Encryption Systems

Internet Software

NTT and Mitsubishi Electric Develop Advanced Encryption Scheme to Increase Cloud Computing Security

Tokyo, July 28, 2010 - Nippon Telegraph and Telephone Corporation (NYSE: NTT, NTT") and Mitsubishi Electric Corporation (TOKYO: 6503, "Mitsubishi Electric") today announced that they have developed a new advanced encryption (fine-grained encryption) scheme expected to become a potential solution to the security risks in cloud computing. This new encryption scheme achieves the most advanced logic...

Read More »
Encryption Systems

Semtek and RBS WorldPay Enter Into Agreement for End-to-End Security

Semtek to Provide Security Infrastructure to Support Encryption Solutions SAN DIEGO, -- Semtek announced today it has entered into a multi-year agreement with RBS WorldPay, the U.S.-based payment processing division of The Royal Bank of Scotland Group plc, and a leading global payments provider, to supply the merchant acquirer with end-to-end security services and infrastructure for RBS WorldPay...

Read More »
Notebook Computer Card provides external drive encryption.
Encryption Systems

Notebook Computer Card provides external drive encryption.

CipherChain ExpressCard allows notebook users to secure external hard drive/SSD with AES 256-bit hardware encryption. Designed to be installed into notebook's ExpressCard 34/54 slot, unit adds eSATA port that encrypts any external eSATA hard drive or SSD when Cipher key is inserted. Port can also provide USB power to operate low power devices. Multiple keys are available with same key codes and...

Read More »
Data and Database Management Software

Deduplication System meets application, nearline storage needs.

BitWackr(TM) B1605R delivers inline, block-level deduplication, compression, encryption, and thin provisioning for Linux and Windows NAS appliances as well as strategic Microsoft applications such as SharePoint, Exchange, and Data Protection Manager. With additional supports for Windows Server 2003/2008 environments, solution focuses on data reduction for application and nearline storage....

Read More »
A Guide to Quality Control of the SMT Process
Sponsored

A Guide to Quality Control of the SMT Process

The printed circuit board (PCB) manufacturing process begins with cutting-edge equipment capable of accurately picking and placing up to 40,000 components per hour. This innovative equipment keeps error rates extremely low, and those defects that do occur are quickly caught by sensitive laser and optical inspection equipment.

Read More »
Miscellaneous Software

Security Software turns USB flash drive into personal vault.

With Encrypt Fox v1.00, users can create unlimited invisible encrypted vaults on unlimited number of computers, CDs, DVDs, or removable hard drives. Military wipe function renders no footprint once file has been deleted from host computer. Acting as personal key to computer, program provides protection from identity theft, viruses, hackers, and phishers. Software runs only from USB flash drive...

Read More »
Data and Database Management Software

Data Protection Software suits Mac and Linux enterprise users.

Providing whole disk encryption, PGP® Desktop enables client compliance across all major desktop operating system environments, including Windows, Mac OS X, Ubuntu Linux, and Red Hat Linux. Program supports Boot Camp, so users can have complete protection for machines running dual Mac OS X and Windows environments. Optimized for solid state drives, software includes encrypt and sign button...

Read More »
Media Drives

Mobile Armor Announces General Availability of DriveArmor v3.0 - Centrally Managed Self-Encrypting Drives

Data Encryption Provider Teams with Seagate to Deliver Self-Encrypting Disk Drives for Desktop and Laptop Computers ST. LOUIS, -- Mobile Armor, Inc., a leader in data protection and encryption, today announced the general availability of DriveArmor(TM) v3.0, an enterprise-class solution for access control and managing security on laptop and desktop computers with groundbreaking 2.5-inch...

Read More »
Card Readers

Authenticators are based on public key infrastructure.

Suited for local and remote access to corporate network and applications, DIGIPASS® KEY 200 consists of USB device with PKI smart card and secure USB mass storage on single device. DIGIPASS® KEY 860, adapted for banking environments, combines smart card ID device, OTP authenticator, and secure USB storage. Both offer PKI-based digital signature for emails or transactions, encryption...

Read More »
Encryption Systems

Inline Encryptors meet government encryption demands.

Providing FIPS 140-2 Level 2 encryption, 3e-636S Series supports mission-critical demands of civilian and military government applications. Devices enable Federal agencies seeking to deploy Secure WLANs to comply with Federal regulations, including DOD 8100.2. While 3e-636S-2 is complete plug-and-play cryptographic module that connects to network via Ethernet port, 3e-636S-1 is component that can...

Read More »
Miscellaneous Software

IBM Introduces Products and Services to Combat New Security Threats

New Services, Software and Hardware from IBM drive greater visibility and security for Cloud computing, Data and Web applications SAN FRANCISCO, April 21 -- Today, at the RSA Conference, IBM (NYSE:IBM) introduced new services, hardware and software aimed at improving the security of cloud computing environments, helping ensure the confidentiality of data and helping locking down applications from...

Read More »

All Topics