Comparison of encrypted external drives

Comparison of encrypted external drives

This is a technical feature comparison of commercial encrypted external drives.

Contents

Background information

Name Developer/Manufacturer Release Year Current Model?
SafeStick BlockMaster 2004 Yes
SafeStick SuperSonic BlockMaster 2009 Yes
IronKey S100 IronKey 2005 No
IronKey S200 IronKey 2009 Yes
IronKey D200 IronKey 2009 Yes
DataTraveler 5000 Kingston Technology 2010 Yes
DataTraveler Locker+ Kingston Technology Yes
DataTraveler Vault Kingston Technology Yes
DataTraveler Vault – Privacy Edition Kingston Technology Yes
JumpDrive SecureII Plus Lexar Yes
IronClad Lockheed Martin 2010 Yes
Cruzer Enterprise SanDisk Yes
Store 'n' Go Corporate Verbatim Yes
Name Developer/Manufacturer Release Year Current Model?

Operating systems

Name Windows FreeBSD Linux Mac OS NetBSD OpenBSD
SafeStick Yes No Yes Yes No No
SafeStick SuperSonic Yes No Yes Yes No No
IronKey S100 Yes No Yes Yes No No
IronKey S200 Yes No Yes Yes No No
IronKey D200 Yes No Yes Yes No No
DataTraveler 5000 Yes No No No No No
DataTraveler Locker+ Yes No No Yes No No
DataTraveler Vault Yes No Public partition only Public partition only No No
DataTraveler Vault – Privacy Edition Yes No No Yes No No
JumpDrive SecureII Plus Yes Unknown Unknown Unknown Unknown Unknown
IronClad Yes No Yes Yes No No
Cruzer Enterprise Yes Unknown Unknown Yes Unknown Unknown
Store n' Go Corporate Yes Unknown Unknown Unknown Unknown Unknown
Name Windows FreeBSD Linux Mac OS NetBSD OpenBSD

Features

  • Bootable: Whether (with the appropriate OS installed on the drive and supporting BIOS on a computer) the drive can be used to boot a computer.
  • Encryption Type: Type of encryption used.
  • Certification: Whether FIPS 140-2 or similar validation has been passed.
  • Managed: Whether enterprise level management software for maintaining large numbers of devices is included.
  • Interface: List of USB, Firewire, eSATA, or other interfaces for connection a computer.
  • Max Capacity: Maximum size drive is available in.
  • Included Software: List of any included software, excluding any standard freeware or trialware obtainable by an end user.
  • Other Features: Other notable features that differentiate the device.
Name Bootable Encryption Type Certification Managed Interface Max Capacity Included Software Other Features
SafeStick No AES 256-bit CBC Hardware Encryption CESG CCTM, FIPS 140-2[1] Optional (with SafeConsole) USB 2.0 128GB Inactivity lock
SafeStick SuperSonic No AES 256-bit CBC Hardware Encryption CESG CCTM, FIPS 140-2[1] Optional (with SafeConsole) USB 2.0 8GB High transfer speeds, Inactivity lock
IronKey S100 No AES 128-bit CBC Hardware Encryption FIPS 140-2 Level 2 Enterprise Model only USB 2.0 16GB Identity Manager; Secure Sessions
IronKey S200 No AES 256-bit CBC Hardware Encryption FIPS 140-2 Level 3 Enterprise Model only USB 2.0 16GB Identity Manager; Secure Sessions
IronKey D200 No AES 256-bit CBC Hardware Encryption FIPS 140-2 Level 3 Enterprise Model only USB 2.0 32GB Identity Manager; Secure Sessions
DataTraveler 5000 No AES 256-bit XTS Hardware Encryption FIPS 140-2 Level 2[2] No USB 2.0 16GB Water resistant
DataTraveler Locker+ No Hardware Encryption No No USB 2.0 32GB No
DataTraveler Vault No AES 256-bit Hardware Encryption No No USB 2.0 32GB DTVaultLock Second unsecured partition
DataTraveler Vault – Privacy Edition No AES 256-bit Hardware Encryption No USB 2.0 32GB Waterproof to 4'
JumpDrive SecureII Plus No Hardware FIPS 140-2 ? USB 2.0
IronClad Yes AES 256-bit CBC Hardware Encryption FIPS 140-2 Level 3 Yes USB 2.0 16GB
Cruzer Enterprise No Hardware FIPS 140-2 ? Yes USB 2.0
Store 'n' Go Corporate No Hardware FIPS 140-2 ? USB 2.0
Name Bootable Encryption Type Certification Managed Interface Max Capacity Included Software Other Features

See also

Notes and references

  1. ^ a b FIPS 140-2 Level 2 Pending
  2. ^ FIPS 140-2 Level 3 Pending

Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Comparison of disk encryption software — This is a technical feature comparison of different disk encryption software. Contents 1 Background information 2 Operating systems 3 Features 4 Layering …   Wikipedia

  • Comparison of online backup services — This is a comparison of online backup services. Contents 1 Comparison 1.1 Legend 1.2 Comments 1.3 Versioning 2 …   Wikipedia

  • Comparison of Microsoft Windows versions — Desktop market share for October 2011[1] Total Windows 90.13% Windows 7 40.5% Windows XP 38.45% Windows Vista 11.18% Non Windows 9.87% Microsoft Windows is the name of several families of computer software ope …   Wikipedia

  • Comparison of high definition optical disc formats — This article is about comparative HD optical disc formats. For a history of the Blu ray/HD DVD format war, see High definition optical disc format war. This article compares the technical specifications of multiple high definition formats,… …   Wikipedia

  • USB flash drive — JumpDrive redirects here. For the fictional propulsion system, see Jump drive. SanDisk Cruzer Micro, a brand of USB flash drives …   Wikipedia

  • TiVo — s logo, a smiling television set. TiVo (  / …   Wikipedia

  • Magnetic tape data storage — uses digital recording on to magnetic tape to store digital information. Modern magnetic tape is most commonly packaged in cartridges and cassettes. The device that performs actual writing or reading of data is a tape drive. Autoloaders and tape… …   Wikipedia

  • Ghost (software) — Ghost Symantec′s Norton Ghost v.15 home screen Original author(s) Murray Haszard Developer(s) Symantec …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”