Welcome!

@DXWorldExpo Authors: Yeshim Deniz, Zakia Bouachraoui, Pat Romanski, Carmen Gonzalez, Elizabeth White

News Feed Item

World's First Multi-Factor, Multi-Biometric, Bluetooth® Mobile Security Solution Released by BluStor

BluStor Secure Mobile Briefcase helping secure device, user and data

SAN JOSE, Calif., Dec. 10, 2013 /PRNewswire/ -- BluStor PMC, Inc. introduced the world's first multi-factor, multi-biometric, Bluetooth® Mobile Security Solution: BluStor Secure Mobile Briefcase.

(Photo: http://photos.prnewswire.com/prnh/20131210/PH30428)

"BluStor separates the keys to mobile security from the device and protects the full stream of mobile security—device, user, and data. And, most importantly, BluStor features Bluetooth 4.0/LE, making the system compatible with virtually any mobile device and eliminating the need for proprietary card readers," commented BluStor CEO Finis Conner.

The BluStor Secure Mobile Briefcase (SMB) system virtually eliminates hacking and identity theft by using hardware (a high-capacity Bluetooth card) and software (an iOS or Android app) to enable multi-factor, multi-biometric ID authentication — ideal for applications such as BYOD, health care, schools, or anyone seeking a secure mobile experience.

How BluStor Secure Mobile Briefcase Works
Using the SMB app a user can protect the entire mobile device or designate a 'secure' area on the device. To access the SMB the user provides a biometric, such as fingerprint, iris, or voice, and that input is compared with the user's biometric files stored on the BluStor card. If the BluStor card is not within Bluetooth range, or the offered biometric does not match the stored file, the SMB remains locked.

BluStor card replaces a PIN or password with a secret key 'handshake' between the card and the user's mobile device. And multiple biometrics are stored in full detail (not reduced data sets) on the BluStor card, making it virtually impossible for a hacker to gain access to a user's device.

In addition to biometric security, the BluStor SMB app comes with password vault, file encryption, and more. And with 8GB of secure storage, the BluStor card has sufficient capacity for multiple biometric files and other data, such as email, work files, medical records, photos, music, and more. BluStor Secure Mobile Briefcase prototypes will be available for preview and testing in spring 2014; the solution will ship in fall 2014.

About BluStor PMC, Inc.
Finis Conner, co-founder Seagate, founder Conner Peripherals, recognized that mobile users need effective multi-factor, multi-biometric identity authentication —for health care, BYOD, and other mobile applications — and created the BluStor Secure Mobile Briefcase: powerful, portable, personal. To read more, watch our videos, or download a white paper visit: http://www.blustor.com/.

For more information:
Gregory Newman
Vice President, Business Development
(408) 961-8855
Email

Read more news from BluStor PMC, Inc.

SOURCE BluStor PMC, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

DXWorldEXPO Digital Transformation Stories
Your applications have evolved, your computing needs are changing, and your servers have become more and more dense. But your data center hasn't changed so you can't get the benefits of cheaper, better, smaller, faster... until now. Colovore is Silicon Valley's premier provider of high-density colocation solutions that are a perfect fit for companies operating modern, high-performance hardware. No other Bay Area colo provider can match our density, operating efficiency, and ease of scalability.
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
AI and machine learning disruption for Enterprises started happening in the areas such as IT operations management (ITOPs) and Cloud management and SaaS apps. In 2019 CIOs will see disruptive solutions for Cloud & Devops, AI/ML driven IT Ops and Cloud Ops. Customers want AI-driven multi-cloud operations for monitoring, detection, prevention of disruptions. Disruptions cause revenue loss, unhappy users, impacts brand reputation etc.
Serverless applications increase developer productivity and time to market, by freeing engineers from spending time on infrastructure provisioning, configuration and management. Serverless also simplifies Operations and reduces cost - as the Kubernetes container infrastructure required to run these applications is automatically spun up and scaled precisely with the workload, to optimally handle all runtime requests. Recent advances in open source technology now allow organizations to run Serv...
As the fourth industrial revolution continues to march forward, key questions remain related to the protection of software, cloud, AI, and automation intellectual property. Recent developments in Supreme Court and lower court case law will be reviewed to explain the intricacies of what inventions are eligible for patent protection, how copyright law may be used to protect application programming interfaces (APIs), and the extent to which trademark and trade secret law may have expanded relev...
Cloud computing, big data and AI provide a new impetus and urgency to traditional enterprises to become digitally transformed businesses as they face disruption from new players who leverage technology to foster new business models. Traditionally, enterprises focused on digitizing processes and transactions. The incumbents can also be disruptors by leveraging AI for data-driven insights and innovate at scale on Cloud platform. They need to uncover the power of ERP/SAP using Cloud, AI and Big dat...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...