TTWCP-879-02 Security Tech, Robert Wann of Enova Technology Group: Robert Wann, CEO of Enova Technology Group

On This Episode…

Mr. Wann founded Enova Technology Corporation to develop, and a suite of full disk encrypted and cryptographically authenticated system level solution for both data that is moving and stored data. This company dedicates all their research and development to real-time encryption technology at the hardware level.

If you need to protect your data while in transit, say in the cloud then using Enova’s hardware encrypted products to configure that data is an excellent choice.

Share This Episode

For Questions, Call or Text:



TTWCP-879-Robert Wann

Below is a rush transcript of this segment, it might contain errors.


Robert Wann – Enovatech

Airing Date: September 17, 2016


Craig Peterson: Welcome back to Tech Talk with Craig Peterson. We’re gonna talk right now about some technology that’s designed to help with various types of encryption here. Keeping your data safe. And boy, is that a big problem nowadays. It’s getting nothing but worse. If you’re in the healthcare business, of course, you have to keep it safe by law. If you’re a public company you have to keep it safe. And if you are company that has intellectual property, and this goes all the way across the board. From the entertainment industry that obviously has some pretty valuable stuff. All the way through just the small company that someone might wanna steal your technology here. Your intellectual property and run with it. You also have to keep it safe. It’s just all across the board.  We’ve invited Robert Wann to join us. He is CEO over at Enova Technology Group. You’ll find them online at Enovatech, to talk about what is going on out there in the security business and a little bit of course about some of the problems we’re seeing as well. Robert, welcome to Tech Talk with Craig Peterson.

Robert Wann: Thank you Craig.

Craig: So you’re in Taiwan.

Robert: Yes, I’m currently in Jiufen, Taiwan.

Craig: And you have a number of different products out there. They’re all aimed at various aspects of security. You know, Robert, were hearing about security problems every day. Is there really something we can do as business people or as moms and dads, trying to keep our information safe and secure?

Robert: The most efficient way will be doing it by hardware. And that’s the best secure and most efficient way.

Craig: Can you explain a little bit more for us?

Robert: It’s sitting on a hardware chip that perform automatic and transparent encryption to encrypt your entire disk drive content. So that when you operated your computer, when you read the file, it’s automatically decrypted. When you save the file, the file is automatically encrypted. So that if you shut down your computer, this encryption key it’s gone. It’s erased. Such that when your computer got stolen, the people who have possession of your computer will need to understand how to get over the data encryption key which is your secret key. And the authentication over them is pretty much talking about how would you be able to manage your data encryption key.

Craig: Ok, that makes sense. So, if you have your key stored on that hard disk and it’s used to decrypt the hard disk, obviously that’s not secure at all. If you have the key separately so your machine boots up, one of the first things it does as it is booting is asks you for that encryption key, you can provide the key at that time and it’ll use it to decrypt the disk as it’s running here. And now you have a much safer system but how do you maintain the keys? That’s kind of our next problem here right Robert?

Robert: You’re absolutely correct Craig.

Craig: Alright. So there are many ways to do it. Two factor authentication is kind of the gold standard today. Which means something you have along something you know. So, if I want to keep my data safe, how can I use two factor authentication in order to help with this encryption process?

Robert: It’s something you have. For example a hardware key dongle. Or a small card. Or any USB key dongle that’s under your possession. And it’s something you know as a secret, a PIN, or a password.

Craig: We’re speaking tight now with the CEO of Enovatech, you’ll find them online at Now, Robert, you’ve got a dozen, more than a dozen worldwide patents related to data encryption technology, you truly are an expert here in the field. You have a new product coming out here now, we got a couple of minutes left, called Enigma 3. Why don’t you tell us about what that is and how that can be used to help secure some of our data.

Robert: Definitely. Previously, when you were talking about data encryption, we talked about data sitting on the drive label. So that’s called DAR, a security as you mentioned earlier. Now, talking about Enigma 3, or Enigma 3.1 which is our new product coming to the market in next month or so. It’s a technology utilizing the hardware encryption chip to perform data emulsion security so that to ensure that every data you transfer or you put on the hard drive will be automatically encrypted by the hardware chip or hardware dongle and only the possession of the dongle plus the knowledge, because that’s what you know, as a PIN or password, can successfully decrypt the hardware encrypted file. So that’s the purpose of the Enigma 3.0 or 3.1. I take the advantage of the latest USB 3.0 and USB 3.1 technology. That comes very handy with your notebook computer or your desktop computer. For previously, was on the USB 2.0 but we figured the 2.0 particle might be running a little bit slow such that we operate the entire solution to USB 3.0 and USB 3.1 speed to get you the convenience of the speed while secure with the hardware chip.

Craig: Now, this is an interesting idea. Now it’s a USB dongle. So I plug this into my computer and then the idea is I can plug an external drive or drive ray into this? And all of that data is now encrypted as well?

Robert: Not entirely. Because the Enigma solution secure your data emulsion, meaning that people today, they tend to put all their photos and confidential documents into the public hard drive such as the Google Drive or Dropbox. It’s a cloud service drive and those documents or the information that you place in there wasn’t really secure. Simply because that they’re not encrypted. So when you send it over to cloud, you pretty much give it your 100% trust to the cloud service provider, that they will be able to take good care of your confidential information. There’s a better way to do that. That’s where Enigma 3.0 and 3.1 comes in that utilize the latest USB technology on the hardware chip label to allow users to select any file or folder they wanna encrypt or they wanna protect before they send the files or folders to the cloud storage for archiving or for sharing purposes.

Craig: Ok, I see how that goes now.

Robert: So you have an NGY as application programming running on top of either your Windows operating systems or your Macintosh operating systems and you get to select the file or folder you wanna encrypt. And so the performance out there relies on the hardware chip that is in there on your USB port.

Craig: Of course the encryption can be very, very difficult to do in software on your computer. Very time-consuming for the computer itself. Slows everything down. So by doing it with hardware encryption like you’re talking about here with your Enovatech Enigma 3 that speeds things up dramatically and can actually run it at USB 3.0 speeds which is going to make it just incredibly fast. Lets you now encrypt all of the stuff as it goes up to the cloud. And of course the cloud is where everything seems to be going here in the future. This product, the latest one, should be out in the September 2016 timeframe, so keep an eye out for it and the company, again, is Enovatech. we’ve been joined by their CEO, Robert Wann. Thanks for being with us today Robert.

Robert: Thank you so much Craig for your time.