Categories
Blog Data Erasure NEWS News Letter Press Release

SECUDRIVE Sanitizer Portable Released

A new hard disk wipe solution now available from Brainzsquare, SECUDRIVE Sanitizer Portable allows users to easily delete data on hard drives completely, including the OS, without the need to enter BIOS setup or use additional booting devices.

Brainzsquare announced its release of SECUDRIVE Sanitizer Portable(SDSP), a simple hard drive erasure solution that doesn’t require additional booting devices or the BIOS setup.

The only requirements of running SDSP are connecting the USB flash drive, choosing an erase algorithm, and selecting the disk to be wiped within the same PC environment. SDSP erases various kinds of disk drives such as ATA/IDE, SATA, SCSI, USB, and FireWire. SDSP utilizes world-known to erase algorithms such as the Gutmann algorithm (35 times overwrite), the DoD5220.22-M algorithm (3 and 7 times overwrite), etc. to wipe the PC including the OS.

In addition, the details of the erase procedure (disk info, erase algorithm, etc.) are recorded on the report log which is embedded into the hardware. SDSP’s software also allows the user to erase multiple computers and disk drives simultaneously and can be used as many times as needed within a single location.

“Due to the difficulty and complicated nature of having to set up BIOS and having to use additional booting devices such as CD or USB flash drive when wiping the disk, IT specialists were often necessary. SDSP was developed with a solution in mind. The goal of SDSP is to allow even the casual users to be able to completely wipe their computer with extreme ease,” said Simon Kang, CEO of Brainzsquare.

About Brainzsquare:
Founded in 2000, Brainzsquare has been serving specialized and innovative data security solutions into the market. With the launch of the SECUDRIVE product line in 2006, Brainzsquare has been providing products ranging from secure USB flash drives and data erasure products to copy protection software, device control, and file server security for corporate customers and content publishers.
If you have any questions or inquiries about this article or its contents, please contact us.

(Secudrive Drive Eraser is an improvement and a replacement of Secudrive Sanitizer Portable now, 0823/2019)

Categories
Blog

Three Cases Where CD/DVD Content Distribution Cannot Be Used.

Generally, content publishers distribute their content via CD or DVD disc media when it comes to their important content. For over 20 years, CD and DVD discs have been the main method of distributing copy-protected media such as audio and video content. However, CD/DVD based copy protection has been challenging the limitations of what types of content and necessities of a content publisher can be stored on the discs.

In this blog, we’ll discuss three cases where CD and DVD based copy protection solutions cannot function properly when distributing content.

We cannot use it when the content is important and very high in value.
Generally, audio and video content that is distributed via CD/DVD discs are cheap(under the value of fifty US dollars). In this case, content publishers can distribute a large number of CD/DVD containing content using the CD/DVD based copy protection. It is cost-effective for content publishers to distribute in this method, even if some of their content can be copied illegally with cheap or free technological resources available on the internet. There are a lot of CD cracking tools for the general public to use such as Clone CD, which allows even the non-tech savvy people to copy content. Since such resources exist, if you want to distribute content worth hundreds or thousands of dollars, you should not use CD/DVD copy protection solution.

Sharing confidential corporate information internally.
While it is efficient to share data digitally, when sharing confidential information within the company there is crucial and almost irreparable damage if it is exposed outside of the organization. For example, the service manual of a motor company would be shared with various cooperative auto service partners and dealers to enhance their quality of service. However, the exposure of this information to customers, competitors, or outside of the company, in general, may severely damage the reputation and reliability of the company. This service manual can be updated a lot regularly and can be used in the case of internet disconnection. The level of security should be kept high on this content even if there’s a high number of a distribution involved. In this case, CD/DVD based copy protection cannot be used.

Sometimes want to distribute content which cannot be viewed with an existing standard viewing program.
Existing CD/DVD copy protection solutions generally use standard playing or viewing programs to play normal audio and video formatted files. For example, an e-book generally uses a certain viewer such as a PDF viewer. The content of the e-book would be transferred into a PDF format from the publishers’ original format. In this process, there are some issues where the content cannot function efficiently.

1. If the Content has too many HTML or PDF links.
2. PPT file is multimedia, mixed with animation, sounds, and videos.
3. Content is in the form of a .EXE file.
4. Ultra high definition video file that is not compatible with the standard/existing player.

In addition to the three cases, there are some other challenges that come from the rapidly changing IT market environment. Recently, newly released laptops started to stop providing CD/DVD drives. The capacity of a DVD disc is at most 4.7 GB. It is inconvenient to keep track of multiple discs when high-resolution files are involved.

In conclusion, CD/DVD based copy protection solutions have relatively good quality and standards as well as cost-effectiveness, but it has met some challenges with the various growing needs of digital content publishers. Nowadays, Secudrive USB Copy Protection, one of USB based copy protection solutions are used to distribute large amounts of content while providing higher security functions than CD/DVD based copy protection solutions.

Categories
Blog NEWS News Letter Press Release USB Copy Protection

SECUDRIVE USB Copy Protection Released

Specialized copy protection software, SECUDRIVE USB Copy Protection offers the highest caliber copy protection solution for digital content and documents. SECUDRIVE USB Copy Protection provides advanced copy protection features while offering flexibility and compatibility with custom, user-developed applications.

Brainzsquare announced its release of SECUDRIVE USB Copy Protection(SDUCP) a USB copy protection solution into the market.

The USB flash drives have been increasing in popularity due to their convenience, their high capacity storage size and their high-speed performance. More recognized than the CD-ROM when it comes to portable storage, USB drives have been used to distribute high-quality digital content by the media, education systems, government, and others.

SDUCP caters to companies that need copy protection for their digital content and documents when distributing it to others. SDUCP utilizes advanced features such as copy protection that prevents screen capture and printing without authorization, watermark options, validity settings, and DRM policy settings with optional password settings.

SDUCP’s copy protection is compatible with a variety of applications and formats such as HTML, PDF, Flash, multimedia, as well as custom, user-developed applications. SDUCP will interrupt and block the execution of applications except for the ones on the allowed list, and the content owner can simply register the applications via SDUCP’s user interface. There is no need to buy special USB drives because SDUCP also works with normal USB flash drives. SDUCP makes business life easier and more secure by eliminating the excess work of fixing content formatting and having to replace USB drives.

SECUDRIVE USB Copy Protection can be used in multiple settings such as small businesses and companies that distribute digital content like educational files, private documents, and more to prevent unauthorized copying. For customers in need of distributing a large quantity of secure content on USB drives, they can take advantage of the high-speed USB duplication system.

“This solution will help content publishers distribute their content easily and expand their business, especially if they deal with high-quality content such as educational files, technical files, E-books, manuals, etc.,” explains Simon Kang, CEO of Brainzsquare.

Brainzsquare offers 30-day trial versions of SDUCP for businesses to try on their website. (http://www.secudrives.com)

Categories
Blog USB Copy Protection

How to Distribute Your Content Securely

Discs have been the primary method of distribution that content publishers have used for the past decade. With all the copy protection solutions for CD-ROMs and DVD-ROMs that are mostly used, we realize that content publishers trade good functions and content formatting issues for the convenience of using their own applications and a secure method to distributing. However, what has been quickly growing is that copy protection for discs are easily bypassed and copied without authority. These methods of distribution are quickly becoming outdated by the increasing advancement of USB storage capacity, security, and portable convenience.

Is there an affordable solution?
There is now! If you’re a content publisher or corporate distributor in a similar position, we announce Secudrive USB Copy Protection which provides content publishers security for their content by preventing unauthorized copying upon distribution. Secudrive USB Copy Protection is a USB based copy protection solution featuring copy protection policies, Digital Rights Management (DRM) policies, and compatibility with various pre-existing applications. The solution also works with normal USB flash drives, meaning you save money by not having to buy specific flash drives. For mass content distributors, by using the USB duplicator system and USB hubs, you can simultaneously copy secure content on up to sixteen USB drives.

What makes Secudrive USB Copy Protection so special?
The unique feature of Secudrive USB Copy Protection is that not only is it compatible with application programs that already exist on your computer(i.e. PDF viewer, audio and video players, Flash, etc.), it is compatible with special custom-developed applications that are required for your content to function properly. This allows content publishers the flexibility of protecting their content without having to worry about incompatibility and file formatting problems.

So whether you’re distributing digital education or entertainment media, important research documents, powerpoint media, or content requiring specialized custom applications, Secudrive USB Copy Protection has you covered.

A free consultation will be available.

Categories
Blog Data Erasure

How to Delete the Hard Drive and the OS

Even after I emptied the recycle bin and formatted the PC, why would I need to use deletion software when I dispose of my old PC?

Well, the answer is simple: Because even after all you just did, I could still recover everything you have entered on your computer.

We obliviously store everything on our computers. So, knowing how to handle confidential data and personal information such as your bank account number, financial data, bank card number and private information is an essential precaution you have to take, in order to protect your personal information against data leakage or theft. Many people believe that formatting their PC hard drive will remove all of their input information. But the truth of the matter is, just because you can no longer see the file, it doesn’t mean it is gone. File traces are digitally left behind on the OS and potential ‘data thieves’ are able to recover your confidential data that was supposedly ‘deleted.’

You need to have hard drive deletion software.

For safe PC disposal, you need to have some sort of deletion software that will completely delete all of the information on the PC. There is deletion software that uses a constant number deletion mechanism, in which the entire sector is overwritten once by a predetermined constant value. What does that mean? It simply means that your recycle bin or your confidential data will get completely wiped clean using the algorithm to overwrite the data that was stored in your hard drive. This deletion mechanism causes all file traces unrecoverable and completely deletes the digitally stored data in the hard drive, thus, preventing data loss or confidential information recovery after PC disposal.

Where can I get deletion software, that won’t hurt my wallet?

We provide a FREE deletion software, SECUDRIVE Sanitizer Free that uses the same deletion algorithm as stated above. It also has the capability to detect bad sectors and efficiently delete the hard drive until completion. SECUDRIVE Sanitizer Free adopted the automatic deletion mechanism to completely delete all of the data and file traces, giving the user safe hard drive disposal at home.

Compared to other hard drive deletion software, that requires you to make a decision every time a bad sector is found or make you wait for hours just to get you disappointed with an error message in the end, SECUDRIVE Sanitizer Free keeps deleting until the deletion process is completed (pretty hardworking program in my opinion)! When a bad sector is detected in the hard drive by this software, SECUDRIVE Sanitizer Free automatically skips the sector until the total deletion of the hard drive is complete.

(Secudrive Sanitizer Free for individual use is not available. We only provide Secudrive Drive Eraser for businesses, a commercial version of it, now. 08/23/2019)

Categories
Blog Device Control

How to Block Off Smartphones Connected to Your PC.

Nowadays, everyone has a smartphone and if you don’t, then you should probably get our from under the rock and get with the times. I mean, if we took the DeLorean back twenty years ago and showed our parents an iPhone, I think their head would explode.

We use it for everything, ranging from Email and web browsing to updating your Facebook status and video searching your favorite cat videos. But what most people tend to ignore is that your phone can be infected which could be disastrous if you work through your phone as many of us do. Luckily, infection through your SECUDRIVE Device Control installed PC will no longer be an issue by blocking the connection from your phone to the PC.

Depending on the type of connection between a smartphone and the PC, a single smartphone can be ‘connected’ to your PC in a variety of ways.
There are four ways to connect to the PC for smartphones that use the Android OS.

1. Connected as a removable disk-Connected as a ‘Removable Disk Drive’ on ‘My Computer’.

2. Connected as MTP-Connected as a portable device on ‘My Computer’.

3. Connected as PTP-Connected as a camera on ‘My Computer’.

4. Tethered- Connected as a virtual network and you can access the Internet with a smartphone.

Because almost all of the device control programs only control disk drives, if a single device such as a smartphone is converted into various types and connected, it is vulnerable to security threats because it is difficult to block all of its connections.

Even if a smartphone sets up the connection in some way with the SECUDRIVE Device Control installed PC, the Device Control program will block the device, causing the device not to show up on ‘My Computer’ and cannot be used. Even with the management program (Kies or iTunes) provided by the smartphone manufacturing company, you will not be able to connect with your smartphone.

But what if I still want to select connections to still be allowed?

If you want to allow a certain type of connection in specified smartphones, register the smartphone with the desired connection mode in the settings of the Device Control to connect. On the Policy Management menu, if you register your smartphone, only the smartphone model registered by the administrator will be given a license to be connected and used in the registered mode of connection.

If you’re wondering how SECUDRIVE Device Control works in blocking off smartphones, try the trial program and see for yourself.

*SECUDRIVE Device Control will be installed as a trial program and can be deleted at any time. After 30 days, the program will be automatically deleted from the PC.
** Control of all smartphones that use the Android OS is the same except the LG Optimus
*** Apple products such as the iPhone, iPad, iPod, and Computers that use iOS will block the connection and preventing iTunes from connecting.

Categories
Blog Device Control

USB Port Control Program Purchase Guide

This is the purchase guide of SECUDRIVE Device Control for USB port controlling.

Case 1: For some of the PCs in the office, USB drives or external HDs should be blocked.

Case 2: We have about 50 PCs across the branches and the HQ needs to proceed with USB port control and log collection for connected devices and file events.

Case 3: We do not need USB port control inside the office. Because the staffs bring their own laptop, USB port and network should be blocked.

Case 4: We have a customer service center and would like to block the USB ports of about 100 PCs. We do not need logs of the connected devices.

=====================================================================================

Case 1. For some PCs in the office, USB drives or external HDDs should be blocked.
A. PC is connected to the Internet.
– SECUDRIVE Device Control BASIC, ESD Editionis available. This program does not require a separate management program. Just install software on the PC, proceed with a standard license and proceed with USB port control.

B. PC is not connected to the Internet.
– SECUDRIVE Device Control, USB Edition is available. For license authentication, plug in the D Device Control USB drive to the PC and install the program. Without an internet connection, your license can still be authenticated.

Case 2. We have about 50 PCs across the branches and the HQ needs to proceed with USB port control and log collection for connected devices and file events. 
– SECUDRIVE Device Control Enterprise is available. Enterprise version is composed of the central manager program and the client agent program. The manager program automatically collects events of the connected devices and file tasks on them.

Case 3. We do not need USB port control inside the office. Because the staffs bring their own laptop, USB port and network should be blocked. 
– SECUDRIVE Device Control Enterprise is available. Enterprise version provides both [Online policy] for the communication status of the central manager program and the client agent and [Offline policy] for disconnection status. Making use of them, you can set policies for the office and outside environment separately.

Case 4. We have a customer service center and would like to block the USB ports of about 100 PCs. We do not need logs of the connected devices.
– SECUDRIVE Device Control, USB Edition is available. If you need to block USB ports but do not need event logs, you can use BASIC edition. For installation on lots of client PCs, divide licenses into multiple SECUDRIVE Device Control USB drives and install the agent simultaneously on the PCs.

Categories
NEWS Notice Press Release USB Copy Protection USB Sescurity

SECUDRIVE Secure USB products embed “Trend Micro USB Security™ 2.0”

Brainzsquare Co. Ltd. is introducing a new lineup of SECUDRIVE USB with “Trend Micro USB Security (TMUSB) 2.0” vaccine program, provided by Trend Micro Inc.

Equipped with AES 256bit hardware encryption chip, SECUDRIVE USB is targeting individuals with various security utilities and corporate with copy protection and policy management features.

With TMUSB 2.0 embedded, SECUDRIVE USB prevents viruses and malicious codes from invading the USB memory and terminates such threat when detected. Free pattern analysis and engine update is provided for one year from the date of purchase. The license can be renewed each year.

[ SECUDRIVE lineup with TMUSB 2.0 ]

• SECUDRIVE USB Personal V SD 200 Series:
Secure USB for privacy protection with auto-login, PC lock, secure backup, file eraser, hide folder utility embedded.
• SCUDRIVE USB Basic V SD200 Series :
Secure USB for work purposes that does not require any driver or software installation or administrator rights.
• SECUDRIVE USB Enterprise V SD200 Series:
Secure USB memory for enterprises that can set copy protection policy, data leakage control, file, and USB usage log with an exclusive management program
• SECUDRIVE USB Office V SD200 Series:
Copy-protected USB, suitable for delivering MS Office documents to partner companies with usage period and usage control.
• SECUDRIVE USB CAD V SD200 Series:
Copy-protected USB, suitable for delivering CAD files to partner companies with usage period and usage control.

• TMUSB website: TrendMicro.com

SECUDRIVE USB Drive Security & Management:
https://www.secudrives.com/solution/usb-drive-security-and-remote-management/

Categories
Blog NEWS Notice USB Copy Protection USB Sescurity

A Checklist to Buy Secure USB Drives for Businesses

1. Hardware Encryption
Encrypting data is one of the basic features of a secure USB drive. There are two different types of encryption methods, software, and hardware; the main difference between the two is the location of the decipher key. While the software encryption method stores the decipher key on the PC, leaving it vulnerable to virus and hacking, the hardware encryption method keeps the decipher key on the USB drive to reduce the risk of it being exposed. If you are handling confidential or exposure-sensitive files, you should think about purchasing a hardware encrypted secure USB drive.

2. Automatic Self-Destruction Against Brute Force Attack
One of the simplest ways to hack into the secured information is by entering every possible combination until a match on the password is found. This is called the “brute force attack”. In order to prevent illegal access methods, the USB drive needs have a function where the data is completely deleted after a set amount of incorrect password attempts. Make sure your secure USB drive has safeguards against brute force attack.

3. Embedded with Vaccine Program for USB Drive
There are many factors that increase the chances of virus infection; the most influential factor is on how often the USB drive gets connected to an unreliable computer (i.e. public places, schools, libraries, and airports). Once infected, the USB drive acts as a host to infect other PCs. This is extremely dangerous, especially when the infected USB drive is connected to PCs that are connected to lab equipment or contains confidential data. The most efficient way to defend the USB drive from virus infection is to embed a vaccine program

on the USB drive. Anti-virus for USB drive is absolutely necessary when it comes to protecting your private data and files.

4. Need for Copy Protection
The basic function of a secure USB drive is to encrypt data, thus, preventing data leakage when lost or

stolen. However, sometimes those with access to the files would copy the shared files using a USB drive or external hard drive. In this case, the data stored on the USB drive could be saved to the local PC without any trouble.

To prevent data leakage through a friend, coworker or family member, copy protection is ideal. Although the copy protection function is optional, it is necessary to keep those who might be closer to you, out of your private life.

5. Do I need administrative USB drive?

Usually, secure USB drives are purchased by the company and given out to the employees. In which case, each USB drive is independently protected against copy protection, and the individuals become responsible for any leakage accidents.

The administrative USB drive is suitable for companies with a security administrator; the administrator controls every USB drive in the entire company with his own configured security policy. With the administrative USB drive, the security administrator can control password, copy protection, log collection, prevent data leakage, restore password, validity period and number of uses.

6. Reusable with Initialization Tool 
What happens when you forget your password to access the USB drive? Some secure USB drives are not allowed to be initialized, meaning you have to buy a new one. Others are reusable right after initialization but the data will be lost.

Make sure to purchase a replacement secure USB drive or buy one that can be initialized.

Categories
Blog USB Sescurity

How to Protect the USB Flash Drive from Viruses

Due to its convenience, portability, high storage capability and price competitiveness, the usage of USB drives are exponentially increasing. Unfortunately, the number of security accidents and computer damage are also rapidly increasing.

The most notorious virus that gets into the USB drive is the “Stuxnet”. This computer worm can cause significant problems on industrial software and equipment, resulting in the immeasurable loss.

The SECUDRIVE USB flash drive embedded the Trend Micro USB Security system, USB security system specialized on the virus-vaccine program, to prevent USB infection from malicious codes.

In this post, we will discuss:
1. The path of the USB drive virus
2. The damage caused by the virus-infected USB drive
3. How to prevent virus infection through the USB drive.

1. The path of the USB drive virus
Virus infection through the USB drive goes through the following process;
– a USB drive is infected by being connected to a virus-infected PC
– Any PC, where the virus infected USB drive is connected to, will be infected

Computer => USB Drive infection
When the USB drive is used in the virus-infected PC, the virus is automatically copied to the flash drive. “Autorun.inf” file, which automatically executes the virus, is created on the top layer of the USB memory.

USB drive => Computer infection
The virus infected USB drive automatically executes the “autorun.inf” file when connected to a PC. The file copies the virus to the computer and the “autorun.inf” file is also created on the PC.

Autorun.inf File
– This file is created to execute certain programs automatically. It is often used when a CD is inserted to a PC. The USB drive also uses the same process to start the system in the PC, consequentially infecting the PC it connects to.

2. Virus infection damage caused by USB drive
When the USB drive is infected, it starts to infect other PCs and USB flash drives. Once it has infected a computer, the virus can download other viruses through the internet and exacerbate the problem.

The following are some examples of how the virus can harm the user:
– Steals personal information
– Remotely maneuvers PC
– Transmits confidential information on the PC
– Sends keyboard log to an outsider
– Downloads new viruses

3. How to prevent virus infection of USB drive 
The number of new viruses that are infecting USB drives is significantly increasing. Be careful because your USB drive may be infected by one of them without you realizing.

SECUDRIVE USB V series embedded the Trend Micro USB Security anti-virus program, which prevents viruses and malicious codes from infecting the secure zone of the USB drive. The virus pattern is automatically updated when connected to the Internet. Learn how Trend Micro USB Security works.

The following are some safeguards against USB drive viruses.
– Uses secure USB drive with vaccine program embedded
– Uses USB drives on PC with up to date vaccine program
– Uses different USB for different purposes
– Does not use unreliable USB drives
– Checks for virus on the USB drive before opening any files onboard
– Stops any autorun processes by pressing the “shift” button when connecting the USB drive
– Opens the file from Windows Explorer and not from My Computer
– Deactivates the autorun from Windows setting
– Creates the “autorun.inf” folder in the USB drive to prevent the creation of malicious autorun.inf file
– Shows hidden files and folders to quickly distinguish hidden autorun.inf file.