|Page (1) of 1 - 05/09/12||email article||print page|
GoldKey Announces New USB Tokens with Encrypted Flash Storage(May 09, 2012)
Independence, MO (PRWEB) May 09, 2012
GoldKey Security Corporation, a leading provider of hardware-based authentication solutions, this week announced its line of GoldKey Tokens with Built-In Flash. The new GoldKeys provide hardware-encrypted secure flash along with a built-in Smart Card and GoldKeys enhanced two-factor authentication technology all in a tiny form factor that measures nearly an inch long.
The new GoldKey packs 64GB of hardened storage into a conveniently small and rugged token, said Rog Billings, CEO at GoldKey. GoldKey is the worlds first encrypted flash drive to support two-factor authentication using smart cards and Gold-ID in one device.
Not only is GoldKey one of the smallest secure flash drives on the market, it is also one of the most durable. From its stainless steel case to its waterproof epoxy, GoldKey with Flash is more durable than your everyday USB device. Inside, GoldKey with Flash is filled with an industrial grade epoxy that not only seals the internal circuitry water tight, but deters tampering and provides added strength.
When the GoldKey with Flash is connected to a USB port, a read-only partition appears, from which the encrypted drive can be unlocked all without installing any software. Once the encrypted partition is unlocked, it appears as a regular flash drive until it is removed, which completely locks the data.
GoldKeys patent-pending encryption key management technology allows each GoldKey with Flash to be registered to a Master Token. If the users PIN is forgotten, the Master Token can be used to reset the PIN and regain access to the data. Using GoldKeys remote management features, enterprises can register tokens and change encryption user groups used to access local encrypted files and cloud storage.
In addition, GoldKey tokens with Flash fully support Gold-ID, GoldKeys enhanced two-factor authentication technology which provides a trusted alternative to SecurID. Gold-ID achieves two-factor authentication without the need for OTP or certificates. GoldKey may also be used to lock Windows accounts, to encrypt files or folders stored locally, and to access encrypted online storage.
GoldKey USB Security Tokens have successfully passed the FBI vetting process to provide Advanced Authentication as part of the CJIS Security Policy compliance strategy for public safety units and law enforcement departments. The new GoldKey allows mobile police officers to comply with advanced authentication requirements while providing a secure method for transporting sensitive files and information.
Available in 8, 16, 32, and 64 Gigabyte sizes, GoldKey with Flash supports both Windows 7 and Mac OS X Lion operating systems and is available immediately.
About GoldKey Security Corporation
GoldKey Security Corporation is the leading provider of enhanced two-factor authentication that protects sensitive data and resources for government, financial, and other organizations with hardware and software tokens. Deployed by customers in over 40 countries, GoldKeys security tokens allow shared access to encrypted files and secure login to online resources. A Midwest USA based, family-owned company, GoldKey provides an innovative alternative to less secure login methods with patent-pending technology that puts control of access in the hands if its users. For more information, visit: http://www.goldkey.com
Read the full story at http://www.prweb.com/releases/2012/5/prweb9487301.htm.
Related Keywords:consumer goods, consumer issue, consumer confidence, consumer issue, fishing industry, healthcare provider, cinema industry, radio industry, television industry, music industry, process industry, healthcare policy, computer crime, security, social security, national security, security measures, computing and information technology, satellite technology, wireless technology, company information, science and technology, technology (general), identification technology, agricultural research and technology, theft, fraud, computing and information technology,