Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Storage

A first look at the dataSentinel secure storage system

By Mark W. Kaelin December 5, 2008, 3:14 AM PST

Image
1
of 8

254210.png
254210.png
A first look at the dataSentinel secure storage system

Create your PEC

Create your PEC

Using a fairly typical USB flash thumb drive, dataSentinel will encrypt your data and store it on at least three different servers. Your data will be sliced into encrypted pieces and stored on numerous servers located in various locations across North America. The most notable thing about this whole process is that, to the user, the transactions looks like copying a file or folder from one location to another. It is simplicity at its finest.

n

The first time you insert the USB flash drive into your computer you will be asked to enter a Personal Encryption Code (PEC). The seed for this code is generated by moving the mouse around the screen.

n

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Decide what to store

Decide what to store

After setting up the PEC you’ll get to this screen. From here you can choose which files and folders you want to store off-sight.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Just another drive

Just another drive

From the user’s perspective, the dataSentinel system looks and acts like just another drive on the system.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Administration

Administration

From the Administration screen you can change passwords, permissions, etc.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

More automation

More automation

You can also choose to store copies of folders like the Windows XP My Documents. Make a change to a file and it is automatically updated on the dataSentinel servers.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Each computer is listed

Each computer is listed

As you establish your folders, the local computer is listed. You can name each device with a moniker that means something to you.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

The Ah-Ha moment

The Ah-Ha moment

What makes dataSentinel so useful is that, once you set it up, you can move the USB flash drive to any other PC, log in with your password, and get access to the files you saved on the dataSentinel servers.

Screenshots captured by Mark Kaelin for u00a9 TechRepublic.

A first look at the dataSentinel secure storage system

Saving method

Saving method

The basic principle in the dataSentinel storage method is to break the files into small encrypted pieces and to distribute those pieces across a network of servers. The data from any one server would be meaningless to a hacker – assuming they could actually decrypt the contents.

Diagram courtesy of dataSentinel

  • Storage
  • Account Information

    Share with Your Friends

    A first look at the dataSentinel secure storage system

    Your email has been sent

Share: A first look at the dataSentinel secure storage system
Image of Mark W. Kaelin
By Mark W. Kaelin
Mark W. Kaelin has been writing and editing stories about the information technology industry, software, hardware, gaming, finance, accounting, and technology geekdom for more than 30 years.
  • Account Information

    Contact Mark W. Kaelin

    Your message has been sent

  • |
  • See all of Mark W.'s content

TechRepublic Premium

  • TechRepublic Premium

    Point of Sale Security Guide and Checklist

    For retail businesses, the POS system is arguably their most important IT system. This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise. From the guide: ACCESS CONTROLS The first line of defense in any POS system is the control of both physical and network ...

    Published:  September 24, 2023, 4:00 PM EDT Modified:  September 25, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Spacetech

    The space industry is witnessing a profound transformation, driven by new technologies and the greater participation of the private sector. From satellites to weather, agriculture and communications to space connectivity, industrial IoT devices and scientific, government or space exploration missions, the potential is vast. TechRepublic Premium presents this spacetech glossary to help you understand the ...

    Downloads
    Published:  September 24, 2023, 4:00 PM EDT Modified:  September 25, 2023, 8:32 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Internet and Email Usage Policy

    This policy from TechRepublic Premium sets forth guidelines for the use of the internet, as well as internet-powered communication services, including email, proprietary group messaging services (e.g., Slack) and social networking services in business contexts. It also covers Internet of Things use and bring-your-own-device practices. From the policy: SAFE BROWSING • Use a modern, supported ...

    Downloads
    Published:  September 24, 2023, 4:00 PM EDT Modified:  September 25, 2023, 9:00 AM EDT Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Email/Instant Message/Voicemail Retention Policy

    Maintaining electronic communications in business involves walking a fine line. Employees want relevant information to be kept available for future reference so that they can do their jobs, but keeping these items long-term can pose security and resource risks. The purpose of this policy from TechRepublic Premium is to establish requirements for the retention and ...

    Downloads
    Published:  September 24, 2023, 4:00 PM EDT Modified:  September 25, 2023, 8:00 AM EDT Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice