Perimeter
8/6/2012
02:54 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

New USB Encryption Solution Protects At Risk Data, Prevents Data Breaches

Enigma module provides real-time full disk encryption for any USB mass storage class (MSC) drive

SAN JOSE, Calif., Aug. 6, 2012 ­ Building on its heritage of expertise in embedded encryption solutions, Enova Technology (http://www.enovatech.net/) today announced the launch of the Enigma module (http://www.enovatech.net/products/enigma.htm), a USB encryption solution designed to provide consumers and enterprises with real-time full disk encryption for any USB mass storage class (MSC) drive.

A recent study released by the Ponemon Institute revealed that when compared to the potential damage caused by data disclosure, the cost of encryption is a fraction of the value it provides to businesses around the world. In all surveyed countries, the expected benefits of full disk encryption exceeded the estimated costs of implementing a solution by a factor ranging from four to 20. By leveraging Enova¹s real-time encryption technology, the Enigma module provides complete protection of data-at-rest, eliminating the risk of a damaging breach.

Key Features: - Automatic and Transparent Encryption: Data written to the USB drive through the Enigma module is automatically and transparently encrypted, whereas data read out from the drive is automatically decrypted, requiring no additional hardware or software. All data is protected on your drive using the Enigma module. - Trusted Security Standards: NIST (National Institute of Standards and Technology)/CSE (Communications Security Establishment) certified hardware AES (Advanced Encryption Standard) ECB/CBC engines up to 256-bit strength. - Encryption of Off the Shelf USB Drives: Encrypts any number of USB disk drives, solid state drives, thumb drives, Blu-ray, DVD+/- RW, CD-R drives and card reader media, including SD and MMC. - Multi Platform Compatibility: Compatible with any Windows, Mac, Linux or Android platform. - Protection from Viruses and Malware: Creates a ³Read Only² function on the USB drive that protects users from potentially harmful viruses, spyware and malware. - Complete USB Compliance: Compliant with any USB 1.0/1.1/2.0/3.0 MSC protocols. - Easy to Use: Simple design with no new programming for the user to learn or sophisticated graphical user interface for the user to navigate. - Built in Initializer: Initialization software is stored on the device for easy and immediate deployment.

Supporting Quotes: - Robert Wann, CEO, Enova Technology, said: ³Often, the implementation of data encryption solutions is a retroactive endeavor after a major data breach. To aid organizations in proactively securing their data at rest, we¹ve taken our expertise in data encryption and packaged it into an easy to use USB solution. The Enigma module will add a much needed layer of security to sensitive consumer and enterprise data.²

- Charles Kolodgy, research vice president, security products, IDC, said: ³As the frequency and severity of data breaches grows, endpoint security is increasingly critical to consumers and organizations looking to secure their sensitive information. External storage devices in particular, such as USB hard drives and thumb drives, are often unprotected and therefore vulnerable to data theft or device loss. Hardware solutions that provide ease of use and comprehensive capabilities are a huge asset to both organizations and individual users in protecting data-at-rest.²

About Enova Technology: Enova Technology is a global leader in hardware-based cryptographic solutions that address the increasing requirement for privacy and confidentiality, satisfying the growing demand for data security across the globe. Enova¹s advanced real-time cryptographic solutions are designed to meet the performance and encryption standards of the most demanding government and enterprise customers. For more information, visit the Enova Technology website: http://www.enovatech.net.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.