5. Conclusion
For everyday use of a USB key, the user simply needs to insert the key into the host PC, open the Truecrypt volume and launch Codyssey. Don't forget to perform an antivirus check before opening any communicating application (browser, e-mail client), and remember to take your key with you at the end of use!
Admittedly, their use can appear complex, requiring the implementation of security functions and usage rules to guarantee data availability and confidentiality. To make the most of these concepts for corporate use, there are more packaged solutions on the market, such as Gemalto Smart Enterprise Guardian. This USB key integrates 2 GB of memory using 256-bit AES hardware encryption, and a smart card for generating and storing cryptographic keys on the device.
Most interesting of all is Gemalto's partnership with start-up Netheos, which...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Conclusion
Bibliography
Also in our database
Software tools
• Clamwin http://fr.clamwin.com
• Codysafe http://www.codyssey.com
• Crypto Anywhere http://download.cnet.com
Websites
• Codyssey http://www.codyssey.com
• Process library.com http://www.processlibrary.com
Corporate solutions
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference