Imation SECURE User Manual

Welcome to your new Imation® SECURE Hard Drive from Imation (www.imation.com). The Imation
SECURE™ Hard Drive product is a portable secure backup solution. It consists of an external hard drive with the Imation SECURE Hard Drive security software from Imation and TotalMedia Backup software from ArcSoft®, Inc. The Imation SECURE Hard Drive software allows users to protect the files on their
Imation SECURE Hard Drives by automatically encrypting and protecting the sensitive information. (Encryption prevents unauthorized access to confidential data.) This user manual discusses how to install, set up, and use the Imation SECURE Hard Drive software. It also includes some troubleshooting information.
The Imation SECURE Hard Drive software is a Microsoft® Windows® application that is installed on a user’s PC. It runs from the user’s PC or corporate server and automatically detects any Imation SECURE
Hard Drives connected to the machine.
After a user sets up authentication information for their drive (password, hint information, and, optionally, a Bluetooth
®
device), the Imation SECURE Hard Drive software automatically and transparently encrypts any data written to the drive after they have authenticated it. They do not have to change their behavior—they work with files on the encrypted hard drive exactly the same way that they do on standard unencrypted removable hard drives. If the user does not authenticate their Imation SECURE Hard Drive, they cannot access the contents of the encrypted files.
If the drive contains unencrypted files, the software does not encrypt them unless the user chooses to do so. Typically, unencrypted files are ones that the user adds while the drive is connected to a computer that does not have the Imation SECURE Hard Drive software installed on it. The software only encrypts files on authenticated Imation SECURE Hard Drives.
The Imation SECURE Hard Drive software also automatically decrypts the content of encrypted files on the drive that the user opens. It re-encrypts the content when the user closes or saves the files after making changes. If they save or copy files with encrypted content to their hard drive or other removable storage devices, the content of the files they save or copy are unencrypted. They can then use the files freely on machines that do not have the Imation SECURE Hard Drive software installed on them.
System Requirements
The Imation SECURE Hard Drive 2.1 software is supported on Microsoft® Windows® XP Home/Pro,
32-bit version. It is also supported on 32- and 64-bit versions of Windows Vista, Windows 7, and Windows 8.
For automatic backup, TotalMedia Backup, version 2.0 (and higher) by ArcSoft®, Inc. is the recommended software to use with Imation SECURE Hard Drives. The drives contain the installation file
for this software when purchased.
Important Note: Users must have Java™ software, version 6, update 24 or higher from Oracle® Corp.
installed on their machine to use the Imation SECURE Hard Drive software. If the Imation SECURE Hard
Drive software does not run automatically, users can check their list of installed programs through the
Windows Control Panel to see if Java 6.0, update 24 or higher is installed on their PC. If it is not, they can download Java 7.0 for free from
http://www.java.com.
Important Product Use Concepts
The Imation SECURE Hard Drive software will encrypt any files written to an Imation SECURE
Hard Drive by an application, a DOS command window, or by Windows Explorer. Data
encryption is completely automatic.
If the user connects their Imation SECURE Hard Drive to a PC that has the encryption software
installed on it and declines to authenticate it, it will become read-only. Only unencrypted files will be readable. This allows the user to copy unencrypted files from their hard drive to the machine, but they will be unable to write any data to it.
The encrypted files on an Imation SECURE
Hard Drive are inaccessible to applications and the
Microsoft Windows operating system when users are working on machines that do not have the
Imation SECURE
Hard Drive software installed on them. The files are visible on the drive, but
they are encrypted.
To remove authenticated drives, we recommend that users close all applications before safely
removing the drive through the Windows operating system and disconnecting it from the PC.
They should not disconnect the cable that connects the Imation SECURE
Hard Drive to any
computer if they have not first safely removed the drive. Doing so can result in data loss and/or corruption of the NTFS file system on the drive.
I. Installing the Imation SECURE Hard Drive Software
1. Verify that the machine for the Imation SECURE Hard Drive software meets the system
software requirements.
2. Log into the machine, using an account with administrator rights.
3. Connect an Imation SECURE
4. Through Windows Explorer, find and double-click the Imation SECURE
Hard Drive to the machine.
Hard Drive software
installation file (SecureHardDrive Installer.msi) located on the root of the drive.
5. Review the license agreement, accept the terms of the license agreement, and follow the
installation instructions that display.
The user then can log in as any type of user (administrator or non-administrator).
TAfter installation, the Imation SECURE Hard Drive software will appear as a padlock icon in
the notification area of the Windows taskbar (typically located in the lower right corner of the desktop). The software is automatically initiated during system startup and therefore should always be available unless the user selects the Upgrade Java feature.
T Td
Right-clicking the icon will display a context menu of the functions available in the Imation SECURE
Hard Drive software.
Page 2
Occasionally, informational messages will display, using temporary pop-up boxes to provide the user with instructions or inform them of events that have been detected. Users do not need to click on the messages to close them. The messages will disappear automatically.
II. Setting up Imation SECURE Hard Drive Authentication
Users must set up their Imation SECURE Hard Drive for use with the Imation SECURE Hard Drive software. They do so by specifying authentication information (password, hint question and answer) and, optionally, by also selecting a Bluetooth device for authentication. If they have a Bluetooth device that has an Android™ operating system from Google™, Inc. installed on it, they can also separately install the Android Imation SECURE Drive App to further increase security.
The Imation SECURE Hard Drive software automatically detects any Imation SECURE Hard Drive connected to the user’s machine. If the user has not yet set up their drive for encryption,
the software will prompt the user with the Imation SECURE Setup dialog box to create the authentication information for the device. The setup dialog box establishes both the encryption password for the drive as well as a hint question and answer. This information, in conjunction with a Bluetooth device if one is designated, can be used not only to authenticate the device for use but also to retrieve or initiate changing authentication credentials.
(Using a personal pass phrase instead of a simple password provides significantly greater security. Because the password is case-sensitive, the user will need to type it exactly the same way whenever they enter it.)
Page 3
If Bluetooth wireless technology is enabled for the computer to which the drive is connected, the Utilize Bluetooth authentication check box on the setup dialog box is available. The user can use this check box to access the Imation SECURE Bluetooth Preferences dialog box. The dialog box enables the user to select a Bluetooth authentication option and specify a Bluetooth device for authentication.
Authentication options
There are three authentication options:
If the user chooses to save the password and hint information without selecting the Utilize
Bluetooth authentication check box, their authentication type is “Password only.”
If the user wants to use either a password or Bluetooth device, they can select the Utilize
Bluetooth authentication check box and choose “Bluetooth OR password for convenience.”
If the user wants the increased security of dual-factor authentication, they can choose
“Bluetooth AND password for security,” which requires them to provide both their password and Bluetooth-enabled device.
Bluetooth security
When the user specifies a Bluetooth device to authenticate their drive, they can further enhance the security of their Imation SECURE Hard Drive.
For Bluetooth devices that have the Android operating system installed on them, the Android Imation SECURE Drive App generates a stronger authentication key when installed and used.
For Bluetooth devices that do not have the Android operating system installed on them, if the user can modify the device name, they can strengthen the drive security by changing the Bluetooth device name to a unique name.
A. Set up password and hint information
1. Connect an Imation SECURE Hard Drive that is not set up to work with the Imation SECURE Hard Drive software to a computer that has the software installed on it.
The Imation SECURE Setup dialog box displays.
2. Enter a password in the Password and Confirm boxes.
3. Enter a hint question and answer.
4. To add a Bluetooth device if the Utilize Bluetooth authentication check box is enabled, select the check box.
5. Click OK. If the user has selected the check box, the Imation SECURE Bluetooth Preferences
dialog box displays (please refer to “Add a Bluetooth device” on page 5 for further instructions).
– or – If the user has not selected it, a message displays when the drive is ready for use.
Page 4
B. Add a Bluetooth device
1. If the Imation SECURE Bluetooth Preferences dialog box displays, choose a Bluetooth authentication option.
2. Click Discover.
The Imation SECURE Bluetooth Recommendations dialog box displays.
3. Make sure the desired Bluetooth authentication device is within range of the computer, enable its Bluetooth functionality, if necessary, and make the Bluetooth device discoverable.
Page 5
4. Follow the instructions relevant for the desired Bluetooth authentication device. Then, click Continue.
All discoverable Bluetooth devices that are Bluetooth-enabled and within range display
in the Imation SECURE Bluetooth Preferences dialog box list.
5. Select the desired Bluetooth device in the list.
6. Click OK while the Bluetooth device is still discoverable.
7. In the Imation SECURE Enter Device Comment dialog box, enter a comment to help identify the Bluetooth device later.
Note: This comment displays on the About Imation SECURE dialog box.
Page 6
Loading...
+ 15 hidden pages