Available in 4GB, 8GB, 16GB and 32GB2 capacities, the Toshiba
Encrypted USB Flash Drive uses a built-in mini- keyboard to authenticate access, incorporating a rechargeable battery so the user can enter a secure code before plugging into a USB port.
Those new to the world of
encrypted email services will find there's no learning curve with Mail1Click.
There are already a number of methods for searching data in an
encrypted state, but these rely on pre-registering searchable keywords, and do not allow for freeform searching.
Beyond the keys being split between the customer and Porticor, the unique part of the solution is the keys themselves are
encrypted by the customer's master key, which only the customer holds and knows.
The government had insisted it would block some Black- Berry services after August 31, if RIM did not address its security concerns and let security agencies intercept its
encrypted services.
The security of
encrypted data depends on several factors such as the type of algorithm used in encryption, the key size and the actual implementation of the algorithm.
Lee Bevan, managing director of Leapfrog, told Sky News: "We put the disc in the drive to see what it was, but it was
encrypted."
This involves developing a WAN infrastructure that ensures specific content security, not just network perimeter security, and can efficiently accelerate
encrypted content without compromising its security or integrity.
Simply changing the encryption key on an
encrypted disk, or more accurately, the key(s) to the
encrypted encryption key, instantaneously and securely renders all stored data unreadable and unusable.
If the data was protected, you would normally encrypt it, and if it was
encrypted you wouldn't care if it was lost.
Users can create any number of
encrypted safes to store sensitive data, each one with a capacity of up to 256 GB.