DisUK Launches iSecure
DisUK launches iSecure smart card management for its Paranoia2 and SafeTape in-line encryption devices
LONDON -- DISUK today launches iSecure smart card management for its Paranoia2 and SafeTape in-line encryption devices that keep vital backup data secure and compliant with standards such as the Payment Card Industry Data Security Standard (PCI DSS). Security managers can now remotely manage units at unmanned disaster recovery data centres and restore encryption keys for backup data without having to go to the site.
Operations staff may be given appropriate levels of access authority at each site in order to restore data quickly should a disaster happen.
Designed to fit the distinct roles of security and operations in the day-to-day management of encrypted backup data, iSecure offers key generation, management and entry; selection of encryption modes; selection of secure and non-secure modes; engineering functions and full audit logging and reporting.
DISUK’s in-line encryption uses a unique user encryption key and also a unique hardware encryption key on the processor, so that even if someone attempted to read a tape on another unit, it will be unreadable.
However, for disaster recovery scenarios, where another unit is kept at your DR supplier’s site or unmanned secondary data centre, a spare chip is provided and iSecure will allow managers to re-enter the keys over a secure link in order to read the data, negating the need to ship keys.
“More organisations are looking to secure data at rest using encryption. The management and control of this environment will become ever more important. The use of smart card technology has become increasingly acceptable within the organisation looking to secure, control and protect identities,” said Glenn Robinson, Director of QUATTRO Consulting Limited, a technical service provider to the IBM System i marketplace.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024