SPYRUS Unveils Family Of USB Encryption DevicesSPYRUS Unveils Family Of USB Encryption Devices
Hydra Privacy Card safeguards against malicious attacks that spread malware through autorun files on peripheral USB drives
January 15, 2009
San Jose, CA - January 14, 2009 - SPYRUS, Inc. today announced the Hydra Privacy Card' (Hydra PC(tm)) family of USB encrypting devices is immune from USB autorun malware attacks. Hydra PC, which utilizes the most advanced security technology in the industry, protects critical information networks of the U.S. Department of Defense (US DoD) and other government agencies from malicious attacks that spread malware through autorun files on peripheral USB drives. No other USB drive provides the same level of protection.
The Hydra PC completely shields networks from such attacks. Hydra PC models are the only encrypting USB drives with military-grade Suite B cryptographic capabilities for file-by-file encryption, implementing world-class data integrity. They protect against malware by digitally signing every file and prohibiting autorun files from launching. Designed for FIPS 140-2 Level 3 security validation, Hydra PC devices implement the strongest hardware-based encryption technology commercially available to protect host computers, peripheral flash drives, and removable memory media. Many government agencies, including the US DoD, completely ban the use of USB flash drives on their networks because of the widespread threats from the "agent.btz" virus. This virus spreads when USB flash drives are moved from one computer to another. Military and other critical operations were so crippled by this virus that the President was briefed on the issue. Hydra PC virus and malware protection is impenetrable, because its filed-based encryption is inherently resistant to malware attacks and transporting malware.
In addition, its file-based encryption process hashes both the plaintext and encrypted (ciphertext) versions of each file during the encryption process. Both hashes are then validated in hardware to ensure file integrity in storage, whether the file is stored on the flash memory within the Hydra PC, externally on the computer's hard drive or on a file server. This unique sealing process protects against using data that is internally corrupted or was attacked by malware while encrypted.
The Hydra PC automatically detects and blocks any files corrupted in storage, whether by "bit-rot" media aging or by deliberate attempts to corrupt data. If a stored file is attacked or altered in any way, the user is notified and decryption is blocked.
The unique patented and patent-pending capabilities of the Hydra PC family completely protect enterprise and military mission-critical data from malware injected onto USB drives. Hydra PC is the only hardware device approved under the US DoD ESI/GSA SmartBUY Data At Rest (DAR) program for safe utilization within US DoD and civilian networks.
In recent attacks cited by the U.S. Department of Defense, USB drives were infected by malware. In the incident that received the most publicity, malware entered through autorun files that launched automatically when the drive was connected to the computer. Hydra PC Personal Encryption Device, Enterprise Edition, and Digital Attach models are integrated into the Windows Explorer Shell and prohibit autorun files from launching automatically. No file can be read from or written to any removable mass storage medium unless it is properly encrypted and validated during decryption.
Hydra PC also protects stored data against both malware and accidental modification of encrypted information, even when data is stored outside of the Hydra PC. Unlimited amounts of data can be protected with complete confidence. This protection is especially important for medical records and prescriptions, financial data, and other critical data in storage and in transit. This protection is unique among USB encryption drives.
All Hydra PC models include Hydra PC Sentry capabilities that block host PC access to removable mass storage devices, including USB and FireWire devices that use disk file systems. Hydra PC Sentry ensures that only Hydra PC encrypted files can be read or written to, prohibiting data transfers from other drives, such as camera memories and MP3 players.
"SPYRUS has delivered hundreds of thousands of portable hardware encryption products to the Department of Defense, federal and state governments, and enterprise customers over the past fifteen years," said Tom Dickens, Chief Operating Officer of SPYRUS. "Our customers have come to rely on our U.S. designed, developed, and manufactured security solutions. The Hydra PC immunity to USB autorun malware attacks is the latest example of how our high strength security implementations protect data."
About SPYRUS SPYRUS, Inc., a Microsoft Managed ISV Partner, has pioneered portable security products and solutions for the information security market since its inception in 1992. Our primary product lines of LYNKS Hardware Security Modules, Rosetta Series II smart cards and USB security devices, Hydra Privacy Card' Series II encryption and mass storage, Talisman/DS' Data Security Suite, and identity management products (Signal Identity Manager(tm) and SPYRUS PKI) meet customer needs for high-assurance security. Our mission is to set the standard for the new era of multinational information sharing and long-term data protection. SPYRUS, Inc. is headquartered in San Jose, CA. See www.spyrus.com for further information.
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Everything You Need to Know About DNS Attacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Get the Gartner Report: SOC Model Guide
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Building Immunity: The 2021 Healthcare and Pharmaceutical Industry Cyber Threat Landscape Report