Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Spyrus Strengthens USB Drive Encryption

    By
    Cameron Sturdevant
    -
    February 23, 2011
    Share
    Facebook
    Twitter
    Linkedin

      Spyrus has entered the commercial USB encrypted drive fray girded with an encryption algorithm that is more sophisticated than competing products.

      The PocketVault P-384 uses elliptic curve cryptography as put forward by the NSA (National Security Agency) called “Suite B.” Suite B algorithms are published for use in protecting classified and unclassified data that must be shared between agencies. Aside from anything else, the PocketVault is certified as a FIPS 140-2 Level 3 USB flash drive.

      Spyrus is hanging its hat on the relatively stronger Suite B cryptographic protection that uses a newer AES-XTS 256-bit full disk encryption rather than the more widely used AES-CBC code. Even so, tests of this first-version release at eWEEK Labs showed that while the PocketVault is simple to deploy and deft at keeping data secret, there is sparsity of supporting tools for the mobile data product.

      The 8GB PocketVault P-384 is available now and costs $129.55 with volume discounts available.

      For example, competitor IronKey also makes an 8GB, FIPS 140-2 Level 3 USB encrypting drive designated the S200. The personal version lists for $199 and comes with private browsing and password management, in addition to a number of physical protection mechanisms. The enterprise version of the S200 adds a suite of provisioning, remote wipe and backup tools. Spyrus makes the Spyrus Enterprise Management Suite but does not provide an online backup tool for the PocketVault.

      All of the software needed to run the PocketVault on Windows and Mac systems is included on the USB drive itself along with the user guide. The basic operation of the PocketVault is similar to other secure USB drives. Double clicking the launch icon opens a password screen. On first use I created a rather complex password and provided a hint that could be used in the future to jog my memory. While the hint screen didn’t let me use my exact password as the hint, I was disturbed to see that simply changing the case on the letters and substituting the number “1” for an “!” was enough of a change to leave my real password pretty well exposed. Of course, a user who leaves this many hints likely shouldn’t be entrusted with sensitive data. However, I expect security tools to make it harder than the PocketVault did for users to do the wrong thing.

      Once the PocketVault software was running on my system, a second encrypted, secure drive appeared on my computer explorer. I was able to open this directory, copy files and close out the drive to securely move files between systems. Spyrus did a good job of ensuring that the encrypted drive was disabled when I put my test Lenovo W510 laptop to sleep. For my tests, I allowed the PC to wake up without requiring a password. Even in this case, the PocketVault successfully deactivated the encrypted drive, forcing me to restart the PocketVault and re-enter my password to access my encrypted files.

      As with other secure, encrypting USB flash drives, the PocketVault has a number of physical, anti-tamper security devices that automatically lock out access if a forced entry is detected. This includes casing around the drive components. The PocketVault can also use optional antivirus protection from McAfee to block malware entry onto the drive although I would prefer an option to start the encrypted drive in read-only mode to ensure that malware can’t be loaded on the drive. Additionally, if the PocketVault detects more than 10 failed password attempts, the device will permanently block itself.

      Avatar
      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected]

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×