12 USB Thumb Drives Keep Your Data Secure - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Business & Finance

12 USB Thumb Drives Keep Your Data Secure

Keep your important files mobile but safe with these USB thumb drives -- most under $100 -- from Kingston, SanDisk, Lexar, Imation, and more, which offer enhanced protection via encryption, biometrics, and self-destruct mechanisms.

Updated 3/4/08.

Many people have already discovered the convenience of using USB thumb drives to shuttle information between home, office, vacation, and other locations. But with convenience comes risk. What can be done to ensure that enterprise data remains safe even if a drive is lost?




Kingston DataTraveler Elite Privacy
(click for image gallery)

USB-drive vendors offer a wide range of "secure" devices, addressing the demand for a more secure sneakernet. Here are a few things to look for:

  • Authentication: Password, biometric, or both? If password, how long can the password be? How insistent is the software in enforcing strong passwords and rotating passwords? How many unsuccessful attempts can a user make to enter a password before the device erases itself?

  • Encryption: Does the device itself offer encryption, or does the password simply prevent the drive from being mounted through ordinary channels? How strong is the encryption? The current standard is AES 256-bit encryption, although some consumer-oriented devices still offer 128-bit.

  • Road-worthiness: Depending on your security needs, this may be either a feature or a failing. Some secure USB drives require the ability to run applications on the host computer. In locked-down computer labs and Internet cafés, these USB drives that depend on built-in software may not work at all.

We have selected 12 representative USB drives that illustrate the variety of choices in the marketplace. Remember that just because you're carrying a "secure" USB drive doesn't mean that when you plug it into a strange computer (or your own) that you're inoculated against worms, viruses, keystroke logging software, DRAM attacks, and other scary critters from the bestiary of information security. Be careful out there!

1
Kingston DataTraveler Elite Privacy

Storage Capacity: 1 Gbyte, 2 Gbytes, 4 Gbytes, or 8 Gbytes
Casing: Titanium-coated stainless steel, waterproof
Encryption: Hardware-based 256-bit AES encryption
Special features: Encryption co-processor
Speed: 24-Mbps read, 10-Mbps write
Price: $87 / $128 / $191 / $327

The Kingston DataTraveler Elite Privacy (DTEP) comes shipped with 100% encryption across the entire USB drive. Any files stored on the device will be automatically encrypted by the hardware; conversely, files copied onto a host computer will be decrypted.

Because the encryption doesn't require an application on the host PC, DTEP can be used at locations such as an Internet cafés, where there's no expectation of having Windows administrator access.

Upon using DTEP for the first time, the user is asked to create a password containing from six to 16 characters, with a sufficient number of mixed-case and special characters. After 10 incorrect password attempts the drive will no longer function without reformatting. Users can also enter contact information accessible from the logon screen.


2
Kanguru Bio AES

Storage Capacity: 1 Gbyte, 2 Gbytes, 4 Gbytes, or 8 Gbytes
Casing: Standard
Encryption: 256-bit AES encryption
Special features: Fingerprint reader combined with password for two-factor authentication
Speed: 10-Mbps read, 5-Mbps write
Price: $80 / $100 / $130 / $180

The Windows-compatible Kanguru Bio AES includes a fingerprint reader as the second of two layers of authentication.

Upon connecting the device, the Kanguru BioLock application will prompt the user to enter a six-character password and a swiped fingerprint. Up to 10 fingers can be enrolled. While the manual recommends use of mixed-case characters, numbers, and symbols, the software does not enforce these recommendations.

Once connected, BioLock aims to be your replacement for Windows Explorer. While it's possible to drag-and-drop to the Bio AES, users are strongly encouraged to use the BioLock interface to move files, so as to more efficiently perform encrypt/decrypt functions.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Slideshows
10 Trends Accelerating Edge Computing
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/8/2020
Commentary
Is Cloud Migration a Path to Carbon Footprint Reduction?
Joao-Pierre S. Ruth, Senior Writer,  10/5/2020
News
IT Spending, Priorities, Projects: What's Ahead in 2021
Jessica Davis, Senior Editor, Enterprise Apps,  10/2/2020
Register for InformationWeek Newsletters
Video
Current Issue
[Special Report] Edge Computing: An IT Platform for the New Enterprise
Edge computing is poised to make a major splash within the next generation of corporate IT architectures. Here's what you need to know!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll