Digital Edition

SYS-CON.TV
New Portable Encryption Device Protects From Cyber-Gangsters
Users Can Move Seamlessly Between All Desktops

Memory Experts International (MXI), a leading provider of secure, portable data storage devices, is debuting Stealth, a 3x3.5 inch, USB with a 256 Bit AES hardware encryption engine that delivers the ability to move, seamlessly, from one desktop to another, regardless of the operating system, manufacturer, location, or connection to a private or public network.

In development for the last 12 months, Stealth, with its on-board CPU and hardware based cryptographic engine, is completely self-sufficient and works on Windows 2000, XP (Pro & Home), MAC and Linux systems. Biometric fingerprint password authentication occurs within the device and the authentication data never leaves Stealth. This feature offers superior security than traditional products, which require the host PC to capture and process biometric and password samples. Saved data is stored either on flash memory or on a micro drive providing data storage ranging from 64MB up to 4GB.

"Cyber thieves are on a major e-crime wave the world over," said Mike Kieran, director of sales and marketing for MXI. "North America and Europe are being especially targeted, and the US is most vulnerable as encrypted desktops and devices run in the low single digit percentages," he added. "Our best defense is to deny access to important data through the use of portable encrypted devices such as Stealth," said Kieran.

The Honeynet Project estimates that over a million internet-connected computers, the majority of which are running Windows XP and Windows 2000 are compromised and open to mass ID theft. The research completed in March 2005, revealed the tracking of more than 100 botnets in four months and that some of the larger zombie networks were comprised of up to 50,000 hijacked machines that were using a Honeynet.

"Stealth meets all off the requirements that our customers in the military, banking and large corporations have asked for, it's driverless, stand-alone, and offers hardware-based encryption with on-board authentication and encryption," said Kieran.

Using MXI's Secure Storage SDK, third party developers can leverage the advanced secure storage and authentication features of Stealth for their own applications, such as strong authentication, digital identities, single sign-on, and data security. Additional features include zero footprint device usage, biometric (fingerprint) security access , 4-40 character password, on board CPU and hardware based crypto engine, and storage capacity of 64MB to 4GB Flash or 2GB micro drive.

About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

The need for greater agility and scalability necessitated the digital transformation in the form of ...
ChatOps is an emerging topic that has led to the wide availability of integrations between group cha...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an over...
The cloud era has reached the stage where it is no longer a question of whether a company should mig...
While some developers care passionately about how data centers and clouds are architected, for most,...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting ch...
"Since we launched LinuxONE we learned a lot from our customers. More than anything what they respon...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know ...
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every ...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily ...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection...
"As we've gone out into the public cloud we've seen that over time we may have lost a few things - w...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Ser...
Sanjeev Sharma Joins June 5-7, 2018 @DevOpsSummit at @Cloud Expo New York Faculty. Sanjeev Sharma is...
We are given a desktop platform with Java 8 or Java 9 installed and seek to find a way to deploy hig...
"I focus on what we are calling CAST Highlight, which is our SaaS application portfolio analysis too...
"Cloud4U builds software services that help people build DevOps platforms for cloud-based software a...
The question before companies today is not whether to become intelligent, it’s a question of how and...
Kubernetes is an open source system for automating deployment, scaling, and management of containeri...