Enova provides an advanced security platform having performance optimized ASIC-based Hardware Security Module (HSM) with built-in real-time disk encryption capability to ensure trusted and secured relationship among storage server and end point computing device(s) while maintaining line speed data encryption over securing Data-At-Rest (DAR) and Data-In-Transit (DIT) to relieve system from the intensive cryptographic computing overheads.
With FIPS 140-2, the military-grade hardware encryption, the X-Wall® MX+ provides strong protection and real-time performance.
The X-Wall® MX+ is able to generate signature, sign and verify each identity thus provides additional layer of trust relationship beyond TCG Opal 2.0.
FDE (Full Disk Encryption) or SED (Self Encrypting Device)
The X-Wall® MX+ can be configured to perform in-line 6Gbps full disk encryption with AES CBC/XTS 256-bit strength protecting entire Data-at-Rest. This default solution is OS independent.
File Folder Encryption (FFE)
With add-on software components, the X-Wall® MX+ can be configured to perform file/folder encryption, encrypting Data-in-Motion such that files stored in the Cloud storage remain MX+ hardware encrypted. Only the right secret key can successfully decrypt those encrypted files, solution that is OS dependent.
Utilizes latest USB3.0/3.1 to SATA technologies, the X-Wall® MX+ solution enables USB 3.0/3.1 to SATA Portable eDrive.
Encryption hardware, integrated into the X-Wall® MX+ controller, allows the drive to operate at full data rate.
Strong security based in hardware
Encryption is always “on” and the keys for encryption never leave the MX+ interface. User authentication is performed by the MX+ before it will be unlocked, independently of the operating system.
Ease of use
Encryption is transparent to the user because of the MX+. There is no user interaction needed to enable encryption. There is no need to re-encrypt data for re-purposing.
Lower cost of ownership
There is no need for new infrastructure to manage encryption keys, since BitLocker leverages your Active Directory Domain Services infrastructure to store recovery information. Your computer operates more efficiently because processor cycles do not need to be frequently interrupted.