Amongst the various high rollers who read Engadget -- defense industry big wigs, international businessmen, and the like -- security is a major concern, and over the last couple years we've seen quite ...
Along with AES 256-bit encryption, MoneyMutual also uses the services of TrustedSite to scan its site daily for security risks. TrustedSite provides cybersecurity solutions to assist businesses in ...
UK-developed FIPS 197-validated drives with capacities to 256GB protect sensitive data on lost or stolen computers while delivering all the benefits of solid-state storage London, 1 August 2012 - ...
LONDON--(BUSINESS WIRE)--Memory and storage specialist Integral has launched Crypto mSATA SSD, a market-leading range of mSATA (MO-300) solid-state drives featuring military-level, AES (Advanced ...
TORRANCE, Calif. – October 27, 2015 – Fantom Drives, a consumer, prosumer and SMB data storage innovator, today announced the DataShield™ portable data drive. The new DataShield drive provides the ...
Solid state drives have a number of advantages over traditional hard drives. They're faster, less noisy and more reliable in general. But now, Samsung's line of SSDs have another huge benefit: ...
You may have seen some VPN providers boasting about using AES-256 encryption, but it’s not immediately apparent what this ...
07/09/2010 - Thecus' breakthrough Cloud NAS Servers allow users to access and share their data no matter where they are in the world both efficiently and effortlessly. Furthermore, Thecus' advanced ...
senseFly is excited to bring you its latest eMotion flight planning software release, version 3.9.0. This latest version provides overall improvements to users as well as notable security enhancements ...
Take 1TB and divide it by two and you've got a pair of new 2.5-inch 500GB disks just introduced by Fujitsu. Fujitsu's MJA2 series of 9.5-mm tall, SATA 3.0Gbps, 5400 RPM disks consume just 1.4 watts ...
The WinDSX AES-256 encryption software from DSX Access Systems contains government approved AES-256 bit encryption technology that can be implemented system-wide. Encryption capabilities are built ...