Click here to close now.


News Feed Item

SPYRUS Introduces the World's First Windows To Go Live Drive File Encryption, File Sharing and Secure Cloud Storage Application for OneDrive, Google Drive, and DropBox at Microsoft TechEd 2014

PocketVault Encryptor Professional for WorkSafe and WorkSafe Pro Protects File Encryption Keys in FIPS 140-2 Level 3 Rosetta Hardware Security Module

SAN JOSE, CA -- (Marketwired) -- 05/12/14 -- SPYRUS, Inc. today announced the PocketVault Encryptor Professional (PVE Pro) file encryption and file sharing application for the Microsoft (NASDAQ: MSFT) certified SPYRUS WorkSafe and WorkSafe Pro Windows To Go bootable USB 3.0 live drives. PVE Pro transparently and securely encrypts, shares and stores single files, groups of files and directories in public and private cloud environments. Documents, spreadsheets and even media files can be shared and synched among teams of authenticated users.

The SPYRUS PVE Pro application secures the user's AES 256 bit encryption keys on the FIPS 140-2 Level 3 Rosetta® hardware security module that is embedded within WorkSafe and WorkSafe Pro live drives. Every user file is encrypted with its own key and SPYRUS PVE Pro ensures all file encryption and decryption keys are always secured on the user's WorkSafe drive and never available to the cloud service provider. Very sensitive files can even be encrypted multiple times with different keys for defense-in-depth protection. Unlike commodity file encryption products, SPYRUS WorkSafe and WorkSafe Pro employs the strongest cryptographic algorithms in a hardware security module certified by NIST.

Key generation, key storage, and key management functions are also executed completely within the SPYRUS Rosetta hardware security module. Moreover, as in other SPYRUS encrypting products, passwords do not exist on the drive in any form and are reconstituted for each logon process to unlock the drive, making them unsusceptible to attacks. All this core functionality is implemented within the USB security device and is applied to all data on each Secured by SPYRUS Windows To Go drive.

"PocketVault Encryptor Professional was originally developed to meet the security needs of Government organizations to share and protect both data at rest and data in transit for collaboration among workgroups," said Tom Dickens, Chief Operating Officer, SPYRUS, Inc. The integration of the PVE Pro application with a FIPS 140-2 Level 3 Rosetta hardware security module provides the additional assurance that only authenticated users who have access to the hardware key and legitimate password can decrypt the sensitive files stored on SharePoint or public cloud storage systems such as DropBox and Google Drive."

Enterprise users can share encrypted files by creating and exchanging PVE Certificates with other PVE users, and add their certificates as PVE Contacts. When encrypting a file, you can select PVE Contacts to share decryption capabilities for that file. You can then safely transmit the encrypted file (for example, as an email attachment, on a USB storage drive, or stored in cloud storage systems), and only you and designated PVE Contacts can decrypt it. An initialization process creates, backs up, or restores private keys based on enterprise policy. The SPYRUS Enterprise Management System (SEMS) can centrally enforce corporate access rules and key management policies and selectively enable, disable and "kill" access to each PVE Pro enabled WorkSafe and WorkSafe Pro drives.

PVE Pro can be used to encrypt and decrypt files and folders from your booted Windows 8.1 environment on WorkSafe or WorkSafe Pro drives or as a USB token in Windows 7 and 8 desktop infrastructure environments. Source files can be removed after encryption/decryption and perform encrypt, decryption and safe erase functions on folders and subfolders wherever they are stored.

Please join us at TechEd North America 2014 at SPYRUS booth 1640

About SPYRUS, Inc.

SPYRUS delivers innovative encryption solutions that offer the strongest protection for data in motion, data at rest and data at work. For over 20 years, SPYRUS has delivered leading hardware-based encryption, authentication, and digital content security products to government, financial, and health care enterprises. To prevent the insertion of untrusted components, patented Secured by SPYRUS™ security technology is proudly designed, engineered, and manufactured in the USA to meet FIPS 140-2 Level 3 standards. SPYRUS has collaborated closely with Microsoft to deliver the first certified hardware encrypted portable platform for Windows 7, Windows 8 and Window 8.1. SPYRUS is headquartered in San Jose, California. See for more information.

SPYRUS, the SPYRUS logo, Secured by SPYRUS, and PocketVault are either registered trademarks or trademarks of SPYRUS, Inc., in the U.S. and/or other jurisdictions. All other company, organization, and product names are trademarks of their respective organizations.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Luxoft Holding, Inc., a leading provider of software development services and innovative IT solutions, has been named “Bronze Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Luxoft’s software development services consist of core and mission-critical custom software development and support, product engineering and testing, and technology consulting.
Mobile messaging has been a popular communication channel for more than 20 years. Finnish engineer Matti Makkonen invented the idea for SMS (Short Message Service) in 1984, making his vision a reality on December 3, 1992 by sending the first message ("Happy Christmas") from a PC to a cell phone. Since then, the technology has evolved immensely, from both a technology standpoint, and in our everyday uses for it. Originally used for person-to-person (P2P) communication, i.e., Sally sends a text...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
Scott Guthrie's keynote presentation "Journey to the intelligent cloud" is a must view video. This is from AzureCon 2015, September 29, 2015 I have reproduced some screen shots in case you are unable to view this long video for one reason or another. One of the highlights is 3 datacenters coming on line in India.
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Bryan Forrester, Senior Vice President of Sales at eFolder, will present how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He will also demonstrate how easy it is to search and restore cloud application data using Cloudfinder.
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/...
SYS-CON Events announced today that Spirent Communications, the leader in testing navigation and positioning systems, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Spirent Communications enables innovations in communications technologies that help connect people. Whether it is service provider, data centers, enterprise IT networks, mobile communications, connected vehicles or the Inte...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, ...
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, will look at di...
Saviynt Inc. has announced the availability of the next release of Saviynt for AWS. The comprehensive security and compliance solution provides a Command-and-Control center to gain visibility into risks in AWS, enforce real-time protection of critical workloads as well as data and automate access life-cycle governance. The solution enables AWS customers to meet their compliance mandates such as ITAR, SOX, PCI, etc. by including an extensive risk and controls library to detect known threats and b...
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
The enterprise is being consumerized, and the consumer is being enterprised. Moore's Law does not matter anymore, the future belongs to business virtualization powered by invisible service architecture, powered by hyperscale and hyperconvergence, and facilitated by vertical streaming and horizontal scaling and consolidation. Both buyers and sellers want instant results, and from paperwork to paperless to mindless is the ultimate goal for any seamless transaction. The sweetest sweet spot in innov...