securedUSB™ Copy-Protected Drives

Deliver up to 5 Steps of Data Security

STEP 1

256-bit AES Password
Protection and Data Encryption

 

• 256-bit encrypted password protection

• 2-way authentication process

• password entry is limited to the access

   and decryption of data

• audit trails

STEP 2

Data Fencing: Passive, Vigilant
Data Protection and Security

 

• securedUSB™ Copy Protection

   technology on USB drives prevents

  data transfers via email, copy, print,

  screencaptures, P2P, social media,

  and other ways to leak data

securedUSB™ Optional Data Fencing Technology Includes:

STEP 3

Centralized Data Management

 

• create/manage data containers on securedUSB™ server

• enjoy real-time monitoring and control

• perform audit and reporting procedures easily

STEP 4

Central Policy Management, Self-Destruct, and Remote Data Wipe

 

• configure personal security settings based on organizational policies

• self-destructs/remote wipes data in the event that a securedUSB™

   flash drive goes missing or is stolen

STEP 5

256-bit AES Encrypted Data Transfers (securedUSB™ SecureNet)

 

• controlled environment ensures secure transfers from a Secure Data Container

   to a securedUSB™ copy-protected USB flash drive

• Certification Code Authentication validates securedUSB™ flash drive

                               securedUSB™ copy-protected drives offer up to 5 steps

                               of data security. Optionally, securedUSB™ they may also be configured with management features for policy and local/remote administrative control.

 

financial organizations represent

37%

of all data
breaches, the most of any vertical.

 

source: Verizon 2013 Data Breach Investigations

Home > securedUSB™ Copy-Protected Drives Deliver up to 5 Steps of Data Security

STANDARD

WITH ICP

SERIES

STANDARD

WITH ICP

SERIES