Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Storage

A first look at the dataSentinel secure storage system

By Mark W. Kaelin December 5, 2008, 3:14 AM PST

Image
1
of 8

254210.png
254210.png
A first look at the dataSentinel secure storage system

Create your PEC

Create your PEC

Using a fairly typical USB flash thumb drive, dataSentinel will encrypt your data and store it on at least three different servers. Your data will be sliced into encrypted pieces and stored on numerous servers located in various locations across North America. The most notable thing about this whole process is that, to the user, the transactions looks like copying a file or folder from one location to another. It is simplicity at its finest.

n

The first time you insert the USB flash drive into your computer you will be asked to enter a Personal Encryption Code (PEC). The seed for this code is generated by moving the mouse around the screen.

n

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Decide what to store

Decide what to store

After setting up the PEC you’ll get to this screen. From here you can choose which files and folders you want to store off-sight.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Just another drive

Just another drive

From the user’s perspective, the dataSentinel system looks and acts like just another drive on the system.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Administration

Administration

From the Administration screen you can change passwords, permissions, etc.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

More automation

More automation

You can also choose to store copies of folders like the Windows XP My Documents. Make a change to a file and it is automatically updated on the dataSentinel servers.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Each computer is listed

Each computer is listed

As you establish your folders, the local computer is listed. You can name each device with a moniker that means something to you.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

The Ah-Ha moment

The Ah-Ha moment

What makes dataSentinel so useful is that, once you set it up, you can move the USB flash drive to any other PC, log in with your password, and get access to the files you saved on the dataSentinel servers.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Saving method

Saving method

The basic principle in the dataSentinel storage method is to break the files into small encrypted pieces and to distribute those pieces across a network of servers. The data from any one server would be meaningless to a hacker – assuming they could actually decrypt the contents.

Diagram courtesy of dataSentinel

  • Storage
  • Account Information

    Share with Your Friends

    A first look at the dataSentinel secure storage system

    Your email has been sent

Share: A first look at the dataSentinel secure storage system
Image of Mark W. Kaelin
By Mark W. Kaelin
Mark W. Kaelin has been writing and editing stories about the information technology industry, gadgets, finance, accounting, and tech-life for more than 25 years. Most recently, he has been a regular contributor to BreakingModern.com, aNewDomain.net,
  • Account Information

    Contact Mark W. Kaelin

    Your message has been sent

  • |
  • See all of Mark W.'s content

TechRepublic Premium

  • TechRepublic Premium

    Guidelines for building security policies

    PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in hand with the subjective knowledge you have of your company, environment and employees. Using this information, your business can establish new policies or elaborate on those ...

    Provided By TechRepublic Premium Published:  Mar 2023 Modified:  Mar 2023 Read More
    View This Now
  • TechRepublic Premium

    Hiring kit: Artificial intelligence architect

    PURPOSE Recruiting an Artificial Intelligence Architect with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY ...

    Provided By TechRepublic Premium Published:  Mar 2023 Modified:  Mar 2023 Read More
    Learn More
  • TechRepublic Premium

    Hiring kit: Autonomous systems engineer

    PURPOSE Hiring the right Autonomous Systems Engineer requires a specific and precise recruitment process, supported by a thorough understanding of the project requirements. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, ...

    Provided By TechRepublic Premium Published:  Mar 2023 Modified:  Mar 2023 Read More
    View This Now
  • TechRepublic Premium

    Hiring kit: Application support engineer

    PURPOSE This Hiring Kit: Application Support Engineer from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS AND SKILLSETS The skillset of successful Application Support Engineers is marked by balancing the technical expertise ...

    Provided By TechRepublic Premium Published:  Mar 2023 Modified:  Mar 2023 Read More
    View This Now

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice