SAN JOSE, Calif., Aug. 6, 2012 Building on its heritage of expertise in embedded encryption solutions, Enova Technology (http://www.enovatech.net/) today announced ...
According to NTI, Ninja complies with the Advanced Encryption Standard (AES). The 128-bit AES encryption algorithm prevents brute force attacks of user’s private storage areas while providing free ...
Algotronix provides AES encryption over USB with new reference designs Algotronix Ltd., Edinburgh, UK has announced the availability of a reference design that provides Advanced Encryption Standard ...
Flash drives, or thumb drives, are portable devices that provide easy access to flash storage. Commonly used to take backups, transfer files between devices, and install operating system images, these ...
Save $16.53 on the FIPS-certified Kingston Ironkey Vault Privacy 50 USB flash drive, featuring hardware encryption and ...
If you've like me you probably have handfuls of USB flash drives on your desk at any one time. But how many of those flash drives have built-in data encryption? How many can carry on working after ...
When the IBM PC was new, I served as the president of the San Francisco PC User Group for three years. That’s how I met PCMag’s editorial team, who brought me on board in 1986. In the years since that ...
"Just encrypt it!" seems like a simple way to protect data, especially on laptops. It does protect data, but it's not necessarily so simple. Save time (and maybe your data!) with these practicals of ...
Kingston has today taken the wraps off its new line of secure USB drives, the DT4000, which is equipped with military-grade encryption. The new range includes the ...
Encryption is never out of the spotlight in this industry, but the methods that businesses can deploy to encrypt their data are wide-ranging. Daniel Brecht examines the pros and cons of the various ...
USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results