Transcript Document

Origin Storage Ltd
Security Product
Overview 2013
About Us
For more than a decade now Origin Storage has been an established provider to many of the IT industries
leading Resellers. At the heart of our success lies a dedicated team of industry experts with a wealth of
knowledge in storage and data security.
That knowledge and the confidence to constantly evolve ourselves, has seen our business branch out in to new
and exciting areas in the storage arena. Our strong business relationships allow us to continually expand and
seek fresh, innovative new products to add to the IT market place.
 Founded in September 2001, with its head office in Basingstoke
- since then it has grown to have 2 offices in Europe and 3 across the UK.
 Core area of business is the manufacturing and distribution of
third party matched hard drives solutions for OEM Servers,
Notebooks & Desktops.
 Have been supplying Dell with their legacy spares across EMEA
for the past decade – in FY 2011 this business grew by 80% in the UK.
Products from award winning manufacturers
Encryption Summary
Why Use Encrypted devices at all?
Mobile work forces are an important part of any modern day corporate environment, allowing employees to work where and when
they choose. Many organisations issue laptops in preference to standard desktop PCs in order to facilitate the Mobile Workforce, but
by doing this without utilising modern encryption techniques, they are also jeopardising the security of sensitive and confidential
information in areas outside of their control.
Why Hardware Encryption?
Do I Need 128 Bit Or 256 Bit?
Products with hardware based cryptographic chips manage
the encryption keys and perform the encrypting/decrypting
routines. This means that your PCs processor will not be
slowed down and the products run more securely than any
software based encryption system.
This will depend largely on the type of data to be secured and
any regulatory requirements you must conform to. To secure
general company documents a 128 Bit device may be suitable
however if you are securing financial information, 3rd party
details, medical history or classified data then a 256 Bit
device would meet your requirements.
What Is AES?
What Is FIPS 140-2?
The Advanced Encryption Standard (AES) is a symmetric-key
encryption standard adopted by the U.S. Government. The
AES ciphers have been analysed extensively and are now
used worldwide as the default standard for encrypting data.
Origin Storage are members
of the TCG Group
Federal Information Processing Standard 140-2(FIPS 140-2)
is a standard that describes US Federal government
requirements that IT products should meet for Sensitive, but
unclassified data. FIPS 140-2 certification has become a
widely used method for organisations and their associated
regulators to determine if an encrypted product is suitable
for use by themselves and/or members.
PIN Encrypted Hard Drives
Touch screen PIN protected USB portable hard drives
DataLocker Encrypted Hard Drives
DataLocker external hard drives are ideal for mobile users who require high-capacity, secure portable storage.
 No software required
 Platform independent (PC, MAC, Linux)
 High Capacity (Up to 2TB)
New MAC Specific DL3
model available!
Physical
USB 2.0
USB 3.0
500GB, 1TB, 2TB (SATA)
128GB, 256GB (SSD)
500GB, 1TB, 1.5TB (SATA)
128GB, 256GB (SSD)
Security
DataLocker DL2
Password Length 6 - 18
Password Length 6 - 32
Numeric Only
Alpha Numeric
Single-Factor
Authentication
Optional RFID Two-Factor
Authentication
256-bit AES
256-bit AES
Ease of Use
FIPS 140-2 Certified
Languages
English, French, German, Spanish
Languages
English, French, German, Spanish
(separate Firmware required for each language)
(user selectable)
Also available with SSD!
DataLocker DL3
Also Available with RFID
Secure Removable Storage
Wave Product Portfolio
Designed for ultra secure ultra portable affordable storage
SecureDisk
Sentry Key
Encrypted CD’s & DVD’s
Secure Encrypted Flash Drives
The DataLocker SecureDisk combines AES 256-bit encryption
and disc burning functionality, all self-contained on a
recordable CD or DVD. SecureDisk offers built-in software for
disc burning and government strength FIPS 140-2 AES 256-bit
encryption.
Sentry is a secure USB flash drive that utilises DataLocker’s
certified and proven technology. This next generation,
smart USB drive combines 100% hardware encryption with
the ability to connect to a remote management system. A
USB drive has never been so secure while still taking
advantage of the agility of portable storage.
Format
Recording Speed
Capacity
CD-R
52x
700MB
DVD-R
52x
4.7GB
Available in 4, 8, 16, 32 & 64GB
 FIPS 140-2 Level I Validated
 FIPS 140-2 Level II Validated
 TAA Compliant, RoHS, CE
 AES-256 bit in CBC-mode
 Windows® 2000, XP, Vista,
 Fully compatible with Windows 7
Windows®7 & 8, Server 2000,
& 8, Vista, XP, Server 2008, 2003,
Server 2003, Server 2008
Mac OS X 10.5.x or later, Linux
Kernel 2.6 or later
Available in packs of 10 or 100
SATA/SSD Encrypted HDD’s
Wave Product Portfolio
SED’s are the most secure, highest performing option for protecting data in laptops
EnigmaSED Self-Encrypting Hard Drives
Using a combination of the latest in hardware and software encryption technology, Enigma
SED is a complete start to finish upgrade kit which will convert a standard notebook into a
fully hardware encrypted notebook with pre-boot authentication.
FACT
Under new UK legislation if an
organisation loses personal data,
they can be find up to £500,000
 Zero impact on system performance
 Always-on AES encryption means all of your data is protected all of the time.
Powered by
 We supply everything you need right out of the box
SSD
Seagate® Momentus Thin. Hardware based
encryption eliminates any performance impact,
because encryption takes place on the fly.
Micron C400 SED. Hardware-based data
encryption with no loss of SSD performance in
accordance with industry standards.
Specifications
Specifications
Capacities: 500GB
Compliance: FIPS 140-2 , OPAL II
Encryption: 256-bit AES
Spin Speed: 5400RPM
Interface: SATA 6-Gb/s NCQ
Capacities: 128GB, 256GB, 512GB
Compliance: TCG Opal
Encryption: 256-bit AES
Read Performance: Up to 500 MB/s
Write Performance: up to 175 MB/s for 128GB
up to 260 MB/s for 256GB, 512GB
Wave Software
The Trusted Computing Company — Helping Redefine Cyber Security
Wave
Wave Mobility Pro — Tablet Edition
Wave Systems is a leading provider of client and server
management software for hardware-based digital encryption
security, enabling organisations to know who is connecting to
their critical IT infrastructure, protect corporate data, and
strengthen the boundaries of their networks.
Windows 8 tablets are the first generation of devices that
allow full-scale computing and enterprise management of a
mobile device. This is the best of both worlds for the
enterprise and the user. Not only can the user do more
computing and be more productive, but the enterprise can be
assured that their data is secure.
Wave’s core products are based around the
Trusted Platform Module (TPM), a standardsbased security chip that’s built into most of your laptop and
desktop computers. In fact, it has shipped in more than 600
million laptop and desktop computers from Acer, Dell, HP,
Lenovo, Panasonic, Samsung and Toshiba.

Wave Authentication

Wave Encryption

Scrambls Enterprise Console
Self-Encrypted Drives (SED’s)
SED’s are the safest, fastest and most cost
effective way to protect sensitive data resting on your
endpoints. Wave solutions deliver drive initialisation, user
management, drive locking, user recovery and crypto erase
for all OPAL-based, proprietary and solid-state SED’s.
(Origin’s Enigma SED’s use this technology to allow seamless
upgrade from a standard HDD to a fully encrypted SED)
(Windows 8)
Scrambls wins ‘Best Content
Security’ - SC Magazine
Wave Software
Simplified encryption and authentication software from Wave
Authentication
Device Health
The traditional forms of authentication are all just variations
on one thing: user identification.
Detect attacks before its too late 
with Wave Endpoint Monitor.

With more and more people
bringing their own devices
(BYOD) to work, the Wave
approach lets you confirm the
identity of both user and device,
which gives you a much-needed
additional level of security.
Antivirus software can’t detect rootkits and other malware;
The Wave alternative is to work with the Trusted Platform
Modules (TPMs), or security chips, embedded in your devices,
which can alert you to a problem before you even know it
exists.

EMBASSY Security Centre

EMBASSY Remote Admin

Wave 802.1x Security

Wave Direct Access

VPN Certification
Encryption
Data Loss Protection
Your organisation may be legally required to encrypt
sensitive data and while Self-encrypting hard drives are the
future, many companies can’t get there overnight.
The award winning Safend Data
Protection Suite provides complete
endpoint data protection without
compromising productivity. Each
component within the Safend Data
Protection Suite can be implemented
stand alone or in combination and
compliments your existing security
infrastructure.
Wave’s Safend Encryptor encrypts
drives that can’t do the job
themselves, and does it automatically.
Wave provides automated turn-key
management for Microsoft BitLocker®

ERAS for SED

Wave for BitLocker®

Safend Encryptor

Safend Protector
Wave Systems are part
of the TCG Group
Wave Endpoint Monitor (WEM)
(WEM incl TPM Mgmnt, WSKS)

Safend Protector

Safend Inspector

Safend Reporter

Safend Discoverer
Chameleon
Like a Key for your computer, lock your important files away with Chameleon
Unlimited Encrypted Data
The Chameleon is not a flash storage drive, like a key for your computer, the
Chameleon protects your information with full AES-256 encryption, the same
standard used by the US government and many Fortune 500 companies.
Plug in the Chameleon to access your files. Unplug it to secure them. No
passwords to remember or hide. The Chameleon guards your data from keyloggers, malware, and hackers even if Windows is not password protected.
Key Management
* Specific models only
Chameleon Keys are available for single users (Personal) or for larger scale
deployment with Chameleon Pro.
Chameleon Pro includes two types of devices: Masters and Users. Users devices
provide all of the core Chameleon security features (encrypted drives, individual
file encryption, etc.).
Master devices offer the same features in addition to being able to manage Users.
A Master device can be used to initiate a migration process to retire a User device
or migrate the old User key to a new User key.
 Full AES-256 Encryption
 All data stays in the PC
 Automatically Encrypt
Independence Key
Keep your data safe on your PC and Cloud
Maximum Security, Total Freedom
 Security Cap
Keep your data safe on your PC and Cloud. Safely share all kind of data and information with
friends, colleagues, relatives etc. thanks to hardware association with other users. Enjoy fast and
encrypted backups by simply using the product’s USB host. Take advantage of the revolutionary
Security Cap, that enables total information recovery in case of theft, loss or amnesia.
 Secure Cloud Data
 Association & Sharing
 Easy & Fast
Cloud Protection
 Pass-Through
The use of Cloud services, such as those provided by Dropbox, Amazon, Sugarsync,
Wuala, Skydrive, etc. is made totally safe and protected. You can create an entirely
encrypted disk that synchronizes by differences with your Cloud space, which
means synchronizing only what you modify for a maximum saving in bandwidth
and execution times. Obviously, you can also upload single encrypted files. A
completely different world for safe Cloud usage!
Association & Sharing
:
Associate with other users! Create your own private and restricted network. You may share
any kind of restricted information, even through unsafe channels, without worrying about
other people intercepting your data. You can perform the association both physically and
remotely with a few clicks and you will be protected without slow and boring VPNs
Thank You
Origin Storage Limited
2-3 The Rutherford Centre
Basingstoke
Hampshire
RG24 8PB
for your time
T. 0844 288 68 68
E. [email protected]
Product Guide 2013
Why not read our full product guide online
at www.originstorage.com/catalogue
or request a free copy by emailing us at
[email protected]
For more information speak to your account manager or visit