contents

business
 
WinMagic Partners with SPYRUS

WinMagic has partnered with SPYRUS to make it simple for organizations to seamlessly integrate WinMagic's SecureDoc full-disk encryption software with SPYRUS' next-generation Suite B-enabled Rosetta Series II or HYDRA Privacy Card (Hydra PC) Series II two-factor authentication and secure mass storage tokens to protect all mobile devices and data at rest (DAR) or in transit.

By making it simple to seamlessly integrate full-disk encryption with two-factor authentication, WinMagic and SPYRUS enable organizations to prevent unauthorized access to sensitive data via lost or stolen mobile devices. The integrated WinMagic/SPYRUS solution will meet the world's strictest security mandates – including the recent U.S. Office of Management and Budget (OMB) directive M-06-16., which states that all sensitive data on mobile devices (laptops and PDAs) must be encrypted, and that all federal employees attempting to access encrypted data must utilize two-factor user authentication.

The Rosetta and Hydra PC tokens protect SecureDoc's AES 256-bit encryption keys by encrypting them with Elliptic Curve Cryptography utilizing P-384 keys, the maximum strength "Suite B" algorithms as defined by the National Security Agency and recommended by NIST publication SP-800-78-1 for all government applications after 2010. Encrypting the disk encryption key with a key that is contained on the PIN-protected Rosetta or Hydra PC ensures that removing the token from a laptop renders the data completely unintelligible.

SPYRUS was the first security vendor to incorporate support for the strongest "Suite B" cryptographic algorithms (including Elliptic Curve Cryptography with P-384 keys, AES-256, and SHA-384) into its hardware and software products, and WinMagic is now the first provider of Suite B-enabled full-disk encryption solutions. Since the Suite B algorithms are recommended for 2010 and beyond, selecting the WinMagic/SPYRUS solution will protect an organization's data for years to come.



write your comments about the article :: © 2006 Computing News :: home page