Hiddn KRYPTODISK Hızlı Kurulum Kılavuzu - Sayfa 2

Depolama Hiddn KRYPTODISK için çevrimiçi göz atın veya pdf Hızlı Kurulum Kılavuzu indirin. Hiddn KRYPTODISK 2 sayfaları.

Safeguarding your data anywhere
WHAT
We provide hardware-based encryption solutions for data at rest. With our encrypted
products you are guaranteed the right level of confidentiality, integrity and availability
for sensitive information.
We provide a solution that enables people to bring data and access centralized
content regardless of time, place and network. Hiddn Solutions is your guarantee for
the right level of confidentiality, integrity, and availability for sensitive information.
Our patented encryption technology ensure the best data protection and rights
management. We deliver the world's most secure memory stick and hardware based
encryption for laptops. The combination empowers and protects your workforce when
working outside the office.
HOW
Our technology fall within the segment of full drive encryption products and is applied
on encrypted hard drives, encrypted USB sticks and encrypted USB drives.
Hiddn's technology offers unparalleled authentication and secure key handling features
and differ from other hardware encryption solutions in that the key is deleted when the
storage device is without power. The encryption key is stored encrypted on the chip of
a separate smart card and is only transferred to the device following a proprietary
process of two-factor authentication and encrypted key transfer.
The administration of our secured products are made simple with an "easy to use" Key
Management System.
 TECHNOLOGY APPROVED AND IN USE BY NATIONAL SECURITY AUTHORITIES
 ENCRYPTION KEYS STORED EXTERNAL ON A SMART CARD
 TWO-FACTOR AUTHENTICATION
KRYPTODISK
ENCRYPTED EXTERNAL
USB 3.1 SSD 1 TB
FIPS 140-2 LEVEL 3
WHY
Cybersecurity is getting increasingly complicated, with attackers continuously
finding new ways to achieve their goals. As a consequence, the market is turning to
data encryption as a part of the solution.
40 % of all data leakages happen through lost or stolen devices. Data lost through
devices comprise both data stored directly on the device as well as network data
accessed through the device. To prevent unauthorized access on devices like PCs,
USB sticks and other mobile drives the devices needs to be secured.
COCRYPT
ENCRYPTED MEMORYSTICK
64 GB
FIPS 140-2 LEVEL 3
SAFEDISK
ENCRYPTED INTERNAL SSD
500 GB
2,5"", 7mm