Encrypted flash drives, essentially secure storage on a stick, are a proven technology that has been readily available for at least 15 years. A few years back, it seemed like they would fade into obsolescence, swept aside by the wave of streaming services and cloud storage.
Related: Can Europes GDPR restore data privacy?
And yet today there is a resurgence in demand for encrypted flash drives. Whats happened is this: Digital transformation has raced forward promoting high-velocity software innovation, with only a nod to security. This trend has opened up vast new tiers of attack vectors and threat actors are taking full advantage.
Security-conscious companies the ones who are proactively responding, not just to threat actors having a field day, but also to the specter of paying steep fines for violating todays stricter data privacy regulations are paying much closer attention to sensitive data circulating out in the field, as well they should.
Highly secure portable drives make perfect sense in numerous work scenarios; encrypted flash drives, specifically, are part of a global hardware encryption market on track to climb to $296.4 billion by 2020, up 55% as compared to 2015, according to Allied Market Research.
Fateful elevator pitch
One of the vendors I always enjoy speaking with in this space is DataLocker. Co-founder Jay Kim was running a family steel fabrication business when he took a trip to South Korea in the fall of 2007. He was meeting a friend, who introduced him to another friend in an elevator, no less.
Turns out that friend of a friend had an invention that tickled Kims entrepreneurial instincts. Knowing nothing about cybersecurity at the time, Kim became persuaded that the inventor was on to something. So he wound down his other business pursuits and within a few months pushed ahead with the boot-strapped launch of DataLocker.
Today the company operates out of spacious quarters, with room to grow, in Overland Park, Kansas; it has 50 employees and continues to innovate to meet what has turned out to be an enduring demand for secure portable storage devices. DataLocker supplies platform-independent devices that tie into a central management console. This gives the user the ability to inventory and audit portable storage devices being used out in the field.
I met with Kim at BlackHat 2019 and had a wide ranging discussion with him. For a full drill down, give a listen to the accompanying podcast. Here are excerpts edited for clarity and length:
LW: Why are secure thumb drives still in demand?
Kim: Because of the active threats were seeing today there has been kind of a moving back towards hardware based, cold storage, basically off-line storage. So were finding a lot of organizations now are reincorporating encrypted storage devices into their arsenal of data security tools.
LW: Threats are still out there, essentially.
Kim: Yes, companies want assurance that they have an offline backup, yet they also want to be able to monitor what people are doing with those backups, as well. For instance, with ransomware, one of the best protections is to have a physical offline backup. So were finding a lot of companies going old school and choosing not to put data onto their server, but put it onto actual secure devices, and keeping those offline.
LW: What other kinds of usage patterns are becoming common?
Kim: Weve seen a complete evolution in use cases. When we started off, the primary use case for encrypted hard drives and flash drives was for transport and for backup, as well. Now were finding more companies using them for primary storage, basically having data thats hardware encrypted that they use on a daily basis.
And then theres mobility, because despite the increases in network speeds and wireless speeds, the transfer rates for the volumes of data theyre being transferred and stored these days makes it really impractical to use cloud storage. In many cases youre talking about multiple terabytes of data that need to be transferred from point A to point B.
A lot of organizations find that one of the easiest things to do is to put it on secured hardware, drop in FedEx, and send it off to their lab or wherever it may be. And then when its received, grant them the authorization to access the device.
LW: Sort of like an evidence chain?
Kim: Yes, a chain of custody. Thats one of the main use cases. With our management service, you can track where and when each device is accessed, who accessed it and what data was put onto it. And at the end of the day, if you want to, you can even remotely wipe the device.
LW: Even in our paperless society, actual documents are still important.
Kim: Its forensics evidence. A lot of companies will actually take a take a snapshot, an image, put it on one of our devices and just put it in a safe, literally a physical safe, and use that as evidence. Because with our tracking capability, we can ensure that the data thats stored on the device hasnt been touched since it was put into storage. So they have that whole chain of custody in place for that image; and in todays regulatory world, thats very important.
LW: Right, with Europes GDPR and states like New York and California imposing penalties for violating data privacy rules, thats gotten peoples attention.
Kim: What were finding is the biggest need for many end users is not really the encryption itself, but to be able to prove that their data has been encrypted. We give them that ability to create that audit trail to prove that, Hey, this device was fully encrypted to meet the regulatory standards. Basically its evidence for the organization in case of anything that happens down the road.
LW: Whats new with DataLocker?
Kim: So we started off with encrypted storage devices and weve evolved. Weve just launched a data loss prevention product, called PortBlocker, which locks down USB ports. Our little twist is you can lock down your ports, but you also have the ability to audit those ports and see whats going, with a really crystal clear view of USB storage device usage within your organization.
Weve also re-launched a really cool product called SafeCrypt. Weve created a virtual drive, which functions the exact same way as our encrypted hardware devices. It lets you choose where you want to store your data in encrypted form. It can be in a service like Dropbox or Google Drive or it could even be a local folder or local drive. It creates a drive letter on your desktop where you authenticate, then read or write to that drive letter, and thats it. As soon as it hits that drive to letter, its encrypted.
LW: Do you still imagine theres going to be ongoing demand for portable hardware devices, going forward?
Kim: We do not foresee secure hardware storage devices going away anytime soon. There are billions and billions of USB storage devices out there and the proportion of hardware storage devices that are encrypted keeps increasing.
Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.
Recent Articles By Author
*** This is a Security Bloggers Network syndicated blog from The Last Watchdog authored by bacohido. Read the original post at: https://www.lastwatchdog.com/best-practices-resurgence-of-encrypted-thumb-drives-shows-value-of-offline-backups-in-the-field/
- The Senate Judiciary Committee Wants Everyone to Know It's Concerned About Encryption - EFF - December 14th, 2019
- The Defense Department Says It Needs the Encryption the FBI Wants to Break - Free - December 14th, 2019
- Congress wants to regulate encryption for big tech - The Burn-In - December 14th, 2019
- Facebook says it won't break end-to-end encryption - TechRadar - December 14th, 2019
- Encryption spat sees backdoor back-and-forth between tech firms, Congress - TelecomTV - December 14th, 2019
- Michael Hayden Ran The NSA And CIA: Now Warns That Encryption Backdoors Will Harm American Security & Tech Leadership - Techdirt - December 14th, 2019
- Large, diverse coalition of civil society groups tell the US, UK and Australian governments not to ban working encryption - Boing Boing - December 14th, 2019
- U.S. Attorney Justin Herdman of Ohio says agents need access encrypted devices, apps for the sake of public s - cleveland.com - December 14th, 2019
- Google makes it safer to text on Android phones, but end-to-end encryption is still MIA - PCWorld - December 14th, 2019
- Priti Patel bids to create end-to-end encryption apps' back door - The National - December 14th, 2019
- Encryption can't put tech giants beyond the reach of the law, Minister says - The Age - December 14th, 2019
- Chrome 79 includes anti-phishing and hacked password protection - Naked Security - December 14th, 2019
- Hardware Encryption Technology Market : Analysis and In-depth study on market Size Trends, Emerging Growth Factors and Forecasts to 2027 - Downey... - December 14th, 2019
- Encryption back on the congressional agenda - Politico - December 9th, 2019
- Police radios blocked from the public in southeast Denver metro area - The Denver Post - December 9th, 2019
- Encryption Software Market Innovations, And Top Companies - Forecast To 2029| Microsoft, Sophos Ltd., Check Point Software Technologies Ltd. -... - December 9th, 2019
- Did You Hear That? Securing Communications in 2019 | Insight for the Connected Enterprise - No Jitter - December 9th, 2019
- 'Government broke their promise': Labor seeks to amend encryption legislation - Sydney Morning Herald - December 9th, 2019
- Global Hardware-based Full Disk Encryption Market 2019 Innovation and Technological Developments, Industry Analysis & Outlook 2023 - Weekly News... - December 9th, 2019
- Privacy vs public safety - the pros and cons of encryption - World Economic Forum - December 8th, 2019
- 80% of all Android apps encrypt traffic by default - We Live Security - December 8th, 2019
- Keybase moves to stop onslaught of spammers on encrypted message platform - Ars Technica - December 8th, 2019
- Labor says it will fix encryption laws it voted for last year - ZDNet - December 8th, 2019
- Nick Clegg to be summoned to Parliament to give evidence on Facebook encryption - Sunriseread - December 8th, 2019
- This startup just solves the data privacy problem by making it possible to search encrypted data in the cloud - TechStartups.com - December 8th, 2019
- Encryption Software Market to Discern Magnified Growth During 2017-2027 - Weekly Spy - December 8th, 2019
- Millions of Private Text Messages Have Been Exposed: Here's How to Encrypt Messages on iPhone and Android - Tech Times - December 8th, 2019
- Biometric Data Encryption Device Market : Analysis and In-depth study on market Size Trends, Emerging Growth Factors and Forecasts to 2018 to 2028 -... - December 8th, 2019
- Certbot Leaves Beta with the Release of 1.0 - EFF - December 8th, 2019
- Terrific News for Android OS Users 80% Android apps encrypting traffic by default - Digital Information World - December 8th, 2019
- Hawk Security Limited Began Selling a Hardware-Protected External SSD Drive with Aes 256 XTS Military Grade Encryption - AiThority - December 8th, 2019
- Data security is falling behind as over half of FIs experience data breaches - IBS Intelligence - December 8th, 2019
- Email Encryption Market 2019, Trend, CAGR Status, Growth, Analysis and Forecast to 2025 - VaporBlash - December 8th, 2019
- Encryption Software Market 2019 Size, CAGR Status, Key Players, Growth Analysis and Forecast to 2026 - The Market Publicist - December 2nd, 2019
- Global Encryption Software Market Industry Analysis and Forecast (2018-2026) - Daily Research Stack - December 2nd, 2019
- Fortinet took 18 months to strip software of flawed crypto cipher and keys - The Daily Swig - December 1st, 2019
- Mobile Encryption Market Competitive Research And Precise Outlook 2019 To 2025 - The Market Publicist - December 1st, 2019
- NordPass: Get rid of password stress. Forever. - EE Journal - December 1st, 2019
- Apple patents anti-snooping technology that would stop police from tracking locations and messages - Stock Daily Dish - December 1st, 2019
- Encryption Software Market Research Report by Geographical Analysis and Forecast 2017-2027 - Kentucky Reports - November 28th, 2019
- Encryption Key Management Software Market : Industry Research, Growth Trends And Opportunities For The Forecast Period 2019-2029 - News Description - November 28th, 2019
- iStorage cloudAshur is named: Security Innovation of the Year at the UK IT Industry Awards 2019 - ResponseSource - November 28th, 2019
- Database Encryption Market Analysis Report by Product Type, Industry Application and Future Technology 2025 (International Business Machines... - November 28th, 2019
- The IT Guide to Enforcing Full Disk Encryption Windows Edition - Security Boulevard - November 28th, 2019
- Why The FBI's Former Top Lawyer Now Embraces Encryption - Law360 - November 28th, 2019
- Big Boom in Cloud Encryption Market over 2019-2026 with CipherCloud Inc., Hytrust Inc., Gemalto NV, IBM Corporation and more - Market Expert - November 28th, 2019
- Encrypted Flash Drives Market Size, Growth, Global Industry Analysis, Share, Segments and Forecast 2019-2024 - Space Market Research - November 28th, 2019
- Encryption Software Market 2019 Global Industry Status, Segment by Region, Type and Future Forecast To 2026 - Financial News - November 28th, 2019
- FBI worried about criminals having unfettered access to encryption technology - KTVI Fox 2 St. Louis - November 23rd, 2019
- What Is End-to-End Encryption? Another Bulls-Eye on Big Tech - The New York Times - November 23rd, 2019
- Think of the children: FBI sought Interpol statement against end-to-end crypto - Ars Technica - November 23rd, 2019
- Global Hardware-based Full Disk Encryption Market By Industry Business Plan, Manufacturers, Sales, Supply, Share, Revenue and Forecast Report... - November 23rd, 2019
- Moniker makes a statement with The Encryption EP - The Untz - November 23rd, 2019
- Global Mobile Encryption Market By Industry Business Plan, Manufacturers, Sales, Supply, Share, Revenue and Forecast Report 2019-2024 - BeetleVersion - November 23rd, 2019
- NSA Publishes Advisory Addressing Encrypted Traffic Inspection Risks - BleepingComputer - November 23rd, 2019
- Encryption Key Management Software Market Research Report: Market Analysis on the Future Growth Prospects and Market Trends Adopted by the... - November 23rd, 2019
- Microsoft Windows 10 To Natively Support DNS Over HTTPS Encryption And Obfuscation Technique Making Internet Traffic Monitoring Near Impossible -... - November 23rd, 2019
- Import EFS File Encryption Certificate and Key (PFX file) in Windows 10 - TWCN Tech News - November 23rd, 2019
- What Is Homomorphic Encryption? And Why Is It So Transformative? - Forbes - November 19th, 2019
- FBI Recruits Interpol to Condemn End-to-End Encryption - WebProNews - November 19th, 2019
- Is encryption to blame for WhatsApp snooping? - Livemint - November 19th, 2019
- Astonishing Growth in Global encryption software market size was valued at USD 2.98 billion in 2018. It is projected to post a CAGR of 16.8% from 2019... - November 19th, 2019
- Encryption Software Market Overview, Latest Analysis and Future Forecast 2019 2025 - Markets Gazette 24 - November 19th, 2019
- With end-to-end encryption, we wouldn't be able to listen in even if we wanted to, says Facebook's Stan Chudnovsky - Mumbrella Asia - November 19th, 2019
- Microsoft Jumps on the DoH Train Company to Introduce Encrypted DNS - Computer Business Review - November 19th, 2019
- Global Mobile Encryption Technology Market 2018 Manufacturers, Types and Application, Analysis History and Forecast 2025 - Galus Australis - November 19th, 2019
- Hardware Encryption Market Growth Forecast Analysis by Top Manufacturers, Regions, Product Types and Application (2019 - 2026) - News Obtain - November 19th, 2019
- The Best Encryption Software for 2019 | PCMag.com - October 21st, 2019
- What is data encryption? - October 19th, 2019
- USB Enforced Encryption - Endpoint Protector - October 19th, 2019
- Authenticated encryption - Crypto++ Wiki - October 19th, 2019
- Tinder's Lack of Encryption Lets Strangers Spy on Your ... - October 19th, 2019
- 'Without Encryption, We Will Lose All Privacy': Snowden ... - October 18th, 2019
- Security pros reiterate warning against encryption backdoors - October 18th, 2019
- Encryption - servicepro.wiki - October 18th, 2019
- Mozy Encryption - October 18th, 2019
- Optical Encryption Market Size, Share, Trends and Forecast ... - October 18th, 2019
- MySQL Enterprise Transparent Data Encryption (TDE) - October 18th, 2019
- What is Encryption? - Definition from WhatIs.com - October 17th, 2019
- How to Set Up BitLocker Encryption on Windows - October 2nd, 2019