<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BEDRIFTSYSTEMER AS</title>
	<atom:link href="https://insec.no/feed/" rel="self" type="application/rss+xml" />
	<link>https://insec.no</link>
	<description>Secure Storage Solutions</description>
	<lastBuildDate>Tue, 03 Sep 2019 07:59:26 +0000</lastBuildDate>
	<language>nb-NO</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.3.11</generator>

<image>
	<url>https://insec.no/wp-content/uploads/2016/10/cropped-BedriftsystemerLogoIcon2-32x32.png</url>
	<title>BEDRIFTSYSTEMER AS</title>
	<link>https://insec.no</link>
	<width>32</width>
	<height>32</height>
</image> 
                                          	<item>
		<title>DatAshur Pro2</title>
		<link>https://insec.no/datashur-pro2/</link>
				<pubDate>Mon, 02 Sep 2019 18:36:54 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://insec.no/?p=2187</guid>
				<description><![CDATA[FIPS 140-2 Level 3 compliant Tamper proof &#38; evident design All critical components are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components. If breached, the tamper evident design of the datAshur PRO² will provide visible evidence that tampering has occurred. [&#8230;]]]></description>
								<content:encoded><![CDATA[
<h4>FIPS 140-2 Level 3 compliant Tamper proof &amp; evident design</h4>
<p>All critical components are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components. If breached, the tamper evident design of the datAshur PRO² will provide visible evidence that tampering has occurred.</p>
<h4>Performance</h4>
<p><strong>130MB/sec</strong>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<strong>116MB/sec</strong><br>read speed.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;write speed.<img width="150" height="300" class="size-medium wp-image-2179 alignright" alt="" src="http://insec.no/wp-content/uploads/2019/09/datAshur-PRO2_front-150x300.png"></p>
<p>&nbsp;</p>
<h2>Available Capacities*</h2>
<div class="cei-feature-capacities-gb-min">
<div class="cei-feature-capacities-gb-wrap">
<div class="cei-feature-capacities-block">&nbsp;</div>
<div class="cei-feature-capacities-block"><strong>4 &#8211; 8 &#8211; 16 -32 &#8211; 64 &#8211; 128 &#8211; 256 &#8211; 512 GB</strong></div>
<div>&nbsp;</div>
<div class="cei-feature-capacities-block">
<h4>Independent user &amp; admin PIN</h4>
<p>Which makes it perfect for corporate and government deployment. If the user forgets their PIN, the drive can be unlocked by the admin PIN, the admin can then allow the user to set a new PIN.</p>
<h4>Bootable feature</h4>
<p>Install an OS on the datAshur PRO² and boot directly from it.</p>
<h4>OS &amp; platform independent</h4>
<p>No software required.<br>Works on any device with a USB port!</p>
<p><i>compatible with: MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients, Embedded Systems, Citrix and VMware</i></p>
</div>
<div class="cei-feature-capacities-block">
<h4>On-device Crypto-chip</h4>
<p>Offering 100% real-time military grade AES-XTS 256-bit Hardware Encryption with FIPS PUB 197 validated encryption algorithm</p>
<h4>Uniquely incorporates Common Criteria EAL4+ ready secure microprocessor</h4>
<p>Which offers ultimate security against hackers, detecting and responding to tampering with features such as:</p>
<p>– Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks</p>
<p>– Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors</p>
<p>– Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection</p>
<p>– Secure Memory Management/Access Protection</p>
<div class="cei-brute-force-attempts">
<h4>BRUTE FORCE HACK DEFENCE MECHANISM</h4>
<h4>Intelligently programmed to protect against all forms of brute force attacks.</h4>
<p>If the User PIN is entered incorrectly 10 consecutive times, the User PIN will be deleted and the drive can only be accessed by entering the Admin PIN in order to reset the User PIN. (Admin can change this from the default 10 incorrect PIN entries, to 1-9, for the User only)</p>
<p>If the Admin PIN is entered incorrectly 10 consecutive times, all PINs and the encrypted encryption key will be lost forever.</p>
<p>&nbsp;</p>
</div>
</div>
</div>
<div class="cei-feature-capacities-block"><img width="300" height="275" class="size-medium wp-image-2178 alignleft" alt="" src="http://insec.no/wp-content/uploads/2019/09/datAshur-PRO2-components-1-1-300x275.png"><strong>1. LED lights<br></strong><strong>Red</strong> – standby state<br><strong>Green</strong> – User mode<br><strong>Blue</strong> – Admin mode<br><strong>2. Polymer coated, wear resistant, alphanumeric keypad</strong><br><strong>3. Common Criteria EAL4+ ready secure microprocessor</strong><br><strong>4. Epoxy coating</strong><br><strong>5. Hard anodized and ruggedized extruded aluminium housing</strong><br><strong>6. Key button</strong><br><strong>7. SHIFT button</strong><br><strong>8. Zinc alloy (can be attached to keyring)</strong><br><strong>9. Rubber gasket</strong><br>Making the module waterproof when sleeve is fitted</div>
</div>
<div>&nbsp;</div>
<div>&nbsp;</div>
<div>
<h4>User PIN enrolment</h4>
<p>The Admin can set a restriction policy for the user PIN. This includes setting the minimum length of the PIN, as well as requiring the input of one or more ‘Special Character’ if needed. The ‘Special Character’ functions as ‘SHIFT ( <img width="12" height="17" alt="" src="https://istorage-uk.com/wp-content/uploads/2019/06/Shift-key-svg-2.png"> ) + digit’</p>
<h4>One-time User recovery PIN</h4>
<p>Admin configurable, extremely useful in situations where a User has forgotten their PIN, allowing the User to unlock the device and set a new User PIN.</p>
<p>&nbsp;</p>
<div class="col-xs-12 col-sm-12 col-md-6 col-lg-6">
<h4>Device reset feature</h4>
<p>Deletes the encrypted encryption key, all PINs and renders all data as lost forever. The device can then be redeployed which randomly generates a new encrypted encryption key, a process that can be repeated as many times as required.</p>
<h4>Whitelisting on networks</h4>
<p>Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements.</p>
<h4>Self-destruct feature</h4>
<p>Pre-program the datAshur PRO² with a self-destruct PIN, once entered, the encrypted encryption key and all PINs are deleted and all data is rendered as lost forever</p>
</div>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>CloudAshure</title>
		<link>https://insec.no/cloudashure/</link>
				<pubDate>Mon, 02 Sep 2019 15:31:03 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://insec.no/?p=2169</guid>
				<description><![CDATA[The future  of cloud data Security  &#8211; CloudAshur is the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud. cloudAshur eliminates the security vulnerabilities that exists with cloud platforms, such as lack of control and unauthorised access. Hackers and vulnerable users. Human error is also prevalent amongs data leakage incidents. The [&#8230;]]]></description>
								<content:encoded><![CDATA[
<p><strong>The future  of cloud data Security </strong> &#8211; CloudAshur is the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud. cloudAshur eliminates the security vulnerabilities</p>
<p>that exists with cloud platforms, such as lack of control and unauthorised access. Hackers and vulnerable users. Human error is also prevalent amongs data leakage incidents.</p>
<p>The consequences of a cloud account being  hacked can bring  about theft and leakage of confidential data, leading to potential job losses, adverse publicity, hefty fines and downfall of business.</p>
<p><strong>ENCRYPT</strong></p>
<p>to ensure the ultimate protection of your data stored in the cloud or on your local PC/MAC or any data storage device</p>
<p><strong>SHARE</strong></p>
<p>Your encrypted data security with authorised users in the cloud as well as email and file transfer services in real-time.</p>
<p><strong>MANAGE</strong></p>
<p>and monitor your cloudAshur device centrally</p>
<p><strong>On-device Crypto-chip</strong></p>
<div class="table-responsive">
<p>Offering 100% real-time military grade AES-XTS or AES-ECB 256-bit Hardware Encryption with FIPS PUB 197 certified USB 3.0 encryption controller.</p>
<p>Uniquely incorporates Common Criteria EAL4+ ready secure microprocessor</p>
<p>Which offers ultimate security against hackers, detecting and responding to tampering with features such as:</p>
<p>&#8211; Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks &#8211; Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors &#8211; Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection &#8211; Secure Memory Management/Access Protection</p>
</div>
<p><strong>Five Factor authentication</strong></p>
<h6>Something you have</h6>
<ul>
<li>The cloudAshur hardware security module</li>
</ul>
<h6>Something you know</h6>
<ul>
<li>7-15 digit Admin/User configurable PIN</li>
<li>Username and password for the iStorage cloudAshur Windows or macOS client app</li>
<li>Where the data is stored, which cloud provider</li>
<li>Username and password for the cloud account</li>
<li>Username and password for the cloud account.Intelligently programmed to protect against all forms of brute force attacks.If the Admin PIN is entered incorrectly 10 consecutive times, all PINs and the encrypted encryption key will be lost forever.</li>
</ul>
<div class="table-responsive"> </div>
<div>
<table>
<tbody>
<tr>
<td> </td>
<td> </td>
</tr>
<tr>
<td> </td>
<td> </td>
</tr>
</tbody>
</table>
</div>
<div> </div>
<div> </div>
<div><strong>LED lights</strong><br /><strong>Red</strong> – standby state<br /><strong>Green</strong> – User mode<img class="size-medium wp-image-2112 alignright" src="http://insec.no/wp-content/uploads/2019/07/cloudAshur-components-300x265.png" alt="" width="300" height="265" srcset="https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-300x265.png 300w, https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-768x678.png 768w, https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-1024x904.png 1024w, https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-600x530.png 600w, https://insec.no/wp-content/uploads/2019/07/cloudAshur-components.png 1403w" sizes="(max-width: 300px) 100vw, 300px" /><br /><strong>Blue</strong> – Admin mode<br /><strong>2. Polymer coated, wear resistant, alphanumeric keypad</strong><br /><strong>3. Common Criteria EAL4+ ready secure microprocessor</strong><br /><strong>4. Epoxy coating</strong><br /><strong>5. Hard anodized and ruggedized extruded aluminium housing</strong><br /><strong>6. Key button</strong><br /><strong>7. SHIFT button<br />8. Zinc alloy (can be attached to keyring)<br />9. Rubber gasket</strong><br />Making the module waterproof when sleeve is fitted</div>
<p> </p>
<p><strong>FIPS Level 3 compliant tamper proof &amp; evident design</strong></p>
<p>All critical components within the cloudAshur enclosure are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components.</p>
<p>If breached, the cloudAshur modules tamper evident design will provide visible evidence that tampering has occurred.</p>
<p> </p>
<p> </p>
<div class="table-responsive">
<p><strong>One-time User recovery PIN</strong></p>
<p>The Admin can program the cloudAshur with a one-time recovery PIN. This is extremely useful in situations where a User has forgotten the PIN to authenticate the cloudAshur.</p>
<p>This feature allows the User to enter the Recovery PIN and configure a new User PIN.</p>
<p><strong>User PIN enrolment</strong></p>
<p>The Admin can set a restriction policy for the user PIN. This includes setting the minimum length of the PIN, as well as requiring the input of one or more ‘Special Character’ if needed.</p>
<p>The ‘Special Character’ functions as ‘SHIFT</p>
<p>+ digit’</p>
<p><strong>Whitelisting on networks</strong></p>
<p>Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements</p>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>Sentry K300</title>
		<link>https://insec.no/2033-2/</link>
				<pubDate>Wed, 05 Sep 2018 12:16:07 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://insec.no/?p=2033</guid>
				<description><![CDATA[Sentry K300 Encrypted Micro SSD Drive Next Generation Security and Convenience The&#160;Sentry K300 is the only platform independent, keypad, micro SSD drive to incorporate an OLED display to enable advanced security features. The display supports true alpha-numeric password based authentication and a full featured on-board menu system. With modern security policies requiring alpha-numeric passwords, the [&#8230;]]]></description>
								<content:encoded><![CDATA[<h2 class="product_title entry-title">Sentry K300 Encrypted Micro SSD Drive</h2>
<div></div>
<div class="product-border"></div>
<div class="post-content">
<p><strong>Next Generation Security and Convenience</strong><br />
The&nbsp;Sentry K300 is the only platform independent, keypad, micro SSD drive to incorporate an OLED display to enable advanced security features. The display supports true alpha-numeric password based authentication and a full featured on-board menu system. With modern security policies requiring alpha-numeric passwords, the K300 is the only storage device with full support for alpha and numeric characters. Users can use the visual, menu driven system to change passwords, set password policy and enable other security features without ever consulting a manual.</p>
<p><strong>Central Management Ready</strong><br />
The Sentry K300 will be available as a SafeConsole Ready device in Q4 2018.</p>
<p><strong>Next Generation Security and Convenience</strong><br />
The&nbsp;Sentry K300 is the only platform independent, keypad, micro SSD drive to incorporate an OLED display to enable advanced security features. The display supports true alpha-numeric password based authentication and a full featured on-board menu system. With modern security policies requiring alpha-numeric passwords, the K300 is the only storage device with full support for alpha and numeric characters. Users can use the visual, menu driven system to change passwords, set password policy and enable other security features without ever consulting a manual.</p>
<p><strong>Central Management Ready</strong><br />
The Sentry K300 will be available as a SafeConsole Ready device in Q4 2018.</p>
<h4>CONFIDENTLY CARRY YOUR DATA EVERYWHERE YOU GO</h4>
<p>DataLocker Sentry K300 offers affordable military-grade security with 256-bit AES hardware-based encryption in XTS mode that provides always on protection for your data. Unlike software-based encryption, the Sentry K300 cryptochip does not export encryption keys to the host PC, thereby protecting against cold-boot and malware attacks.</p>
<h4>FEATURES HIGHLIGHT</h4>
<ul class="square-bullet">
<li>Supports true alpha-numeric for strong passwords</li>
<li>High speed uSSD SATA III memory</li>
<li>User and Admin roles</li>
<li>Read-only mode</li>
<li>Admin configurable password policy</li>
<li>Brute Force Hack Defense</li>
<li>Rapid secure wipe</li>
<li>Auto-Lock Feature</li>
</ul>
<p>.</p>
<div class="fusion-clearfix"></div>
<div class="fusion-one-half fusion-layout-column fusion-column-last fusion-spacing-yes">
<div class="fusion-column-wrapper">
<h4>PLATFORM INDEPENDENT</h4>
<p>The Sentry K300 is completely cross-platform compatible and OS agnostic. With no software or special drivers required, the K300 works with Windows, Linux, Mac, Android phones and tablets, Chromebooks, and embedded systems – any system that can utilize USB Mass Storage. Since the K300 also has its own power supply, the device can be used as a bootable device running Windows to Go, Ubuntu Linux, or local operating system.</p>
<h4>AVOID LOSING PUBLIC TRUST</h4>
<p>Every year, 20 million unprotected USB drives go missing. If the data stored on those drives ends up in the wrong hands, you can lose public trust, put citizens at risk and suddenly find yourself in the middle of a PR scandal. Secure USB flash drives are an essential component of a comprehensive data loss prevention (DLP) strategy. The security must be implemented in the hardware in order to combat the evolving threat landscape. With your data stored on the hardware-encrypted Sentry K300, it is always protected from unauthorized access.</p>
</div>
</div>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>NEW !!  Hiddn Kryptodisk 2 SSD</title>
		<link>https://insec.no/hiddn-kryptodisk-2-ssd/</link>
				<pubDate>Mon, 12 Mar 2018 12:26:58 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://insec.no/?p=1487</guid>
				<description><![CDATA[The Norwegian Crypto Vendor Hiddn has come out With a New Product &#8211; Kryptodisk 2. Kryptodisk 2 is en external USB 3.1 drive with two factor authentiction and SSD drive. The Product is approved for use witin Norwegian Public Services and are ready for delivery NOW !! Datasheet &#8211; KryptoDisk 2 &#8211; HSO &#8211; (GB) [&#8230;]]]></description>
								<content:encoded><![CDATA[<p><strong>The Norwegian Crypto Vendor Hiddn has come out With a New Product &#8211; Kryptodisk 2.</strong></p>
<p>Kryptodisk 2 is en external USB 3.1 drive with two factor authentiction and SSD drive.</p>
<p>The Product is approved for use witin Norwegian Public Services and are ready for delivery NOW !!</p>
<p><a href="http://insec.no/wp-content/uploads/2018/03/Datasheet-KryptoDisk-2-HSO-GB.pdf"><span style="text-decoration: underline"><strong><em>Datasheet &#8211; KryptoDisk 2 &#8211; HSO &#8211; (GB)</em></strong></span></a></p>
<p>External 2 factor USB 3.1  &#8211; Disk Capacity: 128GB, 256GB, 512GB, 1TB</p>
<p align="LEFT">Enabling a safe USB environment KryptoDisk is the perfect solution for<br />
transportation of data between the office and home, for travelling with<br />
sensitive data, for working between office branches and for moving<br />
sensitive data between systems and platforms.</p>
<p align="LEFT">Plug and Play KryptoDisk can be used straight out of the box<br />
and does not require any software or drivers to<br />
be installed prior to use. It is compatible with various operating<br />
systems (OS). Before first time use you will need to format the<br />
KryptoDisk. Our installation guide will guide you through this process.</p>
]]></content:encoded>
										</item>
		<item>
		<title>Nye krypterte disker fra iStorage</title>
		<link>https://insec.no/nye-krypterte-disker-fra-istorage/</link>
				<pubDate>Wed, 26 Apr 2017 10:05:52 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://bedriftssystemer.no/?p=1375</guid>
				<description><![CDATA[iStorage lanserer ny disk serie !!! diskAshur 2&#160;og diskAshur PRO 2 leveres både i HDD og SSD versjoner PIN authentication – full disk hardware encryption: AES&#160;256-bit XTS hardware encryption Immune to all forms of attacks including Key-loggers and Brute Force Attacks No software required – OS and platform independent Employs EDGE Technology, Common Criteria EAL4+ [&#8230;]]]></description>
								<content:encoded><![CDATA[<p><span style="font-size: 12pt"><strong>iStorage lanserer ny disk serie !!!</strong></span></p>
<p><span style="font-size: 10pt"><strong>diskAshur 2&nbsp;og diskAshur PRO 2 leveres både i HDD og SSD versjoner</strong></span></p>
<p>PIN authentication – full disk hardware encryption:</p>
<ul>
<li>AES&nbsp;256-bit XTS hardware encryption</li>
<li>Immune to all forms of attacks including Key-loggers and Brute Force Attacks</li>
<li>No software required – OS and platform independent</li>
<li>Employs EDGE Technology, Common Criteria EAL4+ ready on-board secure microprocessor</li>
<li>USB 3.1 Speed</li>
</ul>
<p><strong><span style="text-decoration: underline"><a href="http://insec.no/produktkategori/krypterte-disker/istorage-krypterte-disker/portable-hdd-istorage-krypterte-disker/" target="_blank" rel="noopener noreferrer">Les mer om produktene på separate produktsider</a></span></strong></p>
<p>&nbsp;</p>
]]></content:encoded>
										</item>
		<item>
		<title>Sentry ONE Encrypted Flash Drive</title>
		<link>https://insec.no/test/</link>
				<pubDate>Fri, 24 Mar 2017 10:02:03 +0000</pubDate>
		<dc:creator><![CDATA[oddhenrik]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://bedriftssystemer.no/?p=1352</guid>
				<description><![CDATA[Combining hardware encryption with plug and play simplicity, Building on the design of our best selling Sentry 3 FIPS, the DataLocker Sentry ONE adds the flexibility of being centrally managed by either SafeConsole or IronKey EMS central management platforms. Utilizing 256-bit AES encryption, this USB flash drive delivers ultimate portability and security. This next generation, [&#8230;]]]></description>
								<content:encoded><![CDATA[<p><strong>Combining hardware encryption with plug and play simplicity,</strong><br />
Building on the design of our best selling Sentry 3 FIPS, the DataLocker Sentry ONE adds the flexibility of being centrally managed by either <a href="https://datalocker.com/safeconsole">SafeConsole</a> or <a href="https://datalocker.com/ems">IronKey EMS</a> central management platforms. Utilizing 256-bit AES encryption, this USB flash drive delivers ultimate portability and security. This next generation, smart USB 3.1 GEN 1 drive is 100% hardware encrypted and is available in:</p>
<ul>
<li>Standard Models</li>
<li>Managed Models – manageable by either <a href="https://datalocker.com/safeconsole">SafeConsole</a> or <a href="https://datalocker.com/ems" target="_blank" rel="noopener noreferrer">IronKey EMS</a>.</li>
</ul>
<p><img src="https://datalocker.com/wp-content/uploads/2017/01/sc_managed.png" width="250" />      OR       <img class="alignnone" src="https://datalocker.com/wp-content/uploads/2017/01/ems_managed.png" alt="" width="250" /></p>
<h4>CONFIDENTLY CARRY YOUR DATA EVERYWHERE YOU GO</h4>
<p>DataLocker Sentry ONE offers affordable military-grade security with 256-bit AES hardware-based encryption in XTS mode that provides always on protection for your data. Unlike software-based encryption, the Sentry ONE cryptochip does not export encryption keys to the host PC, thereby protecting against cold-boot and malware attacks.</p>
<h4>FEATURES HIGHLIGHT</h4>
<ul class="square-bullet">
<li>Tamper evident seal for physical security</li>
<li>The entire device is FIPS 140-2 Level 3* certified, not just the controller</li>
<li>Unlock in Read Only Mode to prevent files from being modified or infected with malware</li>
<li>Configure inactivity AutoLock to prevent unwanted access</li>
<li>Initiate a reset sequence after 10 consecutive incorrect password attempts and return to factory settings</li>
</ul>
<p>.</p>
<div class="fusion-clearfix"></div>
<div class="fusion-one-half fusion-layout-column fusion-column-last fusion-spacing-yes">
<div class="fusion-column-wrapper">
<h4>CENTRALLY MANAGED</h4>
<p>DataLocker Sentry ONE is available in standard or managed versions.  The managed version requires a device license and can be managed by either <a href="https://datalocker.com/safeconsole">SafeConsole</a> or <a href="https://datalocker.com/ems">IronKey EMS</a>. Both <a href="https://datalocker.com/safeconsole">SafeConsole</a> and <a href="https://datalocker.com/ems">IronKey EMS</a> are a secure cloud or on-premises management platforms that allows your organization to centrally manage compatible USB storage devices easily and efficiently.</p>
<h4>AVOID LOSING PUBLIC TRUST</h4>
<p>Every year, 20 million unprotected USB drives go missing. If the data stored on those drives ends up in the wrong hands, you can lose public trust, put citizens at risk and suddenly find yourself in the middle of a PR scandal. Secure USB flash drives are an essential component of a comprehensive data loss prevention (DLP) strategy. The security must be implemented in the hardware in order to combat the evolving threat landscape. With your data stored on the hardware-encrypted Sentry ONE, it is always protected from unauthorized access.</p>
</div>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>IronKey D300</title>
		<link>https://insec.no/ironkey-d300/</link>
				<pubDate>Thu, 16 Mar 2017 13:52:58 +0000</pubDate>
		<dc:creator><![CDATA[oddhenrik]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://bedriftssystemer.no/?p=1335</guid>
				<description><![CDATA[Protect sensitive data with the most advanced level of security. D300 are availible in two models Managed ( requires Ironkey Enterprise Service) and unmanaged (runs standalaone) .Kingston’s IronKeyTM D300 USB Flash drive features an advanced level of security that builds on the features that made IronKey well-respected to safeguard sensitive information. Kingston’s IronKeyTM D300 USB Flash [&#8230;]]]></description>
								<content:encoded><![CDATA[<p>Protect sensitive data with the most advanced level of security. D300 are availible in two models Managed ( requires Ironkey Enterprise Service) and unmanaged (runs standalaone) .Kingston’s IronKeyTM D300 USB Flash drive features an advanced level of security that builds on the features that made IronKey well-respected to safeguard sensitive information. <span id="more-1335"></span> Kingston’s IronKeyTM D300 USB Flash drive features an advanced level of security that builds on the features that made IronKey well-respected to safeguard sensitive information. It’s FIPS 140-2 Level 3 certified, with 256-bit AES hardware encryption in XTS mode. For added peace of mind, the drive uses digitally signed firmware, making it immune to BadUSB, and it enforces complex password protection* with minimum characteristics to prevent unauthorised access. Encryption and decryption is done on the drive, with no trace left on the host system, and the drive locks down and reformats after 10 invalid attempts to protect against brute force attacks</p>
]]></content:encoded>
										</item>
		<item>
		<title>Protect your iStorage drive from malware infection</title>
		<link>https://insec.no/1329-2/</link>
				<pubDate>Thu, 16 Mar 2017 13:40:21 +0000</pubDate>
		<dc:creator><![CDATA[oddhenrik]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://bedriftssystemer.no/?p=1329</guid>
				<description><![CDATA[Protect your iStorage drive from malware infection with iStorage DriveSecurityTM Antivirus powered by NOD32 Powerful Antivirus Protection for your Secure Drive. iStorage DriveSecurity powered by the award-winning ESET NOD32® is a powerful antivirus software that’s installed on and runs directly from any iStorage or other USB drive preventing malware from infecting your USB drive. iStorage [&#8230;]]]></description>
								<content:encoded><![CDATA[<p>Protect your iStorage drive from malware infection with iStorage DriveSecurityTM Antivirus powered by NOD32 Powerful Antivirus Protection for your Secure Drive.</p>
<p><span id="more-1329"></span></p>
<p>iStorage DriveSecurity powered by the award-winning ESET NOD32® is a powerful antivirus software that’s installed on and runs directly from any iStorage or other USB drive preventing malware from infecting your USB drive. iStorage DriveSecurity automatically scans, detects and eliminates Viruses, Spyware, Trojans, Worms, Rootkits, Adware and other Internet threats before they can be transmitted to your USB drive. So whether it’s sensitive data, pictures, music, videos or any other documents that you commonly store and share, iStorage DriveSecurity ensures that your USB drive is always malware free.</p>
]]></content:encoded>
										</item>
		<item>
		<title>MilDef kjøper Bedriftssystemer AS</title>
		<link>https://insec.no/mildef-kjoper-bedriftssystemer-as/</link>
				<pubDate>Thu, 03 Nov 2016 06:12:16 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.insec.no/?p=998</guid>
				<description><![CDATA[Mildef Group AB har kjøpt Bedriftssystemer AS og etablerer med dette en egen kanal for sine produkter mot det Norske markedet. &#160; &#8220;Gamle&#8221; Bedriftssystemer AS endrer navn til Mildef AS og  vil være lokalisert i sine opprinnelige lokaler på Bryn. Hovedfokus vil fortsatt være rugged og TEMPEST dataprodukter. Se også pressemelding : https://www.mildef.com/news/mildef-acquires-bedriftssystemer Kontakt Henning Linnebjerg eller [&#8230;]]]></description>
								<content:encoded><![CDATA[<h3>Mildef Group AB har kjøpt Bedriftssystemer AS og etablerer med dette en egen kanal for sine produkter mot det Norske markedet.</h3>
<p>&nbsp;</p>
<p>&#8220;Gamle&#8221; Bedriftssystemer AS endrer navn til Mildef AS og  vil være lokalisert i sine opprinnelige lokaler på Bryn.</p>
<p>Hovedfokus vil fortsatt være rugged og TEMPEST dataprodukter.</p>
<p>Se også pressemelding : <a href="https://www.mildef.com/news/mildef-acquires-bedriftssystemer">https://www.mildef.com/news/mildef-acquires-bedriftssystemer</a></p>
<p>Kontakt Henning Linnebjerg eller Arnstein Langnes for mere informasjon på <a href="tel:+47%2023%2040%2003%2010">+47 23 40 03 10</a></p>
<p>Nye WEB sider vil være <a href="http://www.mildef.no/">www.mildef.no</a></p>
]]></content:encoded>
										</item>
		<item>
		<title>&#8220;Nye&#8221; Bedriftsystemer AS</title>
		<link>https://insec.no/oppkjop/</link>
				<pubDate>Wed, 02 Nov 2016 23:22:09 +0000</pubDate>
		<dc:creator><![CDATA[oddhenrik]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.insec.no/?p=95</guid>
				<description><![CDATA[I forbindelse med Mildef’s  oppkjøp av Bedriftssystemer AS vil forretningsområde Kryptert Lagring fortsette som tidligere under navnet Bedriftsystemer AS. Denne delen er kjøpt tilbake av ansatte og vil bli drevet som før med de samme menneskene, de samme produktene og de samme produsentene. Bedriftsystemer AS vil i fremtiden ha enda mer fokus på Kryptert lagring [&#8230;]]]></description>
								<content:encoded><![CDATA[<p><strong><br />
I forbindelse med Mildef’s  oppkjøp av Bedriftssystemer AS</strong><br />
vil forretningsområde Kryptert Lagring fortsette som tidligere under navnet Bedriftsystemer AS.</p>
<p>Denne delen er kjøpt tilbake av ansatte og vil bli drevet som før med de samme menneskene, de samme produktene og de samme produsentene.</p>
<p>Bedriftsystemer AS vil i fremtiden ha enda mer fokus på Kryptert lagring enn tidligere , da dette vil være vårt eneste fokus område.</p>
<p>Bedriftsystemer AS vil som før være i tet med nye produkter, nye løsninger og nye produsenter.</p>
<p>All kontaktinformasjon er som før, både email adresser og direkte telefon nummer.</p>
]]></content:encoded>
										</item>
	                                          </channel>
</rss>
