Ease of use
Encrypted Devices from Datalocker are very simple to use. All you need to do is connect the device to your computer and it will prompt you for a password. Enter your password and the device is ready to use. Use it like a normal external USB Pen Drive or Hard Drive. Copy, Read, Paste etc. as you normally do. All the encryption and security is done in the background at lighting fast speeds. Its so simple! As simple as using any external USB device
Why do you need Encryption?
In today’s world filled with technology, cyber crime is prevalent and growing rapidly. One needs to protect:
From theft and misuse which can potentially cause major loss in terms of money, reputation & harassment. And protection is required from outsiders as well as from your own people too!
Once you have stored your data on any RankSecure device, you can be assured that no one – absolutely no one – will be able to read your data!
RankSecure devices are encrypted to standards used by NASA and military’s worldwide…assuring you of total security even in case of loss!
All Ranksecure devices come with Hardware 256bit AES encryption which make it amongst the most protected devices available anywhere in the world today.
Even if you lose these devices or they get stolen, they are 100% secure. No one can break into them!
‘As of now, there are no known practical attacks which would allow anyone to read correctly implemented AES encrypted data’.
Encryption technology – it’s money well spent. Probably the wisest investment you will ever make!
A SHORT VIDEO EXPLAINING ABOUT ENCRYPTION
What is 256 bit AES encryption?
The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology(NIST).AES has been adopted by the U.S. Government and is now used worldwide.
AES is the first publicly accessible and open cipher approved by the National Security agency(NSA) for top secret information when used in an NSA approved cryptographic module.
The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths.
As for now, there are no known practical attacks that would allow anyone to read correctly implemented AES encrypted data.
Note: All products sold by RankSecure come with AES256 bit Hardware encryption which assures 100% unbreakable protection and AES256 is certified for Top Secret information in the USA.
Hardware encryption or software encryption? Which one is better?
Hardware-based encryption uses a device’s on-board security to perform encryption and decryption. It is self-contained and does not require the help of any additional software. Therefore, it is essentially free from the possibility of contamination, malicious code infection, or vulnerability.’
Software based Encryption is done using a program on the computer.’ The protection granted by these solutions, however, is as strong as the level of security of the operating system of the device, which in most cases is not secure. A security flaw in the OS can easily compromise the security provided by the encryption code. Encryption software can also be complicated to configure for advanced use and, potentially, could be turned off by users. Performance degradation is a notable problem with this type of encryption.’
As one can see from the above, Hardware based encryption is clearly many times more secure and a obviously better choice for your encryption needs.