12 USB Thumb Drives Keep Your Data Secure - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Business & Finance

12 USB Thumb Drives Keep Your Data Secure

Keep your important files mobile but safe with these USB thumb drives -- most under $100 -- from Kingston, SanDisk, Lexar, Imation, and more, which offer enhanced protection via encryption, biometrics, and self-destruct mechanisms.

Updated 3/4/08.

Many people have already discovered the convenience of using USB thumb drives to shuttle information between home, office, vacation, and other locations. But with convenience comes risk. What can be done to ensure that enterprise data remains safe even if a drive is lost?




Kingston DataTraveler Elite Privacy
(click for image gallery)

USB-drive vendors offer a wide range of "secure" devices, addressing the demand for a more secure sneakernet. Here are a few things to look for:

  • Authentication: Password, biometric, or both? If password, how long can the password be? How insistent is the software in enforcing strong passwords and rotating passwords? How many unsuccessful attempts can a user make to enter a password before the device erases itself?

  • Encryption: Does the device itself offer encryption, or does the password simply prevent the drive from being mounted through ordinary channels? How strong is the encryption? The current standard is AES 256-bit encryption, although some consumer-oriented devices still offer 128-bit.

  • Road-worthiness: Depending on your security needs, this may be either a feature or a failing. Some secure USB drives require the ability to run applications on the host computer. In locked-down computer labs and Internet cafés, these USB drives that depend on built-in software may not work at all.

We have selected 12 representative USB drives that illustrate the variety of choices in the marketplace. Remember that just because you're carrying a "secure" USB drive doesn't mean that when you plug it into a strange computer (or your own) that you're inoculated against worms, viruses, keystroke logging software, DRAM attacks, and other scary critters from the bestiary of information security. Be careful out there!

1
Kingston DataTraveler Elite Privacy

Storage Capacity: 1 Gbyte, 2 Gbytes, 4 Gbytes, or 8 Gbytes
Casing: Titanium-coated stainless steel, waterproof
Encryption: Hardware-based 256-bit AES encryption
Special features: Encryption co-processor
Speed: 24-Mbps read, 10-Mbps write
Price: $87 / $128 / $191 / $327

The Kingston DataTraveler Elite Privacy (DTEP) comes shipped with 100% encryption across the entire USB drive. Any files stored on the device will be automatically encrypted by the hardware; conversely, files copied onto a host computer will be decrypted.

Because the encryption doesn't require an application on the host PC, DTEP can be used at locations such as an Internet cafés, where there's no expectation of having Windows administrator access.

Upon using DTEP for the first time, the user is asked to create a password containing from six to 16 characters, with a sufficient number of mixed-case and special characters. After 10 incorrect password attempts the drive will no longer function without reformatting. Users can also enter contact information accessible from the logon screen.


2
Kanguru Bio AES

Storage Capacity: 1 Gbyte, 2 Gbytes, 4 Gbytes, or 8 Gbytes
Casing: Standard
Encryption: 256-bit AES encryption
Special features: Fingerprint reader combined with password for two-factor authentication
Speed: 10-Mbps read, 5-Mbps write
Price: $80 / $100 / $130 / $180

The Windows-compatible Kanguru Bio AES includes a fingerprint reader as the second of two layers of authentication.

Upon connecting the device, the Kanguru BioLock application will prompt the user to enter a six-character password and a swiped fingerprint. Up to 10 fingers can be enrolled. While the manual recommends use of mixed-case characters, numbers, and symbols, the software does not enforce these recommendations.

Once connected, BioLock aims to be your replacement for Windows Explorer. While it's possible to drag-and-drop to the Bio AES, users are strongly encouraged to use the BioLock interface to move files, so as to more efficiently perform encrypt/decrypt functions.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Commentary
Augmented Analytics Drives Next Wave of AI, Machine Learning, BI
Jessica Davis, Senior Editor, Enterprise Apps,  3/19/2020
Slideshows
How Startup Innovation Can Help Enterprises Face COVID-19
Joao-Pierre S. Ruth, Senior Writer,  3/24/2020
Commentary
Enterprise Guide to Robotic Process Automation
Cathleen Gagne, Managing Editor, InformationWeek,  3/23/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Careers: Tech Drives Constant Change
Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll