Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 11 May 2010

Origin Data Locker 1TB – Product Review

Posted on 02:33 by Unknown
Review by Michael Smith (Veshengro)

The Data Locker from Origin Storage has now been with us for some time and this is the latest one, with a full whacking 1TB of capacity.

The capacity of the 1TB is a little nominal, however, as we all know, in the way those calculations go, and also the fact that over 110MB are used for the encryption program on the drive.

The Data Locker measures 3.13" x 5.11" x 0.91" (W x D x H), is bus powered via USB Port so does not require any extra power supply.

According to the data sheet the supported Operating Systems are Windows 7, Linux (USB Support). I used it on Vista with no problem so it is probably XP and up.

The Data Locker 1TB comes with a recommended retail price of £399 plus VAT, and that is where I did have to gulp, as I find that somewhat on the steep side, even for a hardware encrypted external HDD. And, once you add the VAT in the UK, you get to the best part of £500, which would make it a cost of US$800.

Two different levels of security are available for the device and they are:

  • Data Locker Pro AES: Corporate and Local Government

  • Data Locker Enterprise: Military and transportation of mission critical data

The Data Locker offers state of the art features which include:

  • Brute Force Attack Detect / Self Destruct Response

  • One touch drive erase for rapid re-deployment using admin password

  • Hardware Based Malware Detection / Deflection

  • Unattended Auto Lock Function

  • 100% Platform Independent Security and Authentication

  • Hardware Based AES Encryption (CBC mode)

  • No Software or pop-up password entry screens

Getting started with the device was very simple and changing the password intuitive after a quick read through the Quick Start Guide, and that is a definite plus in my book. Data transfer from laptop to drive extremely fast without any problems.

Connectivity with Linux is no problem whatsoever, even with older versions of that operating system, as no connection to software required.

Initial setting up of drive was done on Linux operated ASUS Eee PC netbook and there was no difference between use in Windows and Linux.

In fact Linux works better and faster as to connecting first time as it does not hang about needing to install the software drivers for the USB connection.

The Data Locker does not have, it would appear, Mac support, at least it is not mentioned on the specs, and if that is the case, one that I cannot understand as the Data Locker is not software dependent, it would be a shame.

The one problem I found was the “keypad” which takes some getting used to, and not only because it seems to change the display from time to time, that is to say the sequence of the keys. I also found the keys on the keypad somewhat sticky, if one could all it thus. Entry must be made very positive and careful for them to be registered by the device.

The above problem is, more than likely, a case of getting used to it but that time does not really exist unless one owns the device and does not just have it on loan for a review only. Over time one would certainly get the key entry down to a T without any glitches that I experienced in my tests.

The features that make the Data Locker, in my opinion, are the rugged construction, hardware malware detection/deflection and the fact that is works with Linux as well as Windows. The AES hard encryption is a given fact.

The one thing that always worries me with secure drives such as this is when the term “Brute Force Attack Detect / Self Destruct Response” is quoted. My question then is does it recycle the drive by destroying the data safely only and resetting the drive or does it render the drive unusable, as some do. The latter would be something costly, considering the price, though not as costly as data breach, obviously.

A very good, and what would appear to be, rugged drive, though, unfortunately, at rather a chunky price tag.

It would be a drive that I would definitely recommend for use by government, security services and the military, for it is a rugged device that will keep the data strongly secured.

For the SME and ordinary user who wants a secure drive this may still be something a little out of the league, especially in an economic situation such as the one the world is still experiencing even in early 2010.

While encryption and security is more and more a requirement to keep data secure also SMEs and the “normal” user other kinds of encryption and securing data may have to be used if funds do not allow for expensive devices such as this one.

One day, maybe, we will actually have external drives, whether HDD or SSD, that actually work on all operating systems without the use of software dependent on the OS that are actually affordable.

For those who can afford the best and should use but the best because of the sensitivity of the data to be secured the Data Locker probably is the best that is out there presently; the ordinary mortal more than likely will still has to bide his or her time.

Verdict: 8 out of 10. The cost and the difficulty I had with working the keypad took the verdict down the two notches.

© 2010

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Addendum

In addition and clarification of what is said above in the review:

I have now heard from Origin who state that:

  1. The Data Locker is entirely compatible with the Mac operating system which I had assumed anyway but which was not on the information that I had to hand.
  2. The drive is just wiped and recycled when the Brute Force attack prevention is enacted. This was the data is destroyed but the drive is reusable.

Thanks to Andy Cordial of Origin Storage for this clarification and to Darshna Kamani of Eskenzi PR for passing the comments back and forth.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Origin Data Locker, product review | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ▼  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ▼  May (13)
      • Security savvy professionals careless with busines...
      • Napatech to Demonstrate How To Build 10G IPS from ...
      • 3M launched new privacy filter at Infosecurity Eur...
      • Origin Data Locker 1TB – Product Review
      • Origin Storage’s 1TB Data Locker Has Arrived
      • Securing the Mobile Workforce
      • Atlassian password breach due to forgotten database
      • Are we facing yet another banking crisis?
      • Newly discovered flaw affects all recent Java vers...
      • Cloud computing and social networking leave UK bus...
      • Network performance at risk as bandwidth demand ou...
      • Trusteer Warns of Impending Wave of PDF malware at...
      • iStorage diskGenie – Product Review
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile