www.secure-it.com.my

Portable Data Storage Devices PDF Print E-mail

MXI Products FAQs

Q: What is at risk?

A: Only you can determine what is actually at risk. If a thief steals your portable data storage device, the most obvious loss is the device itself. Beyond that, the thief will also be able to access and USE any and all information contained in the device. This may include sensitive corporate information, customer account, personal information, personal digital images of yourself or your family, email addresses, passwords and other data that you WOULD NOT want accessed by unauthorized people.

Q: How do I secure data on my portable data storage device?

A: You can practice certain diligence disciplines such as:-

  • keep your data storage device on you at all times.
  • do not use your data storage device in public areas.
  • downplay public usage of such devices so as not to attract unwarranted attention.

Q: I am reliant on the portability of my data storage device. How can I safeguard the data inside it even if the device is not in my possession?

A: The most obvious way is to encrypt the data contained in your data storage device. This will ensure unauthorized persons do not have access to the data stored even if they have possession of the device. Invest in a device with security features. MXI’s secure portable data storage devices come with password protect or biometric authentication or both features. Read more on choosing the right portable security device for you at [create link to article here.

Q: I notice that MXI devices come with on-board 256-bit AES encryption. What exactly does that mean?

A: AES (Advanced Encryption Standard) is an encryption standard adopted by the government of the United States of America. The standard comprises three variants (AES-128, AES-192 and AES-256) of block ciphers (a symmetric key cipher utilizing a class of algorithms for cryptography). 256-bit AES encryption offers the strongest protection of data available in a FIPS validated encryption algorithm. Indeed, AES 256-bit encryption meets the minimum standards for the most data sensitive environments.

Q: FIPS? Whats that?

A: FIPS is Federal Information Processing Standardisation. It is the U.S. government’s computer security standards that specify requirements for cryptography modules. FIPS validation signifies recognized compliance with such standards.

FIPS validation is challenging to achieve both technically and fiscally. There is a standardized battery of tests as well as an element of source code review that must be passed over a period of several days. The cost to perform these tests through an approved laboratory can be significant and does not include the time it takes to write, test, document and prepare a module for validation. After validation, modules must be resubmitted and reevaluated if they are changed in any way.

Q: I recognize the critical importance of MXI’s security devices for my organisation. Can I manage all the devices remotely from a control center in my organization?

A: ACCESS Enterprise Device Lifecycle Management is a software suite that enables your employees to be given remote access without compromising security and allows you to oversee and manage the devices that are deployed. ACCESS Enterprise will allow your organization to:-

  • know who is carrying what device.
  • tailor authentication policies to the needs of different groups of users in accordance with their role and operating environment.
  • have one central point to provision digital credentials.
  • control the set of applications that are appropriate for different groups of users.
  • remotely destroy data.
  • rescue blocked users.
  • perform audit on stored information even without the user being present.
  • reuse/recycle the devices and reissue them to other users.
 

Did You Know

arrow Identity theft is the top consumer complaint in the USA according to the Federal Trade Commission.

arrow US consumers reported fraud loss totalling more than $1.1 billion in 2006.

arrow Credit card fraud (25%) was the most common form of reported identity theft in the US in 2006.

arrow More than 100 000 people are affected by identity theft each year in the UK

arrow According to Privacy Rights Clearinghouse, more than 350 data loss incidents involving more than 140 million records have occurred since February 2005

arrow Organisations are obliged by law to take take adequate steps to ensure the proper disposal of data


mxi-3devices0
You are here  :