Solved

External Hard Drive Full Disk Hardware Encryption

Posted on 2011-03-06
6
713 Views
Last Modified: 2012-06-21
I am a long time user of the Maxtor Black Armor line of USB external hard drives, which enable me to type in a password when I connect the drive to a computer.  From that point on, I can use the drive as a regular external hard drive, knowing that if the drive is lost or stolen the data will be secure.  I need to upgrade my external drives to a larger capacity (1-2 TB), with the same security capabilities, the ability to work on a MAC (which the Black Armor does NOT), and hopefully offer USB 3.0 functionality.  Are there any portable drives that offer this combination of features?  My main computers run Windows 7 Pro 64-bit, although I travel a lot and need to plug into pretty much everything.

Thank you,

Philip Simmons
0
Comment
Question by:philsimmons
6 Comments
 
LVL 5

Expert Comment

by:sykojester
ID: 35048148
You could use BitLocker, however you said you need it to work on Mac's and possibly other systems.

I prefer TrueCrypt www.truecrypt.org as it can do full disk encryption and run on Windows XP, Vista, 7, Mac OSX, & Linux.

Both of these solutions are software based so it doesn't matter which external drive you use and you don't have to spend twice as much on it.  I don't know any vendors off the top of my head that do hardware based encryption on 1TB+ drives.  For some reason it seems like it's treated as a novelty item.
0
 
LVL 38

Expert Comment

by:Aaron Tomosky
ID: 35048312
Anothe vote for truecrypt.
0
 
LVL 1

Accepted Solution

by:
R-Weiss earned 500 total points
ID: 35055535
I vote for Truecrypt as well. Couple of thoughts though to protect the drive as failure on an encrypted disk can be troublesome.

If you encrypt the entire system create a rescue disk:
http://www.truecrypt.org/docs/?s=rescue-disk

And it you use an encrypted volume it is a god  idea to back up the data on the system:
http://www.truecrypt.org/docs/?s=how-to-back-up-securely
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 38

Expert Comment

by:Aaron Tomosky
ID: 35058072
Why didnt sykojester get points for this? If I or rweiss get any points it should be an assist.
0
 

Author Comment

by:philsimmons
ID: 35061735
I apologize for that. I found the TrueCrypt program and site very confusing and, frankly, was afraid to try it.  R-Weiss gave me a sense of security that made me feel able to try it out.  I agree that since sykojester first suggested the TrueCrypt he should have shared the points ... is there a way to revise my allocation?  If not, I'll be more careful in the future.  Thanks for pointing it out.
0
 
LVL 3

Expert Comment

by:Richard Schilke
ID: 35067171
I recommend Truecrypt it has a great wizard style setup so it is difficult to get wrong. You just need to ensure you have all data backed up to another device. Create your Encrypted partition which you password protect. You also have the ability to create hidden partitions for additional security on super sensitive data. Just remember that creating a true crypt partition will format the device and destroy your device data. But once created you can copy it all up from your backup and the device appears as normal only password protected as you need.
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
The viewer will learn how to successfully download and install the SARDU utility on Windows 8, without downloading adware.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now