www . AmericanSecurityToday . com 2022 FINALISTS Edition - 65
rity to fit any use case . These hardware-based encrypted devices meet tough security standards and offer the ulti- mate security in data protection to manage threats confident- ly and reduce risks .
They are self-contained and do not require a software element on the host computer . No soft- ware vulnerability also elimi- nates the possibility of brute- force , sniffing , and memory hash attacks .
What should users look for in a hardware-encrypted USB drive to use with or in place of cloud storage ?
• An alphanumeric keypad that locks the drive with a word or number combination of your choosing for easy-to- use PIN protection is a great option for most users .
• Operating-system indepen- dence makes a drive a very versatile consumer solu- tion , as there are so many choices these days when it comes to PCs , tablets , and smartphones .
• Look for hardware-based Full Disk AES 256-bit data encryption in XTS mode , where the encryption is done on the drive , leaving no trace of your PIN on the system stem .
• It provides a level of securi- ty that the federal govern- ment and other such orga- nizations around the world have adopted .
• FIPS 140-2 Level 3 certifi-
80