RSA: Check Point unveils secure USB drive technology

In use, the system - a combination of Check Point's secure VPN technology and Sandisk hardware - is billed as allowing users to interface with an office computing environment using a secure VPN, or work offline.

"Data is protected with hardware and software encryption, and when the stick is removed it leaves no traces of the user's session on the host", a company spokesperson told Infosecurity.

"The Abra USB stick, which is being launched at the RSA Conference 2010 in San Francisco, is being aimed at mobile workers, contractors etc, as it's a far cheaper option to carry and manage than a laptop", he added.

The 4 gigabyte version of the Abra is being sold for $120.00, whilst the larger 8 GB version sells for $210.00.

According to Check Point, laptops are not just more expensive than the Abra system, but also come with higher overhead costs.

Personal equipment accessing the network, says the company, also poses a risk to corporate networks, such as potentially subjecting the network to malware-infected home PCs, creating an avenue for corporate data loss or allowing unsecure connections.

Gil Shwed, Check Point's CEO, said that Abra will change the way people work, whether remotely or whilst on the go.

"Abra is like no other tool, not only combining virtualisation, VPN and strong data security into a single ultra-portable device, but doing it in an easy to use cost effective manner. The days of travelling with bulky laptops are behind us", he said.

Check Point says that the Abra system uses an authentication process that enforces minimum levels of password strength, as well as certificates and tokens for multi-factor authentication.

Interestingly, the firm adds that a virtual keyboard can be used at login to block password theft by key loggers.

The device also interfaces with Check Point SmartDashboard software on a company's central server to support policy administration and updates through Check Point gateways, including authentication and compliance scanning rules plus VPN settings.

 

What’s hot on Infosecurity Magazine?