Geek News: Latest Technology, Product Reviews, Gadgets and Tech Podcast News for Geeks


Tag: Data Security

Rocstor Encrypted External Hard Drives

Posted by Andrew at 6:12 PM on February 25, 2013

Rocstor LogoRocstor specialise in data storage and secure encryption solutions: that’s encrypted external hard drives to you and me, but it’s an increasingly important market. Andy and Scott talk to Anthony Rink from Rocstor about how their products can keep your data safe.

Rocstor offers a range of external data storage products with real-time encryption built-in as standard. The encrypted drives meet FIPS Level 2, meaning that it’s hardware-encrypted (not software) and that any tampering of the drive to get at the crypto keys is obviously apparent. To suit different circumstances, some models use tokens, others PINs and some use both with ruggedised and waterproof units also available. Depending on features, $250-$300 gets you 1 TB of secure external storage.

Interview by Andy McCaskey of SDR News and Scott Ertz of F5 Live for the TechPodcast Network.

Support our coverage sponsors:
Dropcam.com watch life High-Def streaming of your home or anywhere today!
Gazelle - Sell your Gadgets for Cash
25% off your order @ Godaddy.com: Promo Code go25off5
50% off new hosting plans with a free domain! Promo Code: 50host7
50% off 1st year of Business Website Builder & free domain Promo Code: 50wsb7
GoDaddy Promo Codes always save you money, check out my Promo Codes Today

 

A Six Sigma Approach to Security

Posted by geeknews at 1:14 AM on September 7, 2004

How sure are you that your security policy is effective. Let’s say that it is, so how effective is it? What costs are incurred by the policy, and I don’t mean just monetary. One way to answer these questions and ensure the policy is not only effective, but also efficient, is to apply the Six Sigma approach.

I’m meeting more and more IT folk who are Six Sigma trained, either Black Belt or in training for the recognition. A Black Belt must be able to explain the philosophies and principles of the quality program, including how systems, tools, processes, and continuous improvement can best be applied at multiple management levels and to diverse business processes throughout the organization., (quality, process/continuous improvement, etc.) and will be able to apply them in various business processes throughout the organization. However, quality is frequently mentioned in terms of product development and manufacturing. I think that it must also be applied to digital security.

Who is responsible for the security of digital assets? Each and every employee who has contact with the data must understand that she’s responsible for the data’s security, to the extent authorized by her corporate authority. However, policies based on making everyone responsible rarely succeed, be cause ultimately, no one accepts the personal responsibility. By using a Six Sigma approach, the security analyst starts at the other end, rather than the corporate user of data, the analysis begins with the customer, ultimately the real end user of corporate data. The Six Sigma process can evaluate security holes, causes, and what long-term affects intermediate actions have by evaluating the number of times customer service has been affected by security failures.

Dave’s Opinion
The Six Sigma approach to effectiveness and quality assurance is based on ensuring no failures occur. Sigma is used to mean deviations from the norm: defects from perfect quality. Six Sigma means that only 3.4 defects per million occur.

The Six Sigma approach is popular in many management applications, not just information technology; however, I have rarely seen it applied to security management. Maybe, it’s time.

Call for Comments
What do you think? Leave your comments below.

References
Six Sigma
101 Things A Six Sigma Black Belt Should Know