Presented by, K.K.Radhika.

Slides:



Advertisements
Similar presentations
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Advertisements

Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
HiberSnail Portable home directory with environment retrieval.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Tutorial 11 Installing, Updating, and Configuring Software
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
C HAPTER 2 Introduction to Windows XP Professional.
Specialist communication channel. Sarah-Jane king.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Introduction TO Network Administration
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
ITWIN SARATH CHANDRA.V 08Q6A05A3. ABOUT THE PRODUCT SECURE AND PRIVATE FILE COLLABORATION PLATFORM INDEPENDENT SIMPLE AND SAFE REMOTE ACCESS YOUR OWN.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Information Systems Design and Development Security Precautions Computing Science.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
There are many leading online sources that are providing reliable encryption solution for your online as well as offline file security through smart software.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
UNM Encryption Services in Development
iTWIN The Limitless - Pen drive
Cloud Storage Service with Proven Military Grade Security
Unit 3 Virtualization.
Chapter Objectives In this chapter, you will learn:
Chapter 1 : Introduction to Computers
ITwin iTwin Presented by: G.Vyshnavi 14A81A0572 CSE-B.
ICT II Unit 6 Networking.
Chapter 3 Installing and Learning Software
People used to install software on their computers
Cloud Computing.
ITwins By Sushant Burde Vaibhav Deshmukh.
Customized Solutions to your needs
Everything You Wanted to Know About Encryption in Just 10 Minutes
Principles of Information Technology
Controlling Computer-Based Information Systems, Part II
DocFusion 365 Intelligent Template Designer and Document Generation Engine for Office Enables Everyone on Your Team to Increase Productivity OFFICE APP.
1.00 Computer Basics 1.01 Classify computer components.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Fastdroid Produced by : Firas Abdalhaq Mohammad Amour Supervised by : Dr. Raed Alqadi.
3.2 Virtualisation.
Chapter 3 Installing and Using Software
Introduction to Cloud Computing
Plex Workcenter Lookup Add-In Pulls Information into Microsoft Excel so Manufacturing Industry Users Can Efficiently Analyze and Manipulate Data OFFICE.
CLOUD COMPUTING Presented By:- EduTechlearners
The Internet of Things (IoT)
Cloud Storage Services
Chapter 1 : Introduction to Computers
VIRTUALIZATION & CLOUD COMPUTING
Getting Started.
Getting Started.
Unit# 5: Internet and Worldwide Web
Online software and backups
1.00 Computer Basics 1.01 Classify computer components.
ONLINE SECURE DATA SERVICE
BTEC level 3 Learning Aim D.
Presentation transcript:

Presented by, K.K.Radhika. Pursuing B.tech in Department of Computer science and Engineering.

Present drawbacks in USB Drawback of Usb flash drive is its small size cause of which it can be easily misplaced or lost. In the cloud storages data can be stolen misused if the user name & password of an account to access the storage is hacked by someone. There are many more drawbacks like limited storage,no security,backup,temp files,no remote disable etc.,

The limitless Pen Drive iTwin The limitless Pen Drive iTwin let's you access your files from anywhere,simply&securely.

What is an iTwin? iTwin is a 'limitless' secure USB device that enables users to share,edit and access files and media between any two online computers anywhere in the world.The only limit is size of your computer's hard drive. iTwin is an innovative solution that allows remote file access without the security and privacy risks of the cloud and USB flash drives. It’s very easy to access as a USB device and no special installation is required.

A closer look with snaps They are identical. On pulling 2 pieces apart. There are tokens & store keys which allows Encryption and Decryption.

FOUnder & Designer LUX ANANANTHARAMAN Electricals & Electronics Engineering from IIT Chennai & Masters Degree from IISC Banglore

Why to use an iTwin? Plug and play. Strong security. No need for passwords. Access to files on both PC's. Easy recovery from device loss.

SET UP

Remotely edits shared files Remotely edits the shares files from any location.iTwin allows you to keep a single version one computer with you and your chosen iTwin partner collaborating directly on tho version.Say goodbye to multiple versions of files flying around by email.Say goodbye to the headaches of needless re-work.Say hello to iTwin.

Like a limitless capacity Secure Usb Files Directly share the files between two computers without using a cloud. Share the files through the cloud storage by securing the files with in iTwin secure box.

SMART KEY GENERATION Two iTwin together generate a random 256-bit AES(Advanced Encryption standard) everytime they are physically paired and plugged into the computer.Smart Key generation is assisted to the computer to add randomness.

FEATURES Multi-language support. No storage limitations.

iTwin for multi collaboration You can plug in multiple iTwin devices into a single computer and use your computer as centralized shared storage place for the files shared in group of people. You can update the files in storage place and the whole group will have to access to latest set of files.

Twintrust Authentication Before allowing any data transfer,every iTwin is authenticated by iTwin's Twintrust servers. All communication iTwin and Twintrust is secured using industry strength HTTPS(RSA 1024 bit,128 RC4) protocol. After successful authentication by Twintrust, Twintrust assists iTwin to discover it's other half.

Create your personal private VPN (Virtual Private Network)

SOFTWARE REQUIREMENTS When you plug iTwin into a computer for the first time iTwin software gets installed in the computer. Requires 15MB hard-disk space. USB 2.0 port. Requires a broad-band internet access 1Mbps upload speed recommended. Automatic updates.

O.S REQUIRED

Remote Disable In an event that one half of iTwin is lost the connection between the two halves of the device can be disconnected using remote disable feature. This is done by entering a unique disable code in iTwin Disable web centre. The connection between two halves of the iTwin will be disabled within 90 sec after that,it is impossible to gain access to your data via the lost device even if someone finds it.

ADVANTAGES In the case of network interruption iTwin files transfers pause. When the Internet connection is resumed iTwin software continues the file transfer from where it is left of. iTwin progress bar indicates the amount left to be transferred. If the iTwin is lost you can easily disable it. If password is forgotten we can change it easily by attaching both the halfs and set a new one.

LED Indicator: No storage limitations. No temp files. Easy to install and uninstall. Multi language support. LED Indicator: Constant blue light indicates file transferring. Constant red light indicates transfer interruption.

DRAWBACKS A Bit expensive. 99$ Ends are not protected by caps. Not compatible with Linux/obuntu.

Awards & Paper clippings

Online shopping variation in prices due to colour

CONCLUSION iTwin- A fantastic solution for the home users who want to access and change their files remotely and securely. The iTwin is simple & inexpensively solves the limitations. For those who want to keep files up to date between two computers iTwin is for you.

ANY QUERIES?