Hardware encrypted for compliance and security

Hardware encrypted for compliance and security

Share post

A specialist in hardware encrypted USB drives introduces the latest generation of the Sentry product line. The Sentry 5 series storage solutions comply with the new FIPS-140-3 Level 3 profile, a further development of the US security certification FIPS 140-2, which is also known in Europe.

The requirements for physical security against manipulation and identity-based authentication have been increased again. For example, important security parameters are constantly checked during operation. Sentry 5 is already listed on the “Modules in Process List” of the US National Institute of Standards and Technology (NIST). Final certification is expected shortly (https://csrc.nist.gov/Projects/cryptographic-module-validation-program/modules-in-process/Modules-In-Process-List).

Hardware-based AES encryption

All Sentry 5 USB flash drives also include a range of general security and performance features that can help meet compliance standards such as CMMC, HIPAA, SOX, SOC2, ISO 27001, NIS-2, CCPA and GDPR/GDPR. For example, hardware-based AES 256bit encryption in XTS mode ensures secure storage of data. A write protection function can be used to prevent data loss and compliance violations caused by any ransomware attacks. The password is protected against brute force attacks, which provides additional security against unauthorized access to sensitive data and enables optimal access control. Sentry 5 complies with the Trade Agreements Act (TAA) and is therefore also suitable for use in government agencies and in connection with public contractors. In addition, the supply chain of the fifth generation Sentry series has been recognized as trustworthy by NATO.

“Drives like Sentry 5 are used by companies and organizations when secure data transport via USB storage is an integral part of the work process and high compliance requirements must be met,” explains Konstantin Fröse, EMEA Account Executive at DataLocker. “The latest generation offers an even higher level of security thanks to FIPS-140-3 Level 3 certification. Thanks to a wide range of storage capacities offered up to a variant with 512 GB, Sentry 5 can also cover very different application scenarios.”

Mandatory central management

Sentry 5 is only available as a mandatory managed version. USB device management is carried out via the SafeConsole administration solution, which is available as a cloud service or on-premises installation. Central management ensures that USB drives permitted for use can only be used if the configured security policies are reliably enforced.

With the SafeConsole, for example, functions and features such as configuring and enforcing security policies, auto-inventory, audit reports as well as additional functionalities such as recovering forgotten passwords and remotely locking or wiping stolen or lost drives can be used (this can be done, for example, with be helpful to employees who have left). The USB ports can also be managed via SafeConsole (additional PortBlocker license required), so that only authorized drives - for example the Sentry 5 - can be used on Windows and Mac PCs.

Zero touch deployment

Rolling out encrypted USB drives, including integration into central administration, can be time-consuming depending on the size of the organization. To address this, DataLocker offers so-called “zero-touch deployment” as part of its professional services. The drives are delivered preconfigured for each customer's application in order to keep the effort for administrators and users as low as possible. In addition, the serial number printed on the outside matches the internal one to simplify inventory and configuration of DLP solutions.

Sentry 5 is approximately 80 x 20 x 10mm in size and has a zinc-metal housing. With this housing, which is filled with epoxy resin to protect it from manipulation, a weight of approx. 50 grams is achieved, which shows how massive and stable the drive is. Sentry 5 is IP68 certified and therefore dust and waterproof up to 2,0 meters water depth. MIL-STD-810F certification has been awarded for drops, shock and vibration. The drive is connected via USB 3.2 Gen 1 (Type A). A USB-C adapter is optionally available. Sentry 5 also comes in environmentally friendly, plastic-free packaging.

More at Datalocker.com

 


About DataLocker:
DataLocker is an American manufacturer of USB security solutions. The portfolio includes secure, encrypted USB drives as well as the central management solution SafeConsole, which can be used to manage both USB drives and USB ports. DataLocker's customers primarily include large, regulated companies as well as institutions, authorities and government organizations.


Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more