Data at rest at Tier 2 or above should be protected by a High Grade product. Where this is not an option, an assured hardware-based solution should be preferred as part of a risk managed process. Eclypt 600 may be used in a risk managed solution to protect SECRET and TOP SECRET information, when used in accordance with the NCSC Security Procedures and CIAN 2015/03
. Additional risk information is available from NCSC via firstname.lastname@example.org (CAPS team)
Eclypt 600/Enhanced secures data via one Clearview password and one Touch-Memory Token or KeyStone USB Token. This product has a lifetime key and should be keyed to the same Protective Marking as the data. Please refer to the Security Procedures for further guidance and information.
Eclypt 600/Enhanced drives are available in three variants:
1) Eclypt Core Internal drive:
Direct replacement for the existing hard disk
Available in Rotating (HDD) or Solid State (SSD) variants
Easily retro-fitted or available factory fitted
2) Eclypt Freedom USB drive:
3) Eclypt Nano Portable drive:
Eclypt Technology integrates sophisticated authentication entire disk encryption and data storage into tamper resistant tamper evident hardware that safeguards data. Data is protected even if lost or stolen.
Protects every single sector with 256-bit AES encryption
Stores no plain text
Compatible with all applications and O.S. patches
Supports imaging partitioning and diagnostic applications
Supports multiple users (up to 128)
Life time key there is no need to ever change the key
Requires no ongoing maintenance and no specialist IT knowledge
Encrypts and decrypts data transparently and with no noticeable effect on the computer performance
The following Security Procedures apply:
- Eclypt HMG Issue No.2.0 January 2010
- Eclypt Freedom HMG Issue No.2.0 January 2010
- Eclypt Nano HMG Issue No.1.0 October 2011
These documents are available from the NCSC Enquiries team.