New Software Encrypts USB Data
RedCannon Security introduces KeyPoint Solo Vault for software encryption of USB data
FREMONT, Calif. -- RedCannon Security, a trusted provider of centrally managed, secure mobile-access solutions for the enterprise, today announced the RedCannon KeyPoint Solo Vault, a software solution to protect sensitive data stored on USB devices. RedCannon KeyPoint Solo Vault provides standards-based, military-grade software encryption that allows end-users to maintain productivity in the field with the assurance that the data they carry and use will not be compromised.
KeyPoint Solo Vault extends the benefits of the RedCannon FIPS-certified portable encryption technology to any USB flash drive. The solution operates without a management server and requires no software installation on the host PC. It is available as software only or bundled with a high-performance USB flash drive and the KeyPoint Port Control software in the KeyPoint Data Leak Prevention Kit.
In a recent industry survey conducted by the Ponemon Institute over half of the respondents admitted that they had copied confidential or sensitive business information onto a USB memory stick even though company policy may prohibit it. The study also stated that nearly 40 percent of respondents reported that they had lost or misplaced a portable data-bearing device.
"Due to their convenience and mobility, the use of USB flash drives continue to grow, with industry analysts predicting approximately 340 million USB flash drives to be sold in 2008," said John Jefferies, vice president of marketing at RedCannon Security. "KeyPoint Solo Vault may be installed on any USB flash drive to ensure that the data stored on these devices is encrypted and protected, giving IT professionals more peace of mind regarding security policy enforcement and regulatory compliance."
About the Author
You May Also Like
Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024