Encryption System supports external eSATA storage devices.
Built on FIPS certified AES 256-bit crypto engine, External CipherChain encrypts just about any external data storage device with eSATA or SATA connection. Insertion of Cipher Key activates encryption and decryption of data on-the-fly with no performance degradation. Full disk encryption encrypts boot sector, partition table, and all information in drive. Featuring rugged metal housing, External...Read More »
Authentication Device offers security for MCU-based systems.
Equipped with 4.5 Kb EEPROM and hardware SHA-256 accelerator, CryptoAuthentication(TM) ATSHA204 authenticates objects, prevents piracy of software or other IP, and protects sensitive data. Internal random number generator can be used in crypto protocols to prevent replay attack. To protect EEPROM content, device includes active metal shield, internal memory encryption, glitch protection, and...Read More »
Trend Micro Expands Data Protection Portfolio to Secure Data from Endpoints to the Cloud
New Data Protection products and services enable customers to benefit from comprehensive, cost-effective and easy-to-use set of DLP, encryption, and device control solutions CUPERTINO, Calif., -- With the release of several new products and services, Trend Micro is furthering its leadership and commitment in data privacy and security by expanding its Data Protection portfolio to help small,...Read More »
Computer Encryption System secures data with physical key.
Designed to secure private data on computer, CipherGuard creates AES-256 encrypted area on computer's hard drive. With CipherGuard plugged in, area appears as another drive in system, and when user unplugs unit, private data is no longer available. No passwords or reboots are required and size of encrypted area is not limited by device.Read More »
Top Metal Stamping Trends of 2020
This white paper provides an in-depth look into metal stamping trends.Read More »
Mobile Data Encryption Software supports all major platforms.
Designed specifically for private mobile communications, cloud-based Mobile Encryption Platform enables integration with all major mobile operating systems, including iOS, Android, and BlackBerry OS with native apps. Incoming and outgoing communications are automatically encrypted at source without need for user intervention. By applying identification and authentication processes based on...Read More »
Encrypted Drive Management Software aids configuration, setup.
Absolute-® Secure Drive is used to manage self-encrypted drives (SEDs) that meet OPAL specifications. With it, IT administrators can configure and set up OPAL SEDs on each computer in their deployment. Then they can administer users, authentication methods, policies, and system maintenance through to end-of-life, all from one unified console. Deployment is possible via integration with existing...Read More »
VeriFone's VeriShield Protect Powers Chase Paymentech's Safetech Encryption Solution
SAN JOSE, CA - VeriFone Systems, Inc. (NYSE: PAY) today announced that Chase Paymentech has incorporated VeriFone's VeriShield Protect end-to-end encryption service as a component of its newly launched Chase Paymentech Safetech Fraud and Security Solutions. VeriFone's VeriShield Protect is designed and has been proven to help merchants reduce the costs of complying with Payment Card Industry...Read More »
Thales nShield Hardware Security Modules Support Microsoft SQL Server 2008 R2
Thales HSMs provide highest level of security assurance and cryptographic key management for database encryption Weston, FL and Cambridge UK - Thales, leader in information systems and communications security and a Microsoft Gold Partner, announces its nShield hardware security modules (HSMs) now provide comprehensive key management and hardware-based cryptography for Microsoft SQL Server 2008...Read More »
Advanced Security Features Now Available with Storage Commander from Empower Software Technologies
Partnership with Payment Processing, Inc. provides Encrypted Card Data Security and Removal of Card Data Storage Features MURRIETA, Calif., Empower Software Technologies, Inc. announces the integration of Storage Commander V4 and V5 with PPI Managed Payer Data and PPI PayMover Encrypted Swipe from Payment Processing, Inc. (PPI), the industry leader in integrated payments. Elements of PPI's...Read More »
Hardware/Software System performs data deduplication.
Offering scalability to over 250 TB, BitWackr 2.1 for Windows and Linux provides OEMs with developmental shortcut to incorporating data deduplication, compression, and/or encryption in their products. Virtual Block Device technology allows BitWackr to remain transparent to applications, operating systems, file systems, and volume managers. Use of PCIe hardware acceleration technologies enable...Read More »
Optimize Your Workforce with Weavix™ by PK Industrial
The Weavix™ platform takes productivity, quality, and visibility to a new level by providing better communication and real-time KPIs. Check out the video to learn more!Read More »