Author: Colin Dean
[ad#content_main]A problem inherent in the mobile nature of enclosures is that the mobility is double-edged. That is, it’s just as easy for the owner to move the unit as it is for a would-be thief. Once in the possession of the thief, the data can be easily extracted.
The CRU DataPort SecureDock addresses a few of the attack vectors in the mobile hard drive model. For one, the drive contents are encrypted/decrypted by the firmware of the enclosure at write/read time. If the drive falls into the wrong hands, it’ll be decades before computers have sufficient time/power to crack the code. A thief would be more likely to continue to attempt to steal the security token than attempt to brute force the drive.
The portability of the dock cage is also a protection factor. The user can leave the dock and take the cage when leaving the office, lab, or other secure area. However, a thief could still steal the dock, thus denying the user access to his or her data for a time. To that end, I would like to see a revision of the CRU DataPort SecureDock with a Kensington lock port or at least some kind of sturdy loop usable for securing the dock to a desk or such.
The speeds of the drive are somewhat irrelevant, as the encryption will undoubted add some overhead and the hard drive itself is upgradable/replaceable.
ThinkComputers gives the CRU DataPort SecureDock a 9 out of 10 score. Add a lock port, CRU, and you’ll have the 10.
- Keeps data safe through encryption
- No lock port to secure dock
- Dock lock uses standard and easily acquired key