SlideShare a Scribd company logo
datalocker.com | 1-913-310-9088 1
datalocker.com | 1-913-310-9088 2
Mission Statement
Provide proven, easy-to-use data encryption solutions
that protect your data from unauthorized access
datalocker.com | 1-913-310-9088 3
OUR COMPANY
Founded in 2007
Based in Overland Park, KS with R&D center & Sales Office in South Korea and EMEA
Sales office in the UK
OUR CUSTOMERS
Serve thousands of customers worldwide
Products are sold in over 35 countries
OUR PRODUCTS
DataLocker products are developed and engineered in house with no licensed technology
All products are TAA Compliant, meeting federal and military requirements
Patented technology - U.S. Patent #8,185,709, Japanese Patent #5145346, Korea Patent
#10-0834205
• Have successfully licensed patents to a competitor
* On all hardware
At a Glance:
Company Overview
datalocker.com | 1-913-310-9088 4
DataLocker Supports and Manages All Your EndPoints
DataLocker Product Portfolio
Encrypted
Flash
Drives
Encrypted
Hard
Drives
Encrypted
Optical
Media
Cloud
Encryption
Gateway
Central
Management
Platform
datalocker.com | 1-913-310-9088 5
DataLocker DL3FE
Encrypted Portable Hard Drives
Hardware encrypted USB 3.0
External hard drive
Exclusive two-pass independent
cascading AES cryptography
Up to 2TB capacity
No software or drivers required
Centrally manageable
Advanced security features
including self destruct, read only
mode, and alpha numeric / strong
password support
Optional RFID based 2-factor
authentication
datalocker.com | 1-913-310-9088 6
DL3FE - Cryptography Overview
Portable Hard Drives
 Only commercially available encrypted
storage device to utilize two-pass
encryption
 How two-pass encryption works:
 Data is encrypted with a single
round of 256 bit AES XTS mode
encryption
 Data is directly passed to a second
crypto engine undergoing a second
round of 256 bit AES CBC mode
encryption
 Key Generation – Two independent
data encryption keys (DEK) are
randomly generated using
independently generated IV’s
 Keys are never stored or
transmitted in plain text
datalocker.com | 1-913-310-9088 7
DataLocker Enterprise
Encrypted Portable Hard Drives
External hard drive with FIPS 140-2
validation for the entire device
Up to 2TB capacity
No software or drivers required
TAA Compliant
Currently deployed throughout the
US military
datalocker.com | 1-913-310-9088 8
DataLocker Sentry 3.0
Encrypted Flash Drive
A hardware encrypted USB flash
drive
256 bit AES encryption
Ruggedized design
Fast USB 3.0 interface
Up to 64GB capacity
Centrally manageable with
DataLocker SafeConsole
datalocker.com | 1-913-310-9088 9
DataLocker EncryptDisc
Encrypted Optical Media
Empowers anybody to create AES
encrypted CDs or DVDs
FIPS 140-2 Validated crypto engine
No software or drivers to install
A perfect solution for medical, legal and
financial practices
How it works:
Insert the blank media in a Windows
based system
Run the embedded software
Set a password
Drag and drop your files
Simply insert the media and enter the
password to read the data
datalocker.com | 1-913-310-9088 10
DataLocker Cloud Encryption Gateway
Cloud Encryption Gateway
A “cloud encryption gateway” that provides a layer of encryption between your applications
and your cloud storage provider
How it works:
Create an easy-to-use virtual drive
Point your application to the virtual drive letter
Data is fully encrypted before leaving your computer
Data is passed to your cloud storage service provider fully encrypted
datalocker.com | 1-913-310-9088 11
DataLocker Cloud Encryption Gateway
Cloud Encryption Gateway
Allows any application—Microsoft
Office, Autocad, Photoshop and
Quickbooks—to seamlessly utilize AES
256 bit encryption for securing your data
Works with any cloud storage service
Dropbox
Google Drive
Box
Bitcasa
With no custom configuration or setup,
instantly secure data to meet regulatory
compliance requirements established by
HIPAA, SOX, DHS, GLB and PCI
datalocker.com | 1-913-310-9088 12
DataLocker SafeConsole
Central Management System
Enterprise grade encryption management platform that allows larger organizations to
control access, manage devices, and implement policy for encrypted storage devices,
cloud storage services and removable media
•Available as a cloud based software as a service, or as an “on premises” hardware
appliance or software client
datalocker.com | 1-913-310-9088 13
DataLocker solutions are used by thousands of clients worldwide
Representative Clients
LEGAL ENTERPRISE GOVERNMENT HEALTHCARE FINANCIAL
datalocker.com | 1-913-310-9088 14
United States Army
Customer Case Study
Project : ACC Rock Island – Health
Information Collection
Solution : DataLocker Enterprise Encrypted
Hard Drive
Use Case : The US Army needed a way to
encrypt, collect and transport sensitive medical
records. The DataLocker Enterprise’s plug and
play, platform independent design allowed the
Army to deploy a fail safe data encryption
system without requiring any software or
drivers while maintaining compliance with
encryption standards (FIPS 140-2).
Results: Saved the Army hundreds of
thousands of dollars and thousands of man
hours in security testing and system
configuration.
datalocker.com | 1-913-310-9088 15
Walt Disney
Customer Case Study
Project : Needed to Transfer Prerelease Versions
of Upcoming Films Securely
Solution : DataLocker DL3 Encrypted Hard Drive
Use Case : Walt Disney needed a way to encrypt,
collect and transport sensitive prerelease films.
DataLocker’s agnostic solution (works for Macs or
PCs) allowed Disney to safely share and transfer
prerelease versions of upcoming films. USB 3.0
speeds paired with an SSD option allows faster
more reliable data transfers for all their studio
needs.
Results: Disney felt this was an inexpensive way
to prevent a costly leak and exposure of sensitive
information like the one Sony experience in 2014.
datalocker.com | 1-913-310-9088 16
Price Waterhouse Coopers
Customer Case Study
Project : Needed a way to manage and protect
thousands of USBs worldwide
Solution : DataLocker Sentry and SafeConsole
Use Case : As a global professional services
firm, with thousands of consultants working
offsite with confidential client data that needs to
be shared and carried around at all times, having
a centralized management system that allows
administration and control of USB devices was
critical. SafeConsole was easy to deploy and
works with many leading providers of encrypted
storage devices. Lost data could easily mean a
lost deal and severe damage to the reputation of
the company.
Results: Deployed to thousands of users
DataLocker SafeConsole
datalocker.com | 1-913-310-9088 17
Saint Luke’s Health System
Customer Case Study
Project : Needed secure, low-cost method of
delivering and transporting medical records
including diagnostic imagery
Solution : DataLocker EncryptDisc
Use Case : Saint Luke’s Health System needed a
way to provide patient records (like MRIs, etc.) in a
HIPPA compliant manner. They chose DataLocker
EncryptDisc because the solution allowed them to
easily burn sensitive information to optical media
(CD/DVD) without any special software or drivers.
DataLocker also printed custom labels for the
Healthcare company to keep with their brand image.
Results:
Medical records were encrypted and put onto optical
media at a cost that was 90% less than an
encrypted USB flash drive.
datalocker.com | 1-913-310-9088 18
Top Ten Multinational Law Firm
Customer Case Study
Project : Needed a secure method of collecting and
transporting large volumes of sensitive client data from
its client’s site to the firms e-discovery department
Solution : DataLocker DL3FE Encrypted Hard Drive
Use Case : The device uses a high speed USB 3.0
interface and is platform independent requiring no
software or drivers. Hardware based encryption allowed
the law firm to encrypt client data “on the fly” without
having to install any software on the clients system.
Results: Transfer was completed in less that 1/10th
(10
hours vs 120 hours) of the time saving and saved
$10,000 in direct cost. The client was 100% satisfied
that the collected data was fully secured and accounted
for.
datalocker.com | 1-913-310-9088 19
Representative Partners
Device PartnersDistributors Government Resellers
Where to Buy

More Related Content

What's hot

SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
SafeNet
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
CrystaLink Inc.
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009
Dira Sabrina
 
CoreVault Enterprise Solution
CoreVault Enterprise SolutionCoreVault Enterprise Solution
CoreVault Enterprise Solution
guest85b56141
 
Rightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public CloudRightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public Cloud
RightScale
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
DataWorks Summit
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
Ulf Mattsson
 
Green Station Overview Final
Green Station Overview   FinalGreen Station Overview   Final
Green Station Overview Final
beckeys
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
Abhishek Sood
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
Gerardo Pardo-Castellote
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
Cloudera, Inc.
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
Data Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecData Retention and eDiscovery from Symantec
Data Retention and eDiscovery from Symantec
Arrow ECS UK
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
Mike Spaulding
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption Works
Symantec
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
Bloombase
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
andreasschuster
 

What's hot (20)

SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009
 
CoreVault Enterprise Solution
CoreVault Enterprise SolutionCoreVault Enterprise Solution
CoreVault Enterprise Solution
 
Rightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public CloudRightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public Cloud
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
Green Station Overview Final
Green Station Overview   FinalGreen Station Overview   Final
Green Station Overview Final
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
 
Project Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for HadoopProject Rhino: Enhancing Data Protection for Hadoop
Project Rhino: Enhancing Data Protection for Hadoop
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Data Retention and eDiscovery from Symantec
Data Retention and eDiscovery from SymantecData Retention and eDiscovery from Symantec
Data Retention and eDiscovery from Symantec
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption Works
 
Blbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-enBlbs tn-double-the-power-half-the-space-uslet-en
Blbs tn-double-the-power-half-the-space-uslet-en
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 

Similar to DataLockerOverview vs 3.9 Final_120715

ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
Garet Keller
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
sang yoo
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
juniortstanley
 
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgradeNext generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Jisc
 
DDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for ExascaleDDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for Exascale
Intel IT Center
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
Procore Technologies
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
naterator
 
ProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and LoaderProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and Loader
Prime Array
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
Erik Von Schlehenried
 
Academic Workflows with iRODS FINAL
Academic Workflows with iRODS FINALAcademic Workflows with iRODS FINAL
Academic Workflows with iRODS FINAL
Randy Splinter
 
Webinar: Cleaning up the SDS Mess - Four Keys to Success
Webinar: Cleaning up the SDS Mess - Four Keys to SuccessWebinar: Cleaning up the SDS Mess - Four Keys to Success
Webinar: Cleaning up the SDS Mess - Four Keys to Success
Storage Switzerland
 
BCLOUD: Smart Scale your Storage - festival ICT 2015
BCLOUD: Smart Scale your Storage - festival ICT 2015BCLOUD: Smart Scale your Storage - festival ICT 2015
BCLOUD: Smart Scale your Storage - festival ICT 2015
festival ICT 2016
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
Skytap Cloud
 
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Denodo
 
THE TOP 10 REASONS TO ADOPT SOFTWARE-DEFINED STORAGE
THE TOP 10 REASONS TO ADOPT SOFTWARE-DEFINED STORAGETHE TOP 10 REASONS TO ADOPT SOFTWARE-DEFINED STORAGE
THE TOP 10 REASONS TO ADOPT SOFTWARE-DEFINED STORAGE
DataCore Software
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
Dinis Cruz
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
Defence and Security Accelerator
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment
Gazzang
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
Sameer (Sam) Vitkar
 
Techgate's Business Cloud Backup
Techgate's Business Cloud BackupTechgate's Business Cloud Backup
Techgate's Business Cloud Backup
Techgate plc
 

Similar to DataLockerOverview vs 3.9 Final_120715 (20)

ArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUDArchivePod a legacy data solution when migrating to the #CLOUD
ArchivePod a legacy data solution when migrating to the #CLOUD
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
 
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgradeNext generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
 
DDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for ExascaleDDN and Intel: Partnered for Exascale
DDN and Intel: Partnered for Exascale
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
ProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and LoaderProServer - Direct network attached CD / DVD Server and Loader
ProServer - Direct network attached CD / DVD Server and Loader
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Academic Workflows with iRODS FINAL
Academic Workflows with iRODS FINALAcademic Workflows with iRODS FINAL
Academic Workflows with iRODS FINAL
 
Webinar: Cleaning up the SDS Mess - Four Keys to Success
Webinar: Cleaning up the SDS Mess - Four Keys to SuccessWebinar: Cleaning up the SDS Mess - Four Keys to Success
Webinar: Cleaning up the SDS Mess - Four Keys to Success
 
BCLOUD: Smart Scale your Storage - festival ICT 2015
BCLOUD: Smart Scale your Storage - festival ICT 2015BCLOUD: Smart Scale your Storage - festival ICT 2015
BCLOUD: Smart Scale your Storage - festival ICT 2015
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
 
THE TOP 10 REASONS TO ADOPT SOFTWARE-DEFINED STORAGE
THE TOP 10 REASONS TO ADOPT SOFTWARE-DEFINED STORAGETHE TOP 10 REASONS TO ADOPT SOFTWARE-DEFINED STORAGE
THE TOP 10 REASONS TO ADOPT SOFTWARE-DEFINED STORAGE
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment
 
Vaultize corp three-pager v14
Vaultize corp three-pager v14Vaultize corp three-pager v14
Vaultize corp three-pager v14
 
Techgate's Business Cloud Backup
Techgate's Business Cloud BackupTechgate's Business Cloud Backup
Techgate's Business Cloud Backup
 

DataLockerOverview vs 3.9 Final_120715

  • 2. datalocker.com | 1-913-310-9088 2 Mission Statement Provide proven, easy-to-use data encryption solutions that protect your data from unauthorized access
  • 3. datalocker.com | 1-913-310-9088 3 OUR COMPANY Founded in 2007 Based in Overland Park, KS with R&D center & Sales Office in South Korea and EMEA Sales office in the UK OUR CUSTOMERS Serve thousands of customers worldwide Products are sold in over 35 countries OUR PRODUCTS DataLocker products are developed and engineered in house with no licensed technology All products are TAA Compliant, meeting federal and military requirements Patented technology - U.S. Patent #8,185,709, Japanese Patent #5145346, Korea Patent #10-0834205 • Have successfully licensed patents to a competitor * On all hardware At a Glance: Company Overview
  • 4. datalocker.com | 1-913-310-9088 4 DataLocker Supports and Manages All Your EndPoints DataLocker Product Portfolio Encrypted Flash Drives Encrypted Hard Drives Encrypted Optical Media Cloud Encryption Gateway Central Management Platform
  • 5. datalocker.com | 1-913-310-9088 5 DataLocker DL3FE Encrypted Portable Hard Drives Hardware encrypted USB 3.0 External hard drive Exclusive two-pass independent cascading AES cryptography Up to 2TB capacity No software or drivers required Centrally manageable Advanced security features including self destruct, read only mode, and alpha numeric / strong password support Optional RFID based 2-factor authentication
  • 6. datalocker.com | 1-913-310-9088 6 DL3FE - Cryptography Overview Portable Hard Drives  Only commercially available encrypted storage device to utilize two-pass encryption  How two-pass encryption works:  Data is encrypted with a single round of 256 bit AES XTS mode encryption  Data is directly passed to a second crypto engine undergoing a second round of 256 bit AES CBC mode encryption  Key Generation – Two independent data encryption keys (DEK) are randomly generated using independently generated IV’s  Keys are never stored or transmitted in plain text
  • 7. datalocker.com | 1-913-310-9088 7 DataLocker Enterprise Encrypted Portable Hard Drives External hard drive with FIPS 140-2 validation for the entire device Up to 2TB capacity No software or drivers required TAA Compliant Currently deployed throughout the US military
  • 8. datalocker.com | 1-913-310-9088 8 DataLocker Sentry 3.0 Encrypted Flash Drive A hardware encrypted USB flash drive 256 bit AES encryption Ruggedized design Fast USB 3.0 interface Up to 64GB capacity Centrally manageable with DataLocker SafeConsole
  • 9. datalocker.com | 1-913-310-9088 9 DataLocker EncryptDisc Encrypted Optical Media Empowers anybody to create AES encrypted CDs or DVDs FIPS 140-2 Validated crypto engine No software or drivers to install A perfect solution for medical, legal and financial practices How it works: Insert the blank media in a Windows based system Run the embedded software Set a password Drag and drop your files Simply insert the media and enter the password to read the data
  • 10. datalocker.com | 1-913-310-9088 10 DataLocker Cloud Encryption Gateway Cloud Encryption Gateway A “cloud encryption gateway” that provides a layer of encryption between your applications and your cloud storage provider How it works: Create an easy-to-use virtual drive Point your application to the virtual drive letter Data is fully encrypted before leaving your computer Data is passed to your cloud storage service provider fully encrypted
  • 11. datalocker.com | 1-913-310-9088 11 DataLocker Cloud Encryption Gateway Cloud Encryption Gateway Allows any application—Microsoft Office, Autocad, Photoshop and Quickbooks—to seamlessly utilize AES 256 bit encryption for securing your data Works with any cloud storage service Dropbox Google Drive Box Bitcasa With no custom configuration or setup, instantly secure data to meet regulatory compliance requirements established by HIPAA, SOX, DHS, GLB and PCI
  • 12. datalocker.com | 1-913-310-9088 12 DataLocker SafeConsole Central Management System Enterprise grade encryption management platform that allows larger organizations to control access, manage devices, and implement policy for encrypted storage devices, cloud storage services and removable media •Available as a cloud based software as a service, or as an “on premises” hardware appliance or software client
  • 13. datalocker.com | 1-913-310-9088 13 DataLocker solutions are used by thousands of clients worldwide Representative Clients LEGAL ENTERPRISE GOVERNMENT HEALTHCARE FINANCIAL
  • 14. datalocker.com | 1-913-310-9088 14 United States Army Customer Case Study Project : ACC Rock Island – Health Information Collection Solution : DataLocker Enterprise Encrypted Hard Drive Use Case : The US Army needed a way to encrypt, collect and transport sensitive medical records. The DataLocker Enterprise’s plug and play, platform independent design allowed the Army to deploy a fail safe data encryption system without requiring any software or drivers while maintaining compliance with encryption standards (FIPS 140-2). Results: Saved the Army hundreds of thousands of dollars and thousands of man hours in security testing and system configuration.
  • 15. datalocker.com | 1-913-310-9088 15 Walt Disney Customer Case Study Project : Needed to Transfer Prerelease Versions of Upcoming Films Securely Solution : DataLocker DL3 Encrypted Hard Drive Use Case : Walt Disney needed a way to encrypt, collect and transport sensitive prerelease films. DataLocker’s agnostic solution (works for Macs or PCs) allowed Disney to safely share and transfer prerelease versions of upcoming films. USB 3.0 speeds paired with an SSD option allows faster more reliable data transfers for all their studio needs. Results: Disney felt this was an inexpensive way to prevent a costly leak and exposure of sensitive information like the one Sony experience in 2014.
  • 16. datalocker.com | 1-913-310-9088 16 Price Waterhouse Coopers Customer Case Study Project : Needed a way to manage and protect thousands of USBs worldwide Solution : DataLocker Sentry and SafeConsole Use Case : As a global professional services firm, with thousands of consultants working offsite with confidential client data that needs to be shared and carried around at all times, having a centralized management system that allows administration and control of USB devices was critical. SafeConsole was easy to deploy and works with many leading providers of encrypted storage devices. Lost data could easily mean a lost deal and severe damage to the reputation of the company. Results: Deployed to thousands of users DataLocker SafeConsole
  • 17. datalocker.com | 1-913-310-9088 17 Saint Luke’s Health System Customer Case Study Project : Needed secure, low-cost method of delivering and transporting medical records including diagnostic imagery Solution : DataLocker EncryptDisc Use Case : Saint Luke’s Health System needed a way to provide patient records (like MRIs, etc.) in a HIPPA compliant manner. They chose DataLocker EncryptDisc because the solution allowed them to easily burn sensitive information to optical media (CD/DVD) without any special software or drivers. DataLocker also printed custom labels for the Healthcare company to keep with their brand image. Results: Medical records were encrypted and put onto optical media at a cost that was 90% less than an encrypted USB flash drive.
  • 18. datalocker.com | 1-913-310-9088 18 Top Ten Multinational Law Firm Customer Case Study Project : Needed a secure method of collecting and transporting large volumes of sensitive client data from its client’s site to the firms e-discovery department Solution : DataLocker DL3FE Encrypted Hard Drive Use Case : The device uses a high speed USB 3.0 interface and is platform independent requiring no software or drivers. Hardware based encryption allowed the law firm to encrypt client data “on the fly” without having to install any software on the clients system. Results: Transfer was completed in less that 1/10th (10 hours vs 120 hours) of the time saving and saved $10,000 in direct cost. The client was 100% satisfied that the collected data was fully secured and accounted for.
  • 19. datalocker.com | 1-913-310-9088 19 Representative Partners Device PartnersDistributors Government Resellers Where to Buy