According to NTI, Ninja complies with the Advanced Encryption Standard (AES). The 128-bit AES encryption algorithm prevents brute force attacks of user’s private storage areas while providing free ...
Algotronix provides AES encryption over USB with new reference designs Algotronix Ltd., Edinburgh, UK has announced the availability of a reference design that provides Advanced Encryption Standard ...
SAN JOSE, Calif., Aug. 6, 2012 ­ Building on its heritage of expertise in embedded encryption solutions, Enova Technology (http://www.enovatech.net/) today announced ...
Flash drives, or thumb drives, are portable devices that provide easy access to flash storage. Commonly used to take backups, transfer files between devices, and install operating system images, these ...
San Jose, CA " February 23, 2009 " SPYRUS, Inc. today announced Hydra PC Virus Protected (ViP) USB encryption drives incorporating antivirus protection from McAfee' Scan Engine technology. Combining ...
It happened to me once — I lost my small 64GB USB drive I'd used for work. I was pretty sure it had nothing too important in it. But then I started wondering… what if it contained some sensitive files ...
USB Phone 2 PC-Advanced Edition with Encryption offers recordings that are made in an encrypted format that is virtually impossible to break. A user-defined password provides a second layer of ...
The Gizmo USB flash drive operates to 480 Mbits/s and includes software for password protection and data encryption. The device measures 66.5 x 16.5 mm, so multiple drives fit into neighboring USB ...
FREMONT, CA, July 27, 2006 — Lexar Media, Inc., a leader in advanced digital media and accessories, today announced that it has begun shipping its speed-rated JumpDrive Lightning USB Flash drive with ...
A USB drive that stores encrypted data. The encryption may be performed by third-party encryption software or the software that comes with the drive. In either case, the software is configured to ...
Encryption software is a technology that uses cryptographic algorithms to convert plain text or data into ciphertext, rendering it unintelligible to unauthorized individuals. The encryption process ...
If you've like me you probably have handfuls of USB flash drives on your desk at any one time. But how many of those flash drives have built-in data encryption? How many can carry on working after ...