World’s Smartest USB Stick Guards Your Portable ID, Data, Passwords and Applications

Share Article

ID Control, the specialist in strong authentication and encryption today announced the smartest secure USB flash drive available, which also can host virtualized applications, to fight data and online identity theft and fraud.

USB Token for strong authentication, secure storage and portable applications and passwords

The beauty of the ID Control USB Token device is its simplicity and portability; plug it into any computer USB port, and it runs. With the ID Control USB come many portability and security features than any other flash drive, such as strong authentication, secure storage, application virtualization, online passwords and favourites management.

Strong authentication is enabled through the on-board password generator which issues a new one-time password (OTP) every time a user remotely and securely wants to log into the protected remote access of networks, applications and digital resources. At the same time the user’s credentials such as a digital certificate can be verified for strong authentication or used for digital signing purposes. The USB Token is PIN-protected and puts certificates, account and passwords, applications and other data on the move in a secure vault, since data is fully encrypted. Applications can be run virtually from the flash memory of the token which makes it a very small and secure multifunctional portable computing device. Onboard multiple online favourites with related accounts and passwords can be memorized so that with only one master password the user can log in to multiple websites and applications.

Yearly over 20,000,000 unsecured USB sticks are lost in businesses, and with 62% of employees leaving sticks plugged in to unattended computers*, businesses are extremely vulnerable to data and identity theft and fraud. With the ID Control USB Token the related security risks and threats are minimized at affordable costs and users even adopt the token fast due to its user friendly interesting features.

Hans Kortekaas, CEO of ID Control, indicates that when using USB sticks for data storage more organizations should consider that losing intellectual property on an open, unsecured USB flash drive could be disastrous. Securing the data stored in the flash drive is easy with the ID Control USB Token, but provides next to secure storage a lot of other security and portability opportunities. The token is ideal for strong authentication to web based applications, VPN, networks and server based computing and enables applications to run virtually from the flash drive, while users can manage their online favourites, accounts and passwords in the secured flash memory. For more info: http://www.usbstick.net

ID Control, http://www.idcontrol.com located in The Hague, provides strong and easy authentication tokens and unified authentication management. The range of strong authentication tokens for secure online access is composed of HandyID, MessageID, KeystrokeID, the ID Control OTP Key and USB Token. HandyID is an OTP generating application running on your mobile device, the ID Control OTP Key is an OTP generating hardware token, the ID Control USB Token stores and generates digital signatures and OTPs and KeystrokeID recognizes users on the basis of their typing behaviour while logging in. At the same time ID Control offers e-mail encryption, decryption and authentication with MailID which uses MessageIDs One Time Passwords (OTP) via SMS or ID Control USB Tokens for opening up e-mail with attachments. Organizations that use different authentication methods and tokens for different users, accounts, systems, applications and/or services can centrally and integrally manage all kinds with the ID Control Server.

For additional information, registrations and questions you can contact Susan de Wolf on phone number +31- 888-SECURE (732873)!

  • Unsecure USB sticks are the greatest internal security risk according to Eweek and up to 66% of USB Drive are lost according to Centennial Software.

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Susan De Wolf
Visit website