5. Conclusion
For everyday use of a USB key, the user simply needs to insert the key into the host PC, open the Truecrypt volume and launch Codyssey. Don't forget to perform an antivirus check before opening any communicating application (browser, e-mail client), and remember to take your key with you at the end of use!
Admittedly, their use can appear complex, requiring the implementation of security functions and usage rules to guarantee data availability and confidentiality. To make the most of these concepts for corporate use, there are more packaged solutions on the market, such as Gemalto Smart Enterprise Guardian. This USB key integrates 2 GB of memory using 256-bit AES hardware encryption, and a smart card for generating and storing cryptographic keys on the device.
Most interesting of all is Gemalto's partnership with start-up Netheos, which...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Also in our database
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!