Whenever, and wherever, you need to work, with SafeToGo® 302E keeping sensitive data couldn’t be easier or more secure

The flash memory experts at Cardwave are delighted to announce the expansion of their SafeToGo® hardware encrypted USB range, with the new SafeToGo® 302E.

SafeToGo® 302E, is a fully robust, AES 256-bit XTS hardware encrypted USB3.1 flash drive, designed to protect valuable business data from unauthorised access whilst on the move.

SafeToGo® 302E is compatible with Windows 7-10 and Mac, has a multi-lingual user interface (8 European languages – English, Dutch, French, German, Italian, Portuguese, Polish, Spanish) and is available in capacities from 8GB to 128GB. Check out the full SafeToGo® 302E datasheet here.

Valuable data at risk when stored on a USB

Over 20 million unencrypted USB drives are lost or stolen every year. Data stored on an unencrypted drive can be accessed by anyone – an innocent member of the public, a competitor, a thief! The loss of important business data can be extremely costly. In addition to the well-publicised monetary fines imposed by the ICO under the Data Protection Act 2018, a data breach can mean major business disruption, reputational damage, customer and employee churn.

How to avoid a data breach involving data on the move

Banning all USBs from the workplace (which some have done) can reduce the risk of unauthorised data access, but consider the benefits of allowing employees to store/transport data on USBs drives when working from home or remotely – no reliance on internet connectivity/the Cloud, no expensive data roaming costs, quick and easy access to data.

Invest in hardware encrypted USB drives and enjoy 100% benefit with 0% risk.

What is encryption?

Encryption of your data, in any way, is a good thing. Encrypting your data and hiding it from prying eyes by using password or PIN access is an important step to safeguarding your personal information. Encryption is the process of changing or transforming your files according to a set of rules and algorithms into a format that others cannot read. The only way to access those encrypted files is by applying your personally chosen password or PIN to the gateway application so the content can be decrypted. Off-the-shelf encryption solutions for consumers and businesses alike must conform to certain standards in order for them to claim to encrypt your data. At the very least, your chosen data security solution should perform AES-256 bit encryption for it be effective. This is a complex subject – and one best left to the programmers and mathematicians to explain – but, essentially, it’s a series of linked mathematical operations used in a block cipher, operating on a fixed-length group of bits with an unvarying transformation specified by a symmetric key. We did say it was complicated. The encryption can be implemented in software or in hardware.

Software Encryption

Many security solutions offer encryption using a software method. While this is easier and cheaper to implement than a hardware solution, it is simply a software program that acts as the cipher, and can be hacked in much the same way that any software application can. Password hacking viruses on your computer will target and perform multiple attacks on your data, trying relentlessly to crack your password until it finds the key that unlocks your data. Making your password a long and complex combination of characters and numbers, as well as upper and lower case letters, will increase the difficulty level of these attempted hacks. The effectiveness of a “brute-force” attack is linked to the skill level of the hacker. Password and PIN gateways will lock-down data and prevent access attempts once the password has been incorrectly guessed a certain number of times. Knowledgeable hackers will locate and reset these software counters and will continue with further attempts to decrypt your data. To truly safeguard your data and personal information against these kinds of attacks, you need hardware encryption.

Hardware Encryption

In a hardware-encrypted USB device, access control counters and all information relating to encryption and decryption of the data are implemented in a crypto module located inside the USB flash drive. The crypto module will shut down the USB device and keep the data safe in the event of unauthorised access attempts. Unlike a software-based solution, hackers are unable to run analysis utilities on the USB drive to locate and reset this counter. By shutting down the USB device, a parallel attack can also be thwarted. A parallel attack is where data is copied and shared to many devices to increase the attempts at unlocking data. The USB device doesn’t allow the files to be copied, so they are safe.

To summarise the basic difference between software and hardware encryption, if you can encrypt using software, you can decrypt using software. However, hardware-encrypted devices such as SafeToGo® 302E offer superior security levels by using a cryptographic core in a location independent of the PC and operating system to encrypt your data.

To find out more about SafeToGo® 302E, one of our other data security solutions, or to become a reseller, please contact us:
info@securedrives.com or +44 (0) 1380 738395


Press Enquiries: Emma Charlton, Security & Authentication Division Lead, Cardwave Services Ltd, 6C Hopton Industrial Estate, Devizes, Wiltshire SN10 2EU Email: emma.charlton@cardwave.com Tel: 01380 738395
About Cardwave: Multi-award-winning company Cardwave, which has offices in Devizes, Wiltshire and Dallas, Texas, was founded by Paul Norbury in 2004 and works with customers of all sizes across the world, providing specialist expertise to organisations who need to secure and distribute their data on removable and embedded media. The business provides value-add services, end-to-end project management, and consultancy solutions, and has positioned itself as one of the market leaders.