Designed to give defence experts in the field and corporate warriors in the boardroom complete peace of mind, the truly unique 2.5inch SDSRDD drive provides governments and organisations with a high data security solution for ‘data at rest’. The unit maintains data integrity before and after the event of loss or theft thanks to a series of groundbreaking technology and security concepts.
Designed for defence, security and commerce, the 2.5inch SDSRDD drive offers robust, mission-critical performance the likes of which have never been seen before.
SecureDrives is delighted to have formed a strategic partnership with Cardwave Services Ltd, Europe’s leading expert in flash memory technology to bring this exciting product to market. SecureDrives will be joining Cardwave on its stand (L83) at Infosecurity at Earls Court between the 29 April – 1 May where James Little, CEO of SecureDrives will be present to answer any questions.
James Little said, “Our design approach was to throw away the conventional rule book and to take on the brief without the restrictions of conventional thinking. We wanted to safeguard data from the threat of keyloggers, the inherent weaknesses of PC based passwords and the data recovery techniques that can be applied to solid-state storage. We are very proud to have achieved all of this in a single 2.5inch form factor SSD drive’
The drive boasts of several world firsts which include a separate two factor authentication process via a token, which effectively removes the ‘PC’ from the authentication process. This safeguards against keyloggers hardware and software and the inherent weaknesses of PC based passwords.
Another world first is the ability to physically fracture the NAND Flash storage and security processor. This physical fracture process built into the drive delivers the same result as taking a hammer to the drive, destroying the NAND Flash and preventing any data recovery techniques from being applied.
With built in GSM the drive can be physically destroyed should the drive be lost or stolen. There is a full audit trail from the command with the Drive sending a reply to the requesting phone with confirmation of the command execution with a date and time stamp.