USB Secure Flash Drive Product Review

Conclusion
Really, all these devices are functionally very similar. But you do have some variation between those that offer secure and non-secure areas, so users need to be wary about how they use them.
People can mistakenly assume that deleting files on their encrypted device permanently removes every trace of the file. The differences between just six products in this review shows that secure devices can be just as vulnerable as ordinary USB devices. Our advice is to choose an accredited product and use the device responsibly - never lend it to anyone.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
CSO WANTED
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags reviewVerbatimsecurity policiesIntegral Secure 360USB Secure Flash DriveUSB memory sticksIntegral Crypto DualSafe StickKingston Data Traveler Vault Privacysecure portable devicesSandisk Cruizer

More about Advanced Encryption StandardAES EnvironmentalIPSKingstonSandiskVerbatim

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Enex Testlab

Latest Videos

More videos

Blog Posts