Introduction
SecurStor is VIDAR’s answer to the growing data security concerns in the industry and is integrated into most of VIDAR’s new or upcoming industrial only flash storage solutions. Its feature set can be customized to the individual requirements of an application or a system and with that helps protect mission-critical applications against unauthorized access to data or systems.
SecurStor’s feature range includes, but goes far beyond, conventionally available data at rest protection mechanisms such as encryption or TCG Opal to assure protection not only of data that is stored in the NAND but can also be used as the foundation for protecting data that is being processed inside a system or sent across a network.
Unique Challenges
Gone are the days when vehicles were merely modes of transportation, household appliances performed limited functions and machines were just mechanical contraptions. Today, things no longer function in isolation. They communicate and interact with one another, with people, with the environment and essentially with everything that is connected to the vast network commonly called the Internet of Things (IoT), which is increasingly growing and transforming into the Internet of Everything (IoE) While this unstoppable phenomenon is creating limitless opportunities, it is also creating unimaginable security threats and vulnerabilities with the constant generation, movement, processing and storing of data. If prevention and management measures are not in place, such risks could result in substantial financial and legal consequences.
According to the "2018 Cost of a Data Breach" Study conducted by Ponemon Institute and sponsored by IBM Security, the global average cost of a data breach in 2018 amounted to $3.86 million, up 6.4% compared with 2017. Each stolen record containing sensitive and confidential information cost $148, a 4.8% increase year over year. The table below shows the possible risks and types of protection mechanism typically employed for specific data states:
|
Data at Rest |
System-Level & Network-level |
---|---|---|
Definition |
Data stored on media, not in use |
Data in process and/or shared in cloud/network |
Possible risk |
Theft of HW, „unsafe disposal“ |
Malware, Spyware, Ransomware, Unauthorized access |
Protection |
OPAL, eDrive |
VIDAR custom features |
Availability |
common controller feature |
limited but growing |
Solutions
Use Cases
Database Security
Databases are large compilations of data, such as customer information, employee information, credit card numbers, phone numbers, financial data and other information that is usually sensitive and confidential. Cybercriminals target databases for the value of the data they hold. Adding to their vulnerability is the fact that several users can access them simultaneously for collection and processing. It is thus crucial that effective data security solutions are in place to protect stored data and make sure that it is kept away from intruders and unauthorized persons who would alter, disclose or distribute the information maliciously.
Public Networks Security
Stolen credentials and illegal access to accounts are among the critical issues that could lead to fraudulent transactions over networks. Mobile devices connecting to banking services for example, are big targets of cybercriminals. Keys and personal information stored in local drives or over networks may be falsely used as authentication credentials, so these should be well protected.
Cloud Data Security
Employees working remotely using their own devices in their home networks could increase security vulnerabilities as they access cloud-based apps and team collaboration apps such as emails, chat, video and file sharing. Data leakage, regulatory compliances depending on geography, abuse of user privileges and poorly managed backups are just a few pervasive cloud data security issues. Security solutions should ensure a trusted environment regardless of where the data is actually located.
Featured Technologies
UniqueID
Hardware based product identification, using physically unclonable function (PUF) technology where needed.
SecurBoot
Ensures the integrity and validity of the storage device’s firmware image.
SecurUpdate
Ensures the integrity and validity of any update to the firmware.
SecurAccess
Password-protected access to all or part(s) of the User Data area.
SecurWrite
Puts the device into “Write-Once” mode.
SecurEncrypt
AES-256 encryption for the User Data area.
SecurCopy
verbindet das Speichermedium mit einem bestimmten Hostsystem und verhindert hierdurch illegale Kopien
SecurOS
Ensures the integrity and validity of the operating system or application image stored in the User Data Area.
TCG Opal
and other features defined for data storage devices by the Trusted Computing Group.
SecurWipe
Fast, safe and permanent removal of data by deleting the encryption key.
Recommended Products
Specifications
View productSecurStor enabled SD & microSD cards features | |
---|---|
Product Line | SecurStor Security Suite |
UniqueID | *Hardware based product identification, using physically unclonable function (PUF) technology where needed. |
SecurBoot | **Ensures the integrity and validity of the storage device’s firmware image. |
SecurUpdate | **Ensures the integrity and validity of any update to the firmware. |
SecurAccess | **Password-protected access to all or part(s) of the User Data area. |
SecurOS | **Ensures the integrity and validity of the operating system or application image stored in the User Data Area. |
SecurCopy | **Pairs the storage device with a specific type of customer device to prevent illegal copying. |
SecurWrite | **Puts the device into “Write-Once” mode. |
SecurEncrypt | *AES-256 encryption for the User Data area. |
TCG Opal | ***and other features defined for data storage devices by the Trusted Computing Group. |
SecurWipe | **Fast, safe and permanent removal of data by deleting the encryption key. |
* Default ** Optional *** Not Available for this form factor