Unlike Live CD, Secure Pocket Drive is hardware encrypted, has numerous security self-checks during boot-up and runtime, and can be managed and updated remotely by authorized personnel.
Secure Pocket Drive has received wide acceptance and strong demand in the public sector to meet BYOD and telework requirements, while allowing organizations to control the operating environment used by their employees.
Designed as a secure endpoint for Internet and cloud-computing applications, Secure Pocket Drive is the only trusted pocket-sized encrypting USB flash drive that boots Linux or Windows environments without the overhead of a virtual machine. Secure Pocket Drive has more than enhanced security features; it is optimized for performance.
The Linux edition can be booted in seconds on most Intel-based Apple Macintosh and standard Intel and AMD-based Windows computers.
Secure Pocket Drive can be configured to prevent cross-contamination and the transfer of malware from the host computer by not mounting the internal hard drive. How many times has your network been attacked by a malware-infected personal computer, and how much time does your helpdesk spend supporting non-standard configurations? With Secure Pocket Drive, you configure and own the secure operating environment, no matter where it is booted.
Since Secure Pocket Drive can boot on older computers that have as little as 1 GB of RAM, many customers are extending the life of these older computers, increasing their ROI. Road warriors and teleworkers can simply boot Secure Pocket Drive from these computers to securely connect to corporate networks, instead of buying new computers.
Secure Pocket Drive uses the same on-board hardware security that is built into the SPYRUS Hydra Privacy Card(R) family, including AES-256 CBC and XTS, ECDH, ECDSA P-384, and SHA-384. These together make up the National Security Agency's Suite B cryptography, a part of the US Government's cryptographic modernization program to replace legacy cryptographic methods, which have proven increasingly vulnerable to "sponsored" attackers. FIPS 140-2 Level 3 sector-based full disk encryption is based on XTS-AES 256 encryption (NIST SP800-38E). Additional protection from malware alteration is provided by a signed and hashed bootloader and a hardware-enforced read-only compartment.