Stealthphone CryptoDisk

← Back

Stealthphone CryptoDisk

Stealthphone CryptoDisk

Stealthphone CryptoDisk

Stealthphone CryptoDisk is an additional option of Stealthphone Hard, hardware and software solution which provides data encryption on a hard disk in computer using Stealthphone Hard connected via USB.

Description

The main function of the CryptoDisk system is the protection of private data, stored on a hard disk of the PC, against theft, distortion or cancellation. CryptoDisk protects sensitive hard drive data against theft, faking or deletion.

криптодиск_eng.png

This function is implemented by one or several logical disks (crypto disks), created in the operation system.

Disk processing is similar to processing of standard logical disks in the operation system. Stealthphone Hard should be connected to a PC to run CryptoDisk and encrypt data. Stealthphone Hard, where all encryption operations are processed, should be connected to a PC via USB in order to operate the CryptoDisk system.

The following operations are available for the subscribers operating the CryptoDisk system:

  • Implementation of a cryptodisk

  • Cryptodisk formatting

  • Enabling/disabling a CryptoDisk (these operations are performed in each working session with a cryptoDisk)

  • Export / import of a CryptoDisk key

  • Changing a CryptoDisk PIN-code

  • Emergency disabling and exit from the control program

  • Guaranteed cancellation of a CryptoDisk with the and complete data erasure with random number generator data

  • Emergency cancellation of a cryptodisk (cancellation of a cryptodisk and guaranteed cancellation of a key in case of emergency)

Stealthphone CryptoDisk consists of:

  • Hardware encryption device Stealthphone Hard

  • Stealthphone Hard driver

  • Stealthphone CryptoDisk software for OS Windows

Cryptographic characteristics

  • Strong symmetric encryption algorithm with key length of 256 bit (proprietary manufacturer’s design)

  • Integrity control of data stored in the cryptodisk

  • Physical random number sensor, built in Stealthphone Hard, generates encryption keys

  • Password-protected against unauthorized access (password length is from 8 to 20 digits)

  • This encryption device is immune to computer viruses

  • Two-factor authentication is the procedure to confirm user rights

  • A user can simultaneously operate up to 5 cryptodisks

  • The use of in-house PIN codes for various cryptodisks

Operational feature comparison of CryptoDisk and its analogues around the world

Product / Features

 Stealthphone 
CryptoDisk 

 TrueCrypt 

 CryptoMobile 

 CrypticDisk 

 Symantec Drive Encryption 

 McAfee Endpoint Encryption 

1. Transparent real time data encryption enables document processing in a normal mode.

+

+

-

+

+

+

2. Integration in Windows Explorer (Logical drive)

+

+

-

+

+

+

3. External devices are used as hardware key carriers

+

-

+

-

+

-

4. Two-factor authentication without inputting a PIN-code with a computer keyboard

+

-

+

-

-

-

5. Hardware data encryption

+

-

+

-

-

-

6. A hardware random number generator is used for key generation

+

-

+

-

-

-

7. Key information is not transferred or stored in the computer RAM

+

-

+

-

-

-

8. Export and import of containers to transfer them to another user

+

-

-

-

+

+

9. Access keys to containers can be changed

+

-

-

-

+

-

10. Emergency data destruction («Emergency” mode)

+

-

-

-

-

-

11. Proprietary crypto providers may be used

+

-

-

-

-

-

12. Assured hard delete

+

-

-

-

-

-

13. Data integrity check prior to drive mapping

+

-

-

-

-



  • CryptoDisk –a hardware-software data encryption complex, designed by МТТ. A hardware encryptor StealthPhone is used for data encryption and key storage.

  • TrueCrypt – a software solution with open source codes, designed to secure information on a drive

  • Crypto Mobile –a mobile hardware encoder designed by Crypto AG to encrypt files, E-mail messages, etc.

  • Cryptic Disk – a software solution designed to protect information on a drive, based on logical encrypted drives.

  • Symantec Drive Encryption – a software solution designed by Symantec to secure information on a drive, based on logical encrypted drives

  • McAfee Endpoint Encryption – a software solution designed by McAfee to encrypt information on drives based on logical encrypted drives.

Product / Features

 Stealthphone CryptoDisk 

 Dekart Private Disk 

 Aloaha Crypt 

 BestCrypt Container Encryption 

1. Transparent real time data encryption enables document processing in the normal mode

+

+

+

+

2. Integration in Windows Explorer (Logical drive)

+

+

+

+

3. External devices are used as hardware key carriers

+

+

+

-

4. Two-factor authentication without inputting a PIN-code with a computer keyboard

+

-

-

-

5. Hardware data encryption

+

-

-

-

6. A hardware random number generator is used for key generation

+

-

-

-

7. Key information is not transferred or stored in the computer RAM

+

-

-

-

8. Export and import of containers to transfer them to another user

+

+

-

+

9. Access keys to containers can be changed

+

+

-

-

10. Emergency data destruction («Emergency» mode)

+

-

-

-

11. Proprietary crypto providers may be used

+

-

-

-

12. Assured hard delete

+

+

-

-

13. Data integrity check prior to drive mapping

+

-

-

-


  • CryptoDisk – a hardware-software data encryption complex, designed by МТТ. A hardware encryptor StealthPhone is used for data encryption and key storage.

  • Dekart Private Disk – disk encryption software designed by Dekart.

  • Aloaha Crypt – a software solution designed by Aloaha Software for secure storage of private information on the drive.

  • BestCrypt Container Encryption – a software solution designed by Jetico provides secure storage of private information on the drive.

Have a question?

Submit your question on website and our specialist will call you back within 24-hours and answer your question. If you want to know more about our products, you can apply for a full-course training at your work place.

Submit question
Request training