Category Archives: Cloud Computing

Three Ways 4G/Fibre Broadband Can Help Businesses Thrive

Joe Linford, of Broadband Genie, highlights the growing technologies of 4G and Fibre broadband and suggests some of the potential benefits  for helping businesses be more successful.

4G & Fibre optic broadband – what’s happening?

imageThe successor to 3G – 4G, is essentially ultra-fast mobile broadband that utilises airwaves to send information from one internet enabled device to another. Once used by terrestrial television, the airwaves which were owned by the government, were auctioned off to phone networks by Ofcom, and are now starting to become available throughout the UK.

At the same time this is happening, superfast broadband is gradually making its way around the country. As a way of sending information, Fibre optic broadband allows users to access the internet, keep in contact and download information faster than ever before.

You can read more information about the above and check the availability of deals in your area by using Broadband Genie’s guides to 4G and Fibre broadband. But for now, let’s explore how these could have a positive impact on your business.

Are you ready?

Whereas many rural areas may still be waiting for some time, those in urban regions are finally starting to enjoy great broadband speeds. As well as a number of advantages for consumers, businesses are also starting to enjoy the benefits that come with a faster broadband connection.

As 4G and Fibre optic broadband bring advancements in the way businesses can operate, it’s vitally important to understand how your business can thrive and not be left behind in what has become a significant aspect of long term business success.

  • Connections speeds: While Fibre optic will dramatically improve speeds in the workplace, 4G will do the same for anyone on the move and in business, time is money. Working online is no different than working in a factory or retail and the quicker employees can operate, the better value for money you will get as a business owner; something that could lead to you gaining the advantage over your rivals, should they miss the boat.
  • File sharing: This is another area in which businesses that rely heavily on the Internet will see significant advancements. As well as being able to file share much quicker within the workplace, workers will now be able to file share at home and on the move. As well as improving speeds, users will now have the freedom to file share when they want to and not have to wait until they are at work to complete tasks. This should allow for smoother running of many businesses.
  • Online collaboration: From instant messaging to online conference calling, both 4G and Fibre will open doors that have, until now, remained closed, thanks to online collaboration. Users within the office will be able to work far more effectively with others anywhere in the world. 4G users will also enjoy huge benefits, as restrictions that stop users from taking conference calls at a time and place that suit them will be removed. Whilst this is currently possible with 3G, the service is often poor and as such unviable.

It’s time:

The more your business relies on the Internet, the greater the emphasis you should be placing upon understanding and utilising 4G and Fibre optic. Many businesses are now making the transition to the Internet, with it playing an ever increasing role in the long term success of companies both small and large.

The door isn’t opening to just large businesses. As NBS points out, small businesses who have thus far been priced out of the market due to being unable to afford software applications, will be able to utilise the cloud more effectively as well, thus ensuring that they can compete with larger organisations

Neither 4G nor Fibre optic are available everywhere at present, so you may have to be a little patient in some areas. However, if it is and you haven’t taken the first steps, then maybe now is the time. You may be losing ground to your competitors.

2 Comments

Filed under Business Development, Cloud Computing

How Will the Cloud Change Computers?

Kelsey Clark brings her perspective on “The Cloud” in this guest article.

The Cloud is one of the tech world’s most-discussed concepts. Embracing a wide variety of different paradigms, the Cloud is an evolving concept. The basics of what the Cloud means, however, are well established. Here are a few questions people are asking themselves about what the Cloud will mean for computing in the future.

1. Security Changes
With the data stored on remote hard drives and computation being done on remote processors, the Cloud promises to move most security issues to servers. Local security issues will not necessarily lead to data being compromised. However, server security will become even more important; compromising a major Cloud server will potentially lead to thousands or millions of users having their data compromised. Are current security measures enough to prevent hackers from accessing personal data?

2. Privacy
Having all data on a remote site will raises questions about how companies will use this data. Will minor encroachments on privacy be met with customer resistance? Will users tolerate having their data scanned and used for targeted ads? In the tech world, low prices help increase a customer base. Finding the right balance of low cost and sufficient privacy, however, may take some time for the market to determine.

3. Performance
For some types of programs, the Cloud paradigm works well. Whether all programs can be run in a Cloud environment, however, remains an open question. Some envision the future Cloud as a paradigm that takes advantage of local processing power and RAM, but others believe that this eliminates some of the advantages of Cloud computing. Further developments may be necessary to ensure that the Cloud performs as well as users demand.

4. Operating Systems
Some are speculating if the Cloud will remove the importance of having a modern operating system. A browser may be all that is necessary to run important programs, so will users begin to use alternative operating systems more often? Apple’s operating systems currently suffer from their inability to run certain industry-specific programs needed for work, and Linux distributions flourish in the server world but languish on the desktop. Will the Cloud increase these platforms’ presences?

5. Sense of Ownership
Many expect that the Cloud programs of the future will require that users pay a monthly or yearly fee to access the program. In this sense, users do not truly own the program. Studies have shown that people prefer to buy products outright instead of paying for access when necessary. Will this lead consumers to reject the Cloud?

The Cloud is clearly making inroads in the business world. For individuals, however, its impact remains unclear. With a number of programs expected to become available online in the coming years, the tech world may get some indication on how popular the Cloud will be.

Author Byline:

Kelsey is the editor in chief for www.findananny.net/. She loves to write article and ideas that parents & nannies would be interested in hearing. She helps society on giving information about nannies through nanny services. She is a professional writer and loves writing on anything.

4 Comments

Filed under Cloud Computing, Connected Devices, Guest Writers, Opinion

Five Steps for a Secure Cloud Transition

In this post, guest author David Maman, CTO and founder of GreenSQL – the database security company – lays out a series of simple steps for cloud migration – ensuring security is systematically addressed.

Five Steps for a Secure Cloud Transition

imageAlmost every type of SMB is examining it’s current IT infrastructure, determining what data and processes can move to the cloud. Of course, security remains one of the biggest concerns.

Here are five steps to make the transition much safer for your data, and your company:

1. Understanding my “Attackability Surface”: Before considering migrating to the cloud, map every project component, and map all the hazards. Including which operating systems will be used, which applications will be installed, which types of security mechanisms are required for each component and, which types of access are required for each service running on this cloud.

Generally, after truly understanding the project scope, the risk becomes controllable.

2. Sharing is Not Caring: Many times, using cloud services involves sharing infrastructure and applications with others, which means that the risk factor is multiplied.

The lack of security configuration at one customer, of application vulnerabilities by other customers, can lead to data loss in your databases. Make sure which components you share, and which are dedicated to you.

Often, when it comes to your customers’ or employees’ sensitive information, you cannot avoid purchasing a private cloud for most components.

3. Command and Control: Demand your cloud providers give you true control and monitoring of any, and all, security components. If necessary, even insist that only you will be able to change the configuration of these components.

If it’s just a network firewall, if it’s a web application firewall, if it’s a database firewall or any other element, those elements ensure your level of risk and your business survival on the cloud. Make sure you are aware of any changes in any security element.

4. The Cat in the Hat: The “Cloud” is a beautiful buzzword; every vendor in the entire IT segment is using the word “Cloud” in presentations and sales speeches. But eventually we have to understand, “Cloud” is really only a hosting service; it might be more advanced; it might support “elastic” growth; it might even provide an extremely easy user interface.

Please make sure you understand that the “Cloud” is “smart” shared hosting, which means that many people may have physical access to the servers that host your data and operating systems.

You can almost never be sure that if – your servers have restarted, it’s not because someone copied the hard drive you are using. Encrypt what you can, and make sure that the most sensitive information is not on the “Cloud.”

5. Software As A Service (SaaS) can work: Salesforce taught us that SaaS can actually work, with extremely high business continuity and extremely high levels of security.

Many Fortune 1000 companies use Salesforce with some of their most sensitive information. The thing is is that Salesforce has invested $100s of millions on infrastructure and security, which more than 90% of other SaaS providers will ever be able to afford.

So, if you decide to go forward and adopt a SaaS provider, keep in mind that size does matter; the bigger the provider (and we’re not talking about boutique providers who cost a fortune), the more secured they are.

6 Comments

Filed under Cloud Computing, Guest Writers

Oracle Earns More Than Analysts Expected

imageOracle has been around for ages. As a developer and a provider of innovation and advanced technology, it has rivaled the top contenders in the market. Since its inception, it has kept a competitive stance against giants such as IBM and, has held it’s ground.

Despite rumors of dissolution, and the idea that it has been weakening over the years through various database attacks and criticisms it has received, Oracle has been completely stable and, has been raising its ante since day one.

Oracle and Its Change of Game

Since its inception, Oracle had kept a serious hand on the game and on the competition – acquiring firms one after another. Following Oracle’s announcement of its plan to focus on Internet based software, it may have appeared that Oracle was throwing in the towel in terms of software development. Oracle, however, made it clear that this was not the case. Instead, it was simply leveling the playing field into something more appropriate.

Oracle and the Future with Cloud Computing

Oracle found the future in cloud computing. Cloud computing – an Internet based database management system – is all the rage with its power to provide complete accessibility and permanent data storage. Unlike the old days, when cloud computing was rarely possible – the idea which Oracle developers have been advocating for decades, has become a reality.

Innovating More, Earning More

Experts never anticipated the surge that Oracle has experienced with its change of course. It was quite a gamble – but, led by CEO Larry Ellison, Oracle has found a way to deliver. Creating cloud based software for clients, Oracle has found its calling in the ever changing world of technology. Oracle has managed a twenty percent rise in its earnings in the past few years – since changing its focus.

Oracle Steadily Rising

Through cloud computing development, it has earned over $1 Billion and, it has become the second largest earner in this field. Oracle will continue to create Internet based software and cloud computing systems to meet the needs of the new market. Dominating this new field, is where it’s at.

About The Author:

This guest post is contributed by Norris Lemuel Lasay who has been working as an online article writer for quite some time, covering a range of topics including gadget reviews, social media marketing, wireless internet and other technology related topics.

4 Comments

Filed under Cloud Computing, Guest Writers

Google Glasses – Can You See Me Now?

clip_image002 Credit:Google

Google has done it again. Coming up with a brand new concept, Google Glasses. Google intends to augment reality with glasses that connect the real world to the internet database. Just imagine moving through your town and automatically getting visual information like addresses, maps, and even construction closures appearing organically in front of your eyes. One thing is for sure, you would never get lost again.

It is like a science fiction novel. Wearing something that connects you to the online world is not a new concept, but the actual practice of it has proved to be exceedingly difficult. Leave it to Google to come up with a viable means.

But the question here is; would you actually wear them? Are they useable, or just another way to cause accidents or injuries? Tech geeks the world over think the proposed glasses are nothing that will ever be mass produced or see widespread use, but for those internet addicts out there, these Google Glasses sound like perfection.

No more lost phones or hard to use GPS systems. No more point and click for alternate routes or forgetting someone’s name or personal details. With Google Glasses, your alternate routes are all planned ahead and as you talk to your friends and acquaintances, their Google + profile pops up, giving you all the information you’d forgotten. With Google Glasses you can even keep track of where your friends are, what traffic is like on the road ahead, and what new concert is scheduled that night, all without having to take your eyes off the road.

Not only does the invention and use of Google Glasses mean accessibility, but it also means you can accurately share your life and experiences. As the Google Glasses concept video below* portrays, the Glasses will allow you to show others, accurately and in real time, what you are seeing and hearing.

You can only conceive of the applications. What would it be like to record your lifetime, your kid’s first steps, a gorgeous sunset, and share it immediately with your friends and family? And do all this without having to drag around a computer, a camcorder, or a camera.

The simplicity of the idea lends itself well to its application. The streamlining of technology into our lives grows with every new invention like Google Glasses. We will have to experience it to see if this is what the future brings, but so far the future looks promising… if a little geeky.

*Check out this concept video Google released for Google Glasses.

About the Author:

This guest post is contributed by Debra Johnson, blogger and editor of nanny babysitter.

She welcomes your comments at her email Id: – jdebra84 @ gmail.com.

9 Comments

Filed under Cloud Computing, Google, Guest Writers, Integrated Solutions

FlashToMyPC – Access Your PC Remotely

Carrying computer files with you while you’re on the go is a breeze – USB devices, for example, are perfect for the job. File portability doesn’t stop there though. With a little planning, you can access your files through a Cloud based storage solution – SkyDrive, DropBox, Box.net – readily come to mind.

Here’s the kicker though – both of the above require that you plan ahead so that the required files are stored either on the USB device, or resident in the Cloud. Despite this plan ahead strategy, you may still run into one of those “uh, oh” moments. Robert Burns hit the nail on the head when he wrote (pardon the misquote) – “The best laid plans of mice and men often go astray”.

If the file/s you need – then and there – are not on your USB device, or stored on a Cloud server, you’re probably looking at one of those “uh, oh” moments. Luckily, there are solutions to those almost inevitable – what am I going to do now times – that we’ve all experienced.

FlashToMyPC, developed by the folks at GigaTribe, which utilizes a good deal of the latter product’s technology, is a USB application which will allow you to access your entire hard drive from any Internet connected computer.

Here’s the lowdown:

image

Graphic courtesy of FlashToMyPC. Click on graphic to expand to original size.

Step by Step installation

Select the USB device to which you will install the application.

image

Once I had installed the application I took a quick look, using Windows Explorer, to ensure the executable installed correctly. Click on graphic to expand to original size.

image

Launching the executable (from the USB device), will bring up the following screen so that the second part of the install can be completed ……

image

the installation of FlashToMyPC on the selected machine.

image

Setup continues with the usual user name and password input requirements.

image

That’s it!

image

From now on, just insert your Flash drive into an Internet connected machine to access your own Hard Drive.

For the security conscious user (and, who isn’t theses days), the developer has built-in a number of hardcore security features, including

Only your USB Flash Drive can access your computer.

Your Flash drive is identified via a unique combination of hardware ID, software ID, username and password.

All data exchanged between your flash drive and your computer is encrypted (AES 256).

Transferred files are downloaded directly onto your USB Flash Drive, leaving no trace on the computer.

After 3 failed password attempts, your computer access is suspended for 24 hours.

If you’ve lost your USB flash drive, you can delete your computer’s access to it.

Deleting a Flash drive’s access link is easy.

image

System requirements: Windows XP, Vista, Win 7. According to the developer a Mac version

FlashToMyPC is not freeware but, you can download a 30 day free trial at the developer’s site. You may continue past the trial date, at an annual fee of $9.95 USD.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under Cloud Computing, Connected Devices, downloads, Encryption, File Sharing, Geek Software and Tools, Interconnectivity, Networking, Portable Applications, Software, Software Trial Versions, USB, Utilities, Windows Tips and Tools

NEW – Panda Cloud Antivirus 1.5 Released

imagePanda Cloud Antivirus 1.5, Panda Security’s newest release (June 20, 2011), of it’s popular cloud-based antimalware application, should be even more effective at keeping the bad guys at bay with it’s newest enhanced features.

New features include – improved scanning speeds, less CPU consumption, advanced configuration options for exclusions of files based on file extensions, and a new activity monitor which shows information such as scanned file details, and previous viruses detected.

Panda Security obviously pays attention to its users recommendations for improved product features, since a number of these new features were suggested by the user community.

Panda Cloud Antivirus is based on Collective Intelligence, a system for detecting and disinfecting viruses and other threats that feeds off the knowledge shared by millions of users. The computers that are part of the Panda Community – instantly share and benefit from all the information stored in the cloud.

Testing anti-malware applications takes considerable time in order to get to the heart of the matter – does an application work in the “real world?”

Will the application do what an average user expects – does it block malware effectively and efficiently? Particularly new, or emerging, malware threats.

Is the interface crafted in such a way that an average user doesn’t need to digest an instruction manual in order to navigate the application?

Is the application capable of providing adequate protection without stressing system resources?

I’ve been running Panda Cloud Antivirus, on a secondary system, since April 2009, and in this extensive testing, Panda Cloud Antivirus has met, or exceeded, all of these requirements. So, I’m looking forward to giving this new release a workout.

Installation:

Pay particular attention at the Install screen. Once again, you’ll be asked to accept a Toolbar and a change in your Homepage – annoying as hell. As well, on this screen, you can choose your language.

image

Panda is obviously convinced that the “more is less” GUI approach, is suitable for most users. Kudos – I couldn’t agree more.

image

The optimized scan screen.

image

Scan time: under 5 minutes – 19,873 files.

image

image

The settings menu is accessed via the tool icon – as shown at the “hand icon” in the above screen shot. I found this “hideaway” a little awkward.

image

Despite an abundance of settings you’ll find some settings are only available in the Pro version.

image

At less than $30 for the one year Pro Edition license, you might consider jumping up to this version. Frankly though, I’m no fan of one year licenses.

Not when one considers that a lifetime license for Malwarebytes’ Anti-Malware and SUPERAntiSpyware, both of which are outstanding applications, can be purchased for less than $30 – considerably less when on sale.

Fast facts:

Light – Only works where necessary. It’s so light you won’t even notice it.

Easy – Don’t worry about complicated decisions ever again. Panda Cloud Antivirus will make the best decisions for you to keep your PC protected.

Secure – Panda Cloud Antivirus is based on Collective Intelligence, a system that continuously collects and analyzes viruses and other threats gathered from the community of millions of Panda users around the world.

Free – No tricks! Panda Cloud Antivirus has a free version that protects you against viruses and malicious websites.

Note: Panda’s Collective Intelligence servers have analyzed 175,569,053  (and counting) viruses, and known goodware.

System requirements: Windows 7 32-bit, Windows 7 64-bit, Windows Vista 32-bit, Windows Vista 64-bit, Windows XP 32-bit,  Windows XP 64-bit.

Panda Cloud Antivirus is available in 20 languages.

Download at: Panda Security

Backed by more than two years experience running Panda Cloud Antivirus in various editions, I have no hesitation in recommending Panda Cloud Antivirus 1.5 as a front line antivirus application.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

9 Comments

Filed under 64 Bit Software, Anti-Malware Tools, Antivirus Applications, Cloud Computing, Cloud Computing Applications, Cyber Crime, downloads, Free Anti-malware Software, Freeware, Internet Safety Tools, Malwarebytes’ Anti-Malware, Panda Security, Software, SUPERAntiSpyWare, Windows Tips and Tools

The Importance of Real-Time Server Monitoring

There’s nothing more frustrating than trying to access information online and being met with that annoying little Error 404 page. Think back to the times you’ve experienced this frustration, and now imagine your customers or consumers having to experience it because of your website. This, in itself, is reason enough to invest in real time server monitoring, something any good IT support company should offer.

What Is It?

Real time server monitoring is software that allows you or your IT department to monitor in real time any glitches or problems that may arise with your server. As soon as something goes wrong or a site begins experiencing problems, you can address the problem then and there.

Benefits:

Feedback

Especially if your site is in its infancy or beta testing stage, feedback on the way your site runs is crucial to making those tweaks and changes that turn a good website into a great website. Real time server monitoring is a means by which you can receive and analyze this feedback before it has a chance to harm your business.

Sales

If you are operating an e-commerce website, where you offer people the option of buying your products online, it is of the utmost important that your server is running and healthy at all times, and that any downtime it may experience is rectified immediately as it happens. Imagine your store is not online, but is in a shopping mall, and you left it unattended and shut up for half a day. Do you think customers would hang around until you finally returned to open the store, or do you think they’d go and find their products elsewhere? I know which one I’d choose!

Mail

Another reason that real time monitoring is so important is that you need immediate and full access to any correspondence you may receive or need to send. In a professional environment, emails are the number one form of communication, and what’s more, with the advent of Smartphones and wireless technology, we expect our emails to be answered in as short a time as possible. If your server has problems that prevent emails from being properly delivered, you are virtually missing out on business meetings and opportunities, which in this fast paced world, will not wait around for you.

What To Look For

If you’re choosing a real time monitoring service or software you should look for a program that is able to check your site using HTTP, HTTPS, FSTP, FTP and FTPS protocols. It’s also highly advisable to go for a program that offers data recording and statistics, so that you can analyze the efficiency of the server and how often it is down—this can be helpful in deciding whether or not you’re with the right hosting service. Your IT support service will be able to advise you as to which programs are better suited to your needs, and in consultation with them you can find a solution that protects your business and website.

Guest article from Sachin.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under Cloud Computing, Integrated Solutions, Network Tools, Networking

Ditch Facebook – Go Private With Free Flink12

imageThere are 600 Million plus, active Facebook users, but I must confess – I’m not one of the active users. It’s true, I do have a Facebook page but, I use it sparingly.

Since many software developers are now into the – “visit our Facebook page, click on the Like button, and we’ll give you ……….” school of marketing,  I use my Facebook account to meet this manipulative requirement.

My list of grievances with Facebook is a long one, but privacy, or more precisely, the lack of privacy, overrides all other concerns – I’ll leave the considerable security issues aside, for the moment.

I’ve always found it difficult to get a handle on Facebook’s constantly shifting definition of privacy and, it’s difficult to understand and hard to apply, personal privacy restrictions.

Maybe I’m old fashioned, but I just can’t get my head around the idea of putting private information out into the ether of the Internet. On the other hand, there are those who love the Facebook experience, and it seemingly plays an important role in their lives. I think it’s safe to say, that this is a market which will continue to grow exponentially.

Some people see this as inevitable progress – but I’m not one of them. Instead, my definition of progress in this market, is the development of private social networking platforms. Platforms that are designed specifically for friends, families, and  work teams, to privately share, discuss, organize photos, videos, etc., – all in a single easy to use private environment.

One such platform that caught my attention recently is Flink12. It was a “no-brainer” really. An application that can set out in a sentence, or three, an approach to privacy that meets my requirements, is sure to grab my attention.

Here’s what Flink12 has to say on social sharing privacy:

“Privacy first” is the highest priority at Flink12. This approach ensures that your personal information will remain completely secure. With no privacy settings to manage, your information is automatically safe. Personal information will not indexed on the web by search engines. You decide when, where and how much of your life you want to share and with whom.”

Since Flink12 passed my first test, I went on to the next set of questions – did it meet my requirements for functionality? Did it meet my requirements for usability? It did in both cases – and, the following list of features was very convincing.

Fast facts:

Safe & Private – Our “Privacy first” approach ensures that your personal information will remain private. Your information will not be indexed on the web by search engines. We designed Flink12 at its roots to be “udderly” private. Users have complete control.

Easy Photo Sharing – Easy to upload, free, fast, private photo sharing. Caption your photos. Comment on photos. There are several options for sharing each photo and privatizing comments. It’s truly the best way to share photos and comments.

Private Texting/Chat – Free instant communication one-on-one between you and any person in your Flink. Texting is free on Flink12.

Blogging – Write about your personal thoughts and activities as often as you wish. Blogging on Flink12 is quick, easy and fun. There are several options for sharing of blogs and comments amongst your flinks.

Friend Mapping – See where your friends are anytime, worldwide. You have a choice to show your location to your Flink friends or not. Very useful for travelers or friends and relatives across the globe or meeting up with friends for coffee.

Playful Icon Themes – Never forget to play. Our icons are all about expressing yourself in a playful way. Flink icons are uniquely humorous and allow you to quickly share your mood, health, activities and events using preset text or by entering your own text. Choices of several fun themes such as Moms & Babies, Sports Fans, Diva’s, Teens and Pets are coming soon.

Web & Apps – You can join and update on any platform- website, iPhone, iPad, iPod Touch and Android and you only have to post it once- Flink 12 updates seamlessly on all platforms.

Alerts – There are several options for notifications or alerts from your friends. On mobile, MOO’s and cowbells let you know when your friends have posted fresh news.

For more information and to sign up – visit the developer’s site: Flink12

Bottom line:

Flink12 is a technology rich application; full of powerful features – many more than I’ve been able to cover in this short review. At the same time, Flink12 has been designed for speed and simplicity.

If you’re into social networking and privacy is a concern, then take Flink12 for a test drive – I think you’ll be glad you did.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

10 Comments

Filed under Cloud Computing, Connected Devices, downloads, Freeware, Interconnectivity, Mobile Applications, Networking, Peer to Peer, Privacy, Social Blogging, social networking, Social Networks, Software, Windows Tips and Tools

Conseal Security Takes Portable Device Security To Another Level With Conseal USB

“This tape will self-destruct in five seconds!” – Mission Impossible.

Growing up in the 1960’s, I though that was just the coolest phrase – and the underlying technology, of course. As a way of keeping confidential  information out of the hands of the bad guys, what could be better than that? BOOOM!

Today, safeguarding confidential information is far more complex – and there are many more “bad guys”. Information, in a very real sense, is currency – and the need to protect it is every bit as real as if it were hard currency.

Unfortunately, protecting critical data in an age of extreme data portability (USB sticks, portable Hard Drives, memory cards …. ) against theft, or loss, is exasperated by the very nature of portable technology.

How hard is it to lose a USB key through theft or misadventure – easy (personally, I’ve lost two over the years).

How hard is it to lose a portable Hard Drive through theft or misadventure – easy.

How hard is it to lose a memory card through theft or misadventure – easy.

How hard is it recover any one of the storages devices mentioned? Hard. Hard. Hard.

While it’s true, that both password and encryption applications, offer some protection against unauthorized access should a portable storage device vanish, neither provides absolute protection. Both password cracking, and decrypting applications (and the computing resources necessary), are readily available to those with less than honorable intentions.

What’s needed then, is a technology that not only offers password protection and file encryption, but the ability to remotely destroy data on a non-recoverable device – if it becomes necessary.

I suspect that the Ministry of Defense in the UK, would have been delighted with this type of technology had it been available when, in 2008,  fifty eight Ministry of Defense unencrypted drives – which contained details of troop movements, locations, and travel accommodation, were “lost”.

Certainly, portable media device theft, or loss, is not restricted to organizations; it can just as easily happen at an individual level. For example, in the U.K., in 2008, – 9,000 USB drives were found by dry cleaners in various articles of clothing. It’s safe to say, that data loss and data leakages related to lost or stolen computer portable devices, are now commonplace.

Luckily, Conseal Security has just released a security safety system  that not only includes strong AES encryption, it allows protected devices to be remotely self-destructed, if they are lost or stolen. Moreover, as part of the package the ability to lock devices to specific networks, domains or specific computers, is included. A bonus feature includes a capacity to review all access attempts on a device.

Application setup, including creating an account which provides access to all of the programs features, is straightforward.

image

The initial account password will be emailed to you. The temporary account password in the screen capture shown below, has been changed.

image

Once logged in, you can proceed to manage the portable device attached to your machine.

image

In the following screen shot, you’ll notice I have logged in and entered a name for the attached device.

image

The USB drive I used for this test was quite small (512 MB), so the encryption and registration took less than two minutes.

image

image

As per the message box, no files were accessible on Drive F: (the original drive designation) – instead the files were on Drive G: (the newly concealed drive).

image

Following encryption of the drive’s contents you will have a number of options to choose from, including –

Access Control

You can set up rules to control where and when this device can be unlocked.

image

Alerting

You can set up alerts to email you when this device is used.

image

Self Destruct

You can securely delete the contents of this device if it has been lost or stolen. It will become a blank disk.

image

Unlocking the portable device is an uncomplicated process – as shown in the following screen captures.

image

image

A taskbar popup will notify you on successful completion of the “unlock” process, as illustrated in this screen capture.

image

Fast facts:

Remote self destruct – If your Consealed device is lost or stolen, you can remotely destroy the data it contains. Press a button on a website and the contents of your device will be securely wiped when next inserted.

image

Who’s accessed your data? – View a log of who attempts to unlocks your Consealed device, including who they are and what computer they used. The log shows all access attempts and contains sufficient information for law enforcement officials to uniquely identify the computer used.

image

Define who can access your data – Specify the computers or network domains which can unlock your Consealed device. Also specify what times of the day it can be unlocked. Rules can be changed even when the device is out of your hands.

image

Safe from password guessing attempts – Even fairly complex passwords can be guessed on average within 16 minutes. Conseal’s “Dual Locks” system completely secures your protected data against password guessing attempts. Consealed devices can only be unlocked with permission from a central server.

Warnings of attempted break-ins – Receive email warnings when someone tries to unlock your Consealed device, directly and uniquely identifying the user, where they are, and what computer they used.

Strong encryption – Your data is stored using super-strength 256-bit AES encryption (approved by governments to protect ‘Top Secret’ information).

Takeaway: A very impressive and elegant solution to a potentially disastrous occurrence at a cost that’s appropriate.

Conseal USB Licenses:

Home User – 1 year’s protection. Non-commercial use only. Up to 5 devices £19.95.

Corporate User – 10 devices £140 (for 1 year). 100 devices £99/month. 1000 devices £830/month. 10,000 devices £5950/month.

Conseal Security offers a full no-quibble 14 day money-back guarantee from date of purchase.

System requirements: Windows XP and above.

Devices: You can Conseal literally any USB storage device. This includes memory sticks, USB pen drives, external hard disks, SD / MMC / xD / CompactFlash cards. It also includes all Firewire, eSATA and USB3 devices. Conseal is completely device and manufacturer independent.

Further details, and a 15 day Trial download are available at the developer’s site – Conseal Security.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

3 Comments

Filed under Business Applications, Cloud Computing, Computer Tools, Connected Devices, Cyber Crime, Cyber Criminals, downloads, Encryption, Encryption Software, flash drive, Geek Software and Tools, Software, Software Trial Versions, Surveilance Tools, USB, Windows Tips and Tools