|By PR Newswire||
|February 27, 2013 11:30 AM EST||
POWAY, Calif., Feb. 27, 2013 /PRNewswire/ -- Apricorn (www.apricorn.com), a leading manufacturer of secure encrypted USB drives for government, healthcare and business today announced its FIPS 140-2 Level 3 validation for the Aegis Secure Key. The encrypted flash drive incorporates secure PIN authentication via an embedded keypad and 256-bit AES hardware encryption, providing 100% hardware based security solution.
Required for all devices procured by the US government that utilize cryptography, the Aegis Secure Key's FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. The Aegis Secure Key's FIPS 140-2 Level 3 certification encompasses all areas including the Aegis Secure Key's physical tamper-resistant features as well as its identity-based authentication.
The Aegis Secure Key FIPS validation covers multiple layers of data protection:
- Military grade AES CBC 256-bit hardware encryption – protects 100% data in real time
- Alphanumeric keypad – Onboard keypad prevents hardware and software key logging
- 7-15 digit PIN code access – Up to 15 digit memorable number or word
- Software Free Design – Cross platform compatible, and no Administrator Rights required
- Tamper resistant – Epoxy resin destroys circuit board components if tampered with
- Tough, water resistant design – Sealed extruded aluminum casing protects from dust and water
- Auto-lock on loss of power or ejection to prevent unauthorized access
- Brute Force Attack Defense Mechanism – Crypto erase after 10 consecutive failed entries
- Encryption keys are randomly generated
- OS/Host independent – Compatible with Windows, Mac, Linux, Chrome, Android and Symbian
- Available in 4, 8, 16 and 32GB capacity (32GB validation pending)
The Aegis Secure Key does not employ software, either for its authentication or encryption, and uses an onboard keypad to unlock the drive before connecting to a USB port. This hardware based authentication ensures that key loggers are unable to capture the password via a keyboard. This is coupled with the Aegis Secure Key's Brute Force Attack Defense Mechanism, a security measure that performs a crypto erase that destroys the encryption key when the PIN is incorrectly entered 10 consecutive times.
"Already deployed by many businesses as part of their data loss prevention (DLP) strategy, the Aegis Secure Key's FIPS validation offers confirmation for corporate America, and also for those in the government and the military, that our design and encryption implementation are secure," said Mike McCandless, VP of Sales and Marketing. "With thousands of unencrypted USB drives going missing every year and security threats from key loggers and malware, it is imperative that companies look to hardware based authentication and encryption to protect their data. The Aegis Secure Key provides that."
Securing FIPS 140-2 Level 3 validation means that Apricorn's Aegis Secure Key has passed rigorous testing conforming to CAVP (Cryptographic Algorithm Validation Program) and the CMVP (Cryptographic Module Validation Program) by a certified third-party laboratory. The Aegis Secure Key's FIPS 140-2 validation has been listed by the US National Institute of Standards and Technology (NIST) under certification 1876.
Apricorn's Aegis Secure Key is available from online retailers and Apricorn's website at http://www.apricorn.com/securekey
4 GB: $65
8 GB: $95
16 GB: $125
32 GB: $179** (validation pending)
3 year limited
High Resolution Image
Works with virtually any powered USB port, and fully compatible with Microsoft Windows, Apple Mac computers and Linux, as well as Symbian and Android powered tablets and smartphones.
Apricorn, a leader in personal storage, has provided secure storage solutions for some of the most prominent names in the industries of finance, healthcare and government. Apricorn's products have become the standard for many mobile security strategies. Apricorn was founded in 1983 and has developed numerous award winning products under the Apricorn brand and has been an OEM supplier to a number of leading computer manufacturers. Apricorn is headquartered in Poway, California, and distributes products throughout North America and Canada. For additional information please visit http://www.apricorn.com.
Further information on FIPS 140-2 Level 3 certification can be found at http://www.nist.gov
Aegis Secure Key incorporates DataLock® Technology licensed from ClevX, LLC
One gigabyte (GB) = one billion bytes; accessible capacity will be less and actual capacity depends on the operating environment and formatting.
All trademarks are the property of their respective owners.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 27, 2016 05:30 AM EDT Reads: 1,145
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 27, 2016 05:15 AM EDT Reads: 1,443
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 27, 2016 05:00 AM EDT Reads: 3,565
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Sep. 27, 2016 04:45 AM EDT Reads: 1,138
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 04:30 AM EDT Reads: 1,961
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 27, 2016 04:15 AM EDT Reads: 2,067
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 03:45 AM EDT Reads: 2,578
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Sep. 27, 2016 03:00 AM EDT Reads: 2,937
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 27, 2016 03:00 AM EDT Reads: 2,770
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Sep. 27, 2016 03:00 AM EDT Reads: 1,802
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Sep. 27, 2016 02:15 AM EDT Reads: 3,047
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Sep. 27, 2016 02:15 AM EDT Reads: 1,602
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Sep. 27, 2016 02:00 AM EDT Reads: 1,728
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Sep. 27, 2016 02:00 AM EDT Reads: 1,733
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Sep. 27, 2016 01:45 AM EDT Reads: 1,296
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
Sep. 27, 2016 01:30 AM EDT Reads: 1,856
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Sep. 27, 2016 01:15 AM EDT Reads: 2,004
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 27, 2016 12:30 AM EDT Reads: 1,638
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Sep. 27, 2016 12:00 AM EDT Reads: 1,055
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
Sep. 27, 2016 12:00 AM EDT Reads: 1,543