![]() ![]() Copying a 2GB file took over 45 minutes copying that same file to an ordinary USB drive took under 15 minutes. In testing, I found that copying large files to the encrypted drive took quite a while. Once unlocked it works like any other flash drive. A small unencrypted partition holds software that instructs the device to unlock. On-Board Encrypted Storage Like IronKey Personal S200 ($79 direct, 4 stars), GoldKey's on-board storage is secured using its FIPS-certified hardware-based encryption. ![]() You need to drag the file out of the vault, edit it, and drag it back in. You can move files or folders into and out of the vault using drag and drop, but you can't edit files in place. This is a 1GB online storage area that's encrypted using the GoldKey. Until you've successfully logged in using the newly duplicated key and PIN, the site will continue to quiz you with security questions.įrom the online console you can also access files stored in your GoldKey Vault. Without the key for authentication, you can still get online using "Alternative Sign In." This process involves answering a number of questions posed by the site, including your predefined security questions and also questions drawn from your user profile. Probably the most important task you can perform from the online dashboard is duplicating a lost key's settings onto a new GoldKey. For consumers, the online GoldKey ID dashboard allows for key management without requiring a master key. A master key holder can even lock the ordinary keys so users can't make changes at all. GoldKey ID Online In a business setting, the IT department will most likely manage employees' GoldKeys through a system of master and grandmaster keys. For suspenders-and-belt security, you can configure GoldKey to disable hibernation and clear the swap file at shutdown. If the bad guys steal your computer, there are some sneaky tricks involving forensic hardware that might conceivably extract elements of sensitive data from the hibernation file or from the Windows swap file. You can configure the administration tool to lock Windows when the GoldKey is removed. Choose the right account and enter your GoldKey PIN to log in. You'll see a list of accounts that this key can unlock (usually just one). Now when you want to log in, just insert the GoldKey. You'll find a new item named Enable GoldKey login. To set up an account for GoldKey login, you press Ctrl+Alt+Del, click Change a password, and click Other Credentials. Windows Control As mentioned earlier, you can configure Windows (Vista or 7) to unlock with the GoldKey. You can also configure them to lock when the screen saver kicks in, when the system enters power-saving mode, and when the user locks the Windows session. Naturally any open secure drives lock up when you remove the GoldKey. By default it creates a new encrypted version of the file, but you can set it to replace the original, or to ask every time. GoldKey also lets you encrypt individual files by choosing from the right-click context menu. ![]() However, it uses software-based encryption while GoldKey encrypts data in hardware. Of course, if you remove the GoldKey, the encrypted folders become inaccessible.Įncrypt Stick 5.0 ($39.99 direct, 3 stars) will also create local encrypted storage folders. Even though these special folders have been moved into encrypted storage, the GoldKey software makes it look like they haven't moved, so your programs can still find them. You can add other encrypted folders later. Do note that you can't resize a secure drive after creation.Īt the time you create the primary secure drive you can tell GoldKey to move four personal Windows folders into that drive: Documents, Pictures, Videos, and Music. You can create as many other secure drives as you wish. This virtual drive is stored locally on your computer and is only accessible when your GoldKey is plugged in. Secure Drives and Encrypted Files When first launched, the administration tool creates a 10GB Primary Secure Drive. A thief trying to guess your PIN won't get far, as the device wipes all data after ten wrong PIN entries. Of course you'll want to choose a strong PIN, something that you can remember but that nobody else could guess. It's actually more a password than a Personal Information Number, as the PIN can contain up to eight letters, numbers, and special characters. At this point the administration tool asks you to "personalize" the device by entering a PIN. Next you'll insert the GoldKey and wait for Windows to install its various drivers. Getting Started Before initializing your new GoldKey, you must download and install the GoldKey Administration utility. 16GB, 32GB, and 64GB units can be purchased for $119, $149, and $239 respectively. This review will focus on the consumer product. Best Hosted Endpoint Protection and Security Software. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |