![Rocstor COMMANDER 3F series User Manual Download Page 43](http://html1.mh-extra.com/html/rocstor/commander-3f-series/commander-3f-series_user-manual_1476328043.webp)
ROCSTOR
|
COMMANDER 3F user manual
Page | 43
Encryption Technology
One of the most secure and cutting-edge hardware-based encryption chipsets is integrated into
the internal circuitry of the Commander lines. The chipset contains features such as Advanced
Encryption Standard Algorithm AES-256 bit key strength, and real-time encryption so that there
is virtually zero time in encrypting and decrypting the data. While in either CBC or ECB modes,
the encryption chipset bears certifications from the National Institute of Standards and
Technology (NIST), and FIPS Level 2 for a Cryptographic Module. The Commander is
authenticated by a digital key token, which is inserted for authentication, and removed soon
after the device is authenticated, and then ready for secure data transfer.
How Does Commander Encrypted External Hard Drives Protect Your Data?
Q: What security technology does Commander external hard drives adopt?
A:
Several security schemes are popularly employed to protect data, including:
Password security without hardware encryption - This basic OS/software solution blocks
unauthorized data access by requiring a password. While this may be adequate for a
coffee break, this form of security is very easy to bypass.
Biometric security without hardware encryption - This form of security requires a
combination of a unique physical characteristic, such as a fingerprint, retinal scan, or
vocal signature. While more secure than simple password security, it can be
circumvented too, leaving unencrypted data at risk. Biometric security also requires a
substantial hardware investment and additional administrative burden.
Hardware security—Hardware security is by far the most thorough, cost-effective, and
easily implemented form of advanced security.
Rocsecure—Commander
external drives use hardware-based security, performed by eNova’s
X-Wall MX, to provide reliable security for your stored data. Every bit and byte on the hard