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for any USB mass storage class (MSC) drive.

A recent study released by the Ponemon Institute revealed that when compared to the potential damage caused by data disclosure, the cost of encryption is a fraction of the value it provides to businesses around the world. In all surveyed countries, the expected benefits of full disk encryption exceeded the estimated costs of implementing a solution by a factor ranging from four to 20. By leveraging Enova¹s real-time encryption technology, the Enigma module provides complete protection of data-at-rest, eliminating the risk of a damaging breach.

Key Features: - Automatic and Transparent Encryption: Data written to the USB drive through the Enigma module is automatically and transparently encrypted, whereas data read out from the drive is automatically decrypted, requiring no additional hardware or software. All data is protected on your drive using the Enigma module. - Trusted Security Standards: NIST (National Institute of Standards and Technology)/CSE (Communications Security Establishment) certified hardware AES (Advanced Encryption Standard) ECB/CBC engines up to 256-bit strength. - Encryption of Off the Shelf USB Drives: Encrypts any number of USB disk drives, solid state drives, thumb drives, Blu-ray, DVD+/- RW, CD-R drives and card reader media, including SD and MMC. - Multi Platform Compatibility: Compatible with any Windows, Mac, Linux or Android platform. - Protection from Viruses and Malware: Creates a ³Read Only² function on the USB drive that protects users from potentially harmful viruses, spyware and malware. - Complete USB Compliance: Compliant with any USB 1.0/1.1/2.0/3.0 MSC protocols. - Easy to Use: Simple design with no new programming for the user to learn or sophisticated graphical user interface for the user to navigate. - Built in Initializer: Initialization software is stored on the device for easy and immediate deployment.

Supporting Quotes: - Robert Wann, CEO, Enova Technology, said: ³Often, the implementation of data encryption solutions is a retroactive endeavor after a major data breach. To aid organizations in proactively securing their data at rest, we¹ve taken our expertise in data encryption and packaged it into an easy to use USB solution. The Enigma module will add a much needed layer of security to sensitive consumer and enterprise data.²

- Charles Kolodgy, research vice president, security products, IDC, said: ³As the frequency and severity of data breaches grows, endpoint security is increasingly critical to consumers and organizations looking to secure their sensitive information. External storage devices in particular, such as USB hard drives and thumb drives, are often unprotected and therefore vulnerable to data theft or device loss. Hardware solutions that provide ease of use and comprehensive capabilities are a huge asset to both organizations and individual users in protecting data-at-rest.²

About Enova Technology: Enova Technology is a global leader in hardware-based cryptographic solutions that address the increasing requirement for privacy and confidentiality, satisfying the growing demand for data security across the globe. Enova¹s advanced real-time cryptographic solutions are designed to meet the performance and encryption standards of the most demanding government and enterprise customers. For more information, visit the Enova Technology website: http://www.enovatech.net.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.