Media & Resources

Embedded Software-Free Authentication vs. Software Host-Based

  • 06-26-2015
  • Store Owner

Summary:

 

In any market where IP owners value the security and safeguarding of data, it may be preferable to move files on encrypted flash drives rather than over the public Internet and well-traveled networks. Such flash drives will let the user authenticate his or her identity either with software via an application that runs on the host system or without software. Both approaches have their respective pros and cons. In this paper, we will explore the merits of both flash drive models and recommend which user priorities will be best aligned with each drive type.

New Feature Spotlight:
Forced Enrollment

  • 06-26-2015
  • Store Owner

What is Forced Enrollment

Generally speaking, the weakest links in any data security plan are the access codes or PINs. It’s common knowledge that PINs that are too simple are about as effective as having no PIN at all. Forced Enrollment focuses on a different PIN weakness. One that stems from devices shipped with factory preset PINs. While factory preset PINs are common and widely used, there exists a very real opportunity to skip the factory PIN replacement step and put these drives into service with publicized PINs still enabled to authenticate them. Most people know that the preset PIN has to be changed at initial setup, but surprisingly, there are a few who don’t. To ease the minds of CISOs everywhere, we’ve sidestepped this potential vulnerability by eliminating the factory-preset PIN on the Secure Key 3.0 altogether. And since all of the Secure Key’s use and setup requires a 7-16 digit PIN to unlock it, the establishment of a unique admin PIN has to happen first, which is exactly what Forced Enrollment ensures. Simply put, we’ve taken the critically important security measure of unique PIN creation a step further by forcing this process to the very front of the Secure Key’s setup.

New Feature Spotlight:
Dual Read-Only Modes

  • 05-28-2015
  • Store Owner

Why is "Modes" Plural?
Because the Secure Key 3 has a separate Read-Only mode for both the Administrator as well as the User, expanding its functionality after deployment in the field. Prior to deployment, the Secure Key's Admin can set the drive to be Read-Only. After deployment, the User can also set the drive to Read-Only as well.

Portable storage for the paranoid: We test two secure USB drives on keypad vs. software security

  • 04-06-2015
  • Store Owner

Congratulations: You’ve decided your data is sensitive enough (or you’re paranoid enough) to store it on a secure USB drive. Basically encrypted storage on a stick, these portable flash drives...read full articlepc world logo

Aegis Secure Key 3.0 - Another Upgrade from Apricorn. More Secure Than Fort Knox?

  • 03-30-2015
  • digital reviews

digitalreviewslogoWe highly recommended that little critter for its security in such a tiny USB key package...this time around it sports USB 3.0, it's a bootable drive and Read Full Article

9 security gadgets for mobile devices

  • 03-30-2015
  • Computer World

Apricorn Aegis Secure Key 3.0

Left your tablet in the cab?
With enough time and the right
skills, someone could access that
data, even if it's password-protected... read full article

New Feature Spotlight:
Programmable Brute Force

  • 03-21-2015
  • Store Owner

What is Programmable Brute Force?
After a programmable number (up to 20) of incorrect PIN entry attempts, the Aegis Secure Key will conclude that it is under Brute Force Attack and will respond by performing a crypto-erase – deleting the encryption key which will render all of the key’s data useless.

New Feature Spotlight:
Lock Override

  • 01-29-2015
  • Store Owner

What is Lock Override?
 
For security reasons all of our Aegis Secure Drives are designed to automatically lock when they sense a re-enumeration signal from the host.
 
For example, this default setting would prevent a secure drive that is plugged into a powered USB hub, from having the hub plugged into another host without the secure drive locking.

NJ law requires health insurance carriers to encrypt sensitive data

  • 01-13-2015
  • SC Magazine

On Friday, New Jersey Governor Chris Christie signed the legislation which says that health insurance companies “shall not compile or maintain computerized records that include personal information...

read article

Executives concerned about cloud security, report shows

  • 01-13-2015
  • SC Magazine

The security of data in the cloud is a top executive-level concern, according to the “Cloud Adoption, Practices and Priorities Survey Report,” which was released by the Cloud Security Alliance (CSA) on Friday...

read article

21-30 of 79