The disk G is a secure, compact & affordable USB (Universal Serial Bus) 2.0 hard drive, employing PIN code access
Key Features
Secure access with personalised 6-16 digit PIN
Encrypts all data on the fly, as fast as any USB (Universal Serial Bus) 2.0/3.0 hard drive
Admin feature Â- set 1 Admin & up to 10 user PIN codes
Utilises FIPS PUB 197 Validated Encryption Algorithm
Guaranteed with 3 year warranty
Portable Encrypted Hard Drive with Secure PIN code access
The disk G is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM.
ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive.
Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure.
Why choose disk G?
Did you know that tens of millions of external data storage devices are lost every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB (Universal Serial Bus) flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on You Tube, your business data sent to a competitor, your personal & financial information used for fraudulent purposes.
The Information Commissioner’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This
Includes:: the loss of an unencrypted portable hard drive or USB (Universal Serial Bus) flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise.
Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media focus. The disk G can protect you against all of this.
Once access to the disk G is granted by entering the correct 6-16 digit PIN, data can be copied to the disk G using any off the shelf backup software, or simply drag & drop files & directories using Windows Explorer. Once the disk G is disconnected, all data is encrypted & cannot be accessed unless the correct PIN is entered.
Military strength Hardware encryption
The encryption chipset incorporated within the disk G encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The disk G is the only USB (Universal Serial Bus) hard drive to be awarded the CESG CCTM government accreditation. The disk G also utilises FIPS PUB 197 validated Encryption Algorithm.
The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “ The design & strength of all key lengths of the AES algorithm (i.e. 128, 192 & 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.”
Brute Force Hack Defence Mechanism
The disk G uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected & then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the disk G assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset & reformat to redeploy the disk G.
VTC Technology
The disk G also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating disk G*’s electronics.
What is the difference between software & hardware encryption?
Software encryption:
Complex passwords can be cracked easily & quickly with a Brute Force Attack
Simple password cracking software is readily available on the internet, often free of charge
Software encryption is vulnerable to key loggers Â- where every key pressed is logged in either a software or hardware key logger
Software encryption can be corrupted by viruses
Software encryption is much slower when compared to hardware encryption
Software encryption needs to be installed on each computer that the external storage device is used on
Hardware encryption:
The disk G cannot be brute force attacked
The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard
The disk G is not vulnerable to malware or viruses
Encryption is performed in real-time thus there is no speed degradation
No software or drivers are required