Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/27/2011
01:57 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SPYRUS Releases Secure Pocket Drive For Secure Cloud Computing

Secure Pocket Drive Remote Access Edition can be booted on almost any Windows compatible PC

San Jose, California – June 21, 2011 – SPYRUS today announced that the Secure Pocket Drive Remote Access Edition, which has seen tremendous success and strong demand in the public sector for the past year, is now available for sale to businesses and commercial markets worldwide.

Designed for Internet and cloud computing applications, Secure Pocket Drive is the first and only licensed device that boots Microsoft’s mobile, flagship operating system, Windows Embedded Standard 7, from an encrypting USB flash drive. The read-only device can be booted on almost any Windows compatible PC to create a user-friendly experience in trusted computing. The Secure Pocket Drive only uses the RAM, keyboard, mouse, and monitor on the host computer. Secure Pocket Drive prevents cross-contamination and the transfer of malware from the host PC by not mounting the internal hard drive.

In addition to the built-in browser and Citrix' XenApp™ client, it is easy to add virtual private network (VPN) software to access internal corporate applications. No matter how you use Secure Pocket Drive, it presents a safe environment both for the user and the network to which it is connected.

Multiple SPYRUS patents are used to lock the Microsoft (Nasdaq: MSFT) Windows OS to the device and provide cryptographic protection against modification to the boot loader and the operating system. The patented methods enforce on-the-fly integrity validation to enable fast and secure boot-up and enhance the user experience without suffering the performance or vulnerability penalties incurred by other bootable products. The patented Secure Pocket Drive was designed from the ground up with strong FIPS 140-2 Level 3 hardware, US Government-approved next-generation cryptographic algorithms, and extensive built-in self-checking functionality to protect the device, the operating system, and the user.

“This delivers on Microsoft’s vision of a Trusted Stack, and makes the benefits of a Trusted Stack available to Enterprise customers,” said David Aucsmith, Sr. Director, Microsoft Institute for Advanced Technology in Government. “A truly trusted mobile computing environment providing security of data, identity, and operating system is now available to enterprises large and small, and not just to government agencies.”

Unlike a bootable CD, authorized administrators can use Microsoft System Center Configuration Manager (SCCM) and Active Directory policy settings to install and update software on Secure Pocket Drive with no additional training. Secure Pocket Drive can also be disabled remotely through the SPYRUS Enterprise Management System (SEMS).

“We were proud to introduce our award-winning endpoint security solution to government users in 2010,” said Tom Dickens, COO of SPYRUS, “and now we can extend this same security to the private sector worldwide. Everyone from road warriors to teleworkers are evaluating deployment of the Secure Pocket Drive for secure remote access to network resources rather than issuing a laptop or using a home PC after their kids downloaded unknown malware. Just boot directly from the Secure Pocket Drive for worry-free secure computing.”

Secure Pocket Drive uses the same on-board hardware security infrastructure that is built into the SPYRUS Hydra Privacy Card' family, including AES CBC, ECDH, ECDSA, ECC P-384, and SHA-384, which together make up the National Security Agency’s Suite B cryptography, part of its cryptographic modernization program. Sector-based full disk encryption is based on XTS-AES 256 encryption (NIST SP800-38E).

To watch videos of Secure Pocket Drive in action or for information on ordering Secure Pocket Drive for immediate evaluation or purchase, see www.spyrus.com/products/secure_pocket_drive.asp

About SPYRUS, Inc.

SPYRUS holds patents in the U.S. and abroad that enable solutions for secure authentication, secure communication, and full disk encryption, as well as patents relating to data protection and rights management for digital content. To prevent the insertion of untrusted components, Secured by SPYRUS™ security technology is proudly designed, engineered, and manufactured in the USA to meet FIPS 140-2 Level 3 standards. SPYRUS is headquartered in San Jose, California. See www.spyrus.com for more information.

Secure Pocket Drive is protected by U.S. Patents 7,757,100, 7,380,140, 6,088,802, and 6,981,149, with other patents pending. SPYRUS, the SPYRUS logo, Secured by SPYRUS, Hydra Privacy Card, Hydra PC, Secure Pocket Drive, and Security to the Edge are either registered trademarks or trademarks of SPYRUS, Inc., in the U.S. and/or other jurisdictions. All other company, organization, and product names are trademarks of their respective organizations.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.