Use On Different Operating Systems And Smartphones; Integration Von Bestehenden Softwarelösungen; Using The Vid And Pid To Protect Company Data; Use As A Data Diode - Digittrade KOBRA STICK User Manual

Encrypted usb-c secure flash drive
Table of Contents

Advertisement

observed. The Windows To Go operating system can only be used with the KOBRA Stick
with a memory capacity of 32 GB or more and requires special configuration of the stick,
which must be carried out before delivery.
7.7 Use on different operating systems and
smartphones
The KOBRA Stick works through its hardware encryption independently of the operating
system and can be used on almost any device that supports USB media.
The optimized power consumption also allows the KOBRA Stick to be used for data
exchange with a smartphone or tablet.
7.8 Integration von bestehenden Softwarelösungen
All existing software solutions in the organization can continue to be used to enhance
the security features and methods of use. The integrated battery allows authentication
to take place in advance of connecting the stick to a PC or other external power supply
(e.g. USB power supply or USB hub). This feature of the data carrier is called pre-boot
authentication (Chapter 3).
The KOBRA Stick can also be used as a boot medium with an installed operating system.
When the stick is connected to any PC, the operating system installed on the stick starts.
When the KOBRA Stick is disconnected from a PC, the data, programs and temporary
files remain encrypted on the KOBRA Stick and are inaccessible to unauthorized persons.

7.9 Using the VID and PID to protect company data

As an option, the implementation of the Vendor ID (VID) and Product ID (PID) can
be customized. This information allows the KOBRA Stick to be assigned to different
departments and user groups. They may also have different authorizations for USB
connections in the company's internal network.
This makes it possible to determine which KOBRA Stick can be connected to which USB
interfaces in the company. The connection of other "unauthorized" USB data carriers
can thus be prevented.
Additional software may be required to control the USB ports on the host systems

7.10 Use as a data diode

21

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents