Encrypt any brand of USB flash drive in minutes and use it on any computer. Every encrypted flash drive has the intelligence to report all user actions to a central manager for comprehensive
- Kill Pill - Disable or Wipe any USB flash drive
- Encrypt any size up to 64 gigabyte
- Asset management, data origin and content analysis
- USB encryption can be implemented quickly and easily - no complex infrastructure is required.
- Administration overheads are minimised as users are guided through the USB encryption process. Built-in features provide basic Helpdesk support.
- Advanced technology ensures the highest levels of security.
- Central management tools allow you deploy and enforce security policies.
- Automatic data content reporting provides a full audit trail to ensure regulatory compliance.
- Anti-theft systems lock down lost or stolen USB devices to prevent data loss.
Secured eUSB lets you take control. Secured eUSB is a comprehensive, easy-to-use solution for USB security that incorporates all the functionality necessary to safeguard your intellectual property and comply with data protection laws and regulations. Secured eUSB provides strong encryption, centralized control of security policies, password policies and user access rights, and extensive data content reporting, enabling you to deploy and control USB security across your entire network. With Secured eUSB you can be confident that the data on all USB flash drives in the organization is secured and that you have full visibility of data movement.
source : cryptzone.com
LOK-IT is simply the most secure and convenient USB flash drive ever developed.
- Security is a four tiered process and is first achieved by requiring a PIN code entry on the device before access to the drive is granted using DataLock™ PIN Protection*. The drive is invisible to the computer when it’s locked.
- All stored data is encrypted using military grade, FIPS approved, AES 256 Bit hardware encryption.
- The encryption key is not stored in the memory, it is stored in our security controller.
- LOK-IT’s flash memory chip and other vital internal components are coated with an epoxy resin which defeats forced access to all stored data and the encryption key.
Unique Benefit Overview
- Impervious to hackers, keyboard loggers and brute force attacks
- Access utilizes Hardware Authentication restricted by PIN code on the device (as opposed to often confusing, vulnerable and inflexible software authentication
- Not recognizable to the computer until the PIN has been entered
- Automatically locks when removed from the computer
- Easy to use and is ‘truly platform independent’ as it never requires any software installation. It works on any and all operating systems (different Windows versions, incl. Windows 7, LINUX or Mac) or other home-entertainment and embedded systems supporting USB standard.
- Use of “on-the-fly” full-disk 256-bit AES hardware encryption not only makes data more secure but processing is remarkably fast.
Lok-IT provides you secure portable devices, namely encrypted flash drives & portable USB storage devices based upon our knowledge of security requirements within organizations. Our hardware encryption and authentication take advantage of the latest technology to help address security needs.
Contact us :
Systematic Development Group, LLC
350 Jim Moran Blvd.
Deerfield Beach, FL 33442
Encrypt USB Flash Drive with TrueCrypt
TrueCrypt enables you to encrypt an entire partition or storage device such as USB flash drive. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys.
Basically it’s pretty easy to encrypt an USB flash drive with TrueCrypt. Upon install, you’re required to create a TrueCrypt volume on a removable drive with preferable encryption option. After that, create a set of password for your TrueCrypt volume and format it. Then, mount your TrueCrypt volume and start using it.
You will be prompted for your TrueCrypt password whenever you access it.
How to Create and Use a TrueCrypt Container
This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you also read the other sections of this manual, as they contain important information.
If you have not done so, download and install TrueCrypt. Then launch TrueCrypt by double-clicking the file TrueCrypt.exe or by clicking the TrueCrypt shortcut in your Windows Start menu.
The main TrueCrypt window should appear. Click Create Volume (marked with a red rectangle for clarity).
The TrueCrypt Volume Creation Wizard window should appear.
In this step you need to choose where you wish the TrueCrypt volume to be created. A TrueCrypt volume can reside in a file, which is also called container, in a partition or drive. In this tutorial, we will choose the first option and create a TrueCrypt volume within a file.
As the option is selected by default, you can just click Next.
Note: In the following steps, the screenshots will show only the right-hand part of the Wizard window.
In this step you need to choose whether to create a standard or hidden TrueCrypt volume. In this tutorial, we will choose the former option and create a standard TrueCrypt volume.
As the option is selected by default, you can just click Next.
In this step you have to specify where you wish the TrueCrypt volume (file container) to be created. Note that a TrueCrypt container is just like any normal file. It can be, for example, moved or deleted as any normal file. It also needs a filename, which you will choose in the next step.
Click Select File.
The standard Windows file selector should appear (while the window of the TrueCrypt Volume Creation Wizard remains open in the background).
In this tutorial, we will create our TrueCrypt volume in the folder D:\My Documents\ and the filename of the volume (container) will be My Volume (as can be seen in the screenshot above). You may, of course, choose any other filename and location you like (for example, on a USB memory stick). Note that the file My Volume does not exist yet – TrueCrypt will create it.
IMPORTANT: Note that TrueCrypt will not encrypt any existing files (when creating a TrueCrypt file container). If you select an existing file in this step, it will be overwritten and replaced by the newly created volume (so the overwritten file will be lost, not encrypted). You will be able to encrypt existing files (later on) by moving them to the TrueCrypt volume that we are creating now.*
Select the desired path (where you wish the container to be created) in the file selector.
Type the desired container filename in the File name box.
The file selector window should disappear.
source : truecrypt.org
Even the biggest USB flash drive is still smaller than most people's thumbs. Since we carry these devices to numerous locations, there is a fairly good chance that we will eventually lose them. If this should happen, most of us simply hope there was nothing sensitive on the drive. However, that is not the only thing you can do. There are some basic USB flash drive security measures available.
If your flash drive carries some sensitive information that you hope to keep from ending up online by the next day, security measures available range from secure partitions to encryption options. Secure partitions are a rudimentary form of security - a password protected partition is created on the drive, using a utility supplied by the manufacturer, this makes a public partition and a secure one.
In most cases, it is not possible to access these partitions at the same time, it is often necessary to log into the secure partition, hiding the public one. Not all controllers feature this limitation. Using a version of your utility, someone else could re-partition the drive. However, they would not have access to the data you have stored on the secure partition.
There are other USB flash drives that are much more specialised, they offer the same sort of secure, password protected partition. However, they also encrypt data stored on that partition, making it much harder for people to get to your data. While encryption algorithms can be broken, having encryption on your USB drive is an extra layer of security you can offer your data.
The down side to drives that use encryption is that some of them only perform this encryption in software that results in lower performance on the drive when encryption is enabled. Few manufacturers use a hardware based engine capable of encrypting and decrypting files at a higher speed to prevent performance penalties when you access a secure partition that's using encryption.
The problem with both of these security approaches is that they are mostly dependent on software; the majority of manufacturers of USB flash drives only provide Windows based software support.
What does that mean for Macintosh users and people who use a Linux distribution or other unusual operating system? Security for USB flash drives is mostly still a matter of keeping good track of them. While it is possible to access public partitions on almost all systems, accessing the secure partition generally requires access to Windows.
USB flash drive security is still in its infancy, since these drives aren't routinely used by people with a need to secure their data. As they become more widespread and the need for security increases, expect flash drive security options to increase as well. For now, partitioning and encrypting are the major options available, though.
Windows users are in luck and can make use of both of these options effectively to preserve their data. However, users of operating systems that aren't compatible with the software on the drive must simply try not to let their USB flash drives fall into the wrong hands.
Every company gathers and stores critical data and files during their business operations. These data are so important because they are considered as one of the most valued assets by some. In line with this, different corporate policies are being implemented to protect these files from any threats such as theft and viruses. Discouragement of using USB flash drives (UFDs) is an example of this policy and in some strict cases; total ban on the use of a portable storage device is being implemented.
The reason for such policies is very clear; they do not want their data to fall in the wrong hands. This is because when some important files are stored in a UFD, the owner of the device does not have complete control on who can access the data. He may be very careful in keeping or securing it, but some people are just so skillful in stealing UFD and files. In short, data are not completely secured on UFD especially if does not have any security mechanisms installed in it.
As a response to the security problem on UFDs, different manufacturers are now implementing reliable security mechanisms installed on the device. The most preferred nowadays is hardware authentication and encryption. This type of security mechanism secures the data transfer and storage by means of different authentication protocols and encryption algorithms.
The most common UFD hardware authentication nowadays uses a built-in buttons for password inputs. It means that you will not need any software just to enter your pin code; rather, you can enter your code directly into the UFD without establishing any communication channel into the host computer. Remember that there can be internal hackers on your company who can exploit the channels created during the authentication process. So if your UFD can authenticate you without creating any signals to the host computer, then it is surely the best option that you should take.
Same thing for hardware encryption, if you will use a UFD that implements this technology then your business files will surely be safe from any attacks or eavesdropping. The encryption key will also be hard to capture since the USB encryption process is done in a dedicated processor inside the UFD.
Knowing how hardware authentication and encryption can protect your company files will surely bring added confidence in using UFDs. It can even change your corporate policies regarding these storage devices especially if the upper management sees that the security can maintain the reliability and integrity of their data assets.