Conclusion
Implementing a portable virtual office on a USB key
Article REF: TE7720 V1
Conclusion
Implementing a portable virtual office on a USB key

Author : Michael CHOCHOIS

Publication date: April 10, 2011 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

5. Conclusion

For everyday use of a USB key, the user simply needs to insert the key into the host PC, open the Truecrypt volume and launch Codyssey. Don't forget to perform an antivirus check before opening any communicating application (browser, e-mail client), and remember to take your key with you at the end of use!

Admittedly, their use can appear complex, requiring the implementation of security functions and usage rules to guarantee data availability and confidentiality. To make the most of these concepts for corporate use, there are more packaged solutions on the market, such as Gemalto Smart Enterprise Guardian. This USB key integrates 2 GB of memory using 256-bit AES hardware encryption, and a smart card for generating and storing cryptographic keys on the device.

Most interesting of all is Gemalto's partnership with start-up Netheos, which...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
Conclusion

Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details