top of page
Frequently Asked Questions
-
How Can NuSource save me money?NuSource's technology expertise and integration capability allow your leadership to move low-value transactions to an efficient self-serve technology, freeing up staff for more lucrative financial activities. Our service and delivery is differentiated by its emphasis on technician training, remote resolution capabilities, specialized teams, and focus on software-related issues. These factors contribute to faster problem resolution, reduced downtime, and overall better client experience.
-
Do you foresee any impact to the ATM’s performance on transaction processing or boot times if we moved ahead?The initial encryption will run in the background. We have installed this on several terminals and have not seen a performance impact.
-
Why consider NuGuard vs just using Microsoft BitLocker?Using something in conjunction with Microsoft BitLocker for hard drive encryption is often recommended to strengthen security, ensure recoverability, or provide more granular control. Here are a few reasons why you might want to use BitLocker alongside other tools or features: 1. Key Management and Recovery • Centralized Management: BitLocker alone handles encryption, but it may not be enough for organizations that need centralized management of encryption keys, especially in large environments. Third-party solutions centralized control over key recovery, reporting, and auditing. • Backup Key Storage: Some companies prefer additional solutions for backup and recovery of encryption keys. This ensures that if the BitLocker recovery key is lost, the data remains recoverable using a separate key management system. 2. Multi-Factor Authentication • Enhanced Authentication: BitLocker can be enhanced with multi-factor authentication (MFA). This often requires combining BitLocker with other tools like TPM (Trusted Platform Module) chips and PIN codes, smartcards, or even biometric authentication to provide extra layers of protection. 3. Advanced Security Requirements • Compliance Needs: In some cases, compliance standards (e.g., HIPAA, GDPR, or PCI-DSS) may require encryption solutions with more complex policies or reporting than what BitLocker alone provides. Using it in conjunction with compliance-oriented security solutions ensures that an organization meets all regulatory obligations. • Tamper Protection: While BitLocker can prevent unauthorized access to a device's data, additional security tools can monitor and prevent tampering with the physical hardware or firmware. For example, solutions like Endpoint Detection and Response (EDR) systems or UEFI Secure Boot. 4. Granular Control and Reporting • Audit and Reporting: BitLocker by itself provides limited auditing and logging. Security management platforms integrated with BitLocker allow for more detailed reporting on encryption status, user activity, and compliance monitoring, which is especially important in enterprise environments. 5. Data Loss Prevention (DLP) • Data Integrity: BitLocker is focused on encrypting data at rest, but it doesn't prevent data from being exfiltrated or altered once the drive is unlocked. Combining BitLocker with Data Loss Prevention (DLP) solutions helps protect sensitive data from unauthorized sharing or access when the device is in use. 6. Cloud Integration and Remote Wipe • Cloud Security: Many organizations use BitLocker in conjunction with cloud-based tools (e.g., Microsoft Intune, Azure) to manage remote encryption policies or enable features like remote wipe, which allows for the erasure of data if a device is lost or stolen. Conclusion While BitLocker provides robust hard drive encryption, combining it with additional tools or features helps ensure comprehensive data protection, especially in enterprise environments where security, compliance, and management are critical factors.
-
Why do I need both malware protection and hard drive encryption?Using both malware protection and drive encryption offers comprehensive security for your data and devices. Each addresses different aspects of digital security and combining them provides layered protection against threats. 1. Malware Protection • Prevents infection: Malware (viruses, ransomware, spyware, etc.) can compromise your system, steal sensitive data, or damage files. Malware protection helps identify and block these malicious programs before they can harm your device. • Detects and removes threats: Even if a malicious file gets through, good malware protection can detect and remove it, minimizing damage. • Real-time defense: Many malware protection systems offer real-time scanning and monitoring to stop attacks as they happen. 2. Drive Encryption • Protects data at rest: Encryption ensures that data stored on your drive is unreadable without the proper decryption key. If your device is lost, stolen, or accessed by unauthorized users, encryption keeps the data secure. • Limits access: Even if someone gains physical access to your device or drive, they won’t be able to read or modify encrypted data without the correct credentials. • Compliance: In many industries, encryption is required to comply with data protection regulations. Together, they provide a more robust security posture, making it harder for attackers to compromise your data and device.
-
Why is NuSource Hyosung's largest partner in the USA?NuSource's position as the #1 Hyosung partner in the United States likely stems from a combination of factors: Comprehensive Service and Support: NuSource is renowned for its exceptional customer service and support. This includes on-site technical assistance, remote monitoring, and 24/7 availability. This level of service ensures that Hyosung ATM and ITM owners can rely on NuSource for timely and effective support. Deep Industry Expertise: NuSource has a deep understanding of the financial services industry and the specific needs of ATM and ITM operators. This expertise allows them to provide tailored solutions to their clients and they have become a trusted advisor to many and who believes in the quality and service of Hyosung. Strong Partnership with Hyosung: NuSource likely has a strong and longstanding partnership with Hyosung. This partnership may involve joint marketing efforts, co-development of products or services, and shared resources. Strategic Focus on Hyosung Products: NuSource made a strategic decision to focus on distributing Hyosung products. This specialization has lead to greater market share and expertise in Hyosung-specific solutions. Customer Satisfaction and Loyalty:
-
How is encryption key management being handled and what does the key rotation process look like?We manage the BitLocker keys with a hosted solution from Sophos that keeps the 40-digit key off site and can easily be retrieved if needed.
-
Will the entire disk be encrypted or will just certain partitions?The entire disk
-
Is the algorithm being used a known encryption standard like SHA, RSA, etc. or are you using something you built in house?The solution leverages BitLocker that is built into the Windows operating system with the convenience of remote key management.
-
How Can NuSource save me money?NuSource's technology expertise and integration capability allow your leadership to move low-value transactions to an efficient self-serve technology, freeing up staff for more lucrative financial activities. Our service and delivery is differentiated by its emphasis on technician training, remote resolution capabilities, specialized teams, and focus on software-related issues. These factors contribute to faster problem resolution, reduced downtime, and overall better client experience.
-
Do you foresee any impact to the ATM’s performance on transaction processing or boot times if we moved ahead?The initial encryption will run in the background. We have installed this on several terminals and have not seen a performance impact.
-
Why consider NuGuard vs just using Microsoft BitLocker?Using something in conjunction with Microsoft BitLocker for hard drive encryption is often recommended to strengthen security, ensure recoverability, or provide more granular control. Here are a few reasons why you might want to use BitLocker alongside other tools or features: 1. Key Management and Recovery • Centralized Management: BitLocker alone handles encryption, but it may not be enough for organizations that need centralized management of encryption keys, especially in large environments. Third-party solutions centralized control over key recovery, reporting, and auditing. • Backup Key Storage: Some companies prefer additional solutions for backup and recovery of encryption keys. This ensures that if the BitLocker recovery key is lost, the data remains recoverable using a separate key management system. 2. Multi-Factor Authentication • Enhanced Authentication: BitLocker can be enhanced with multi-factor authentication (MFA). This often requires combining BitLocker with other tools like TPM (Trusted Platform Module) chips and PIN codes, smartcards, or even biometric authentication to provide extra layers of protection. 3. Advanced Security Requirements • Compliance Needs: In some cases, compliance standards (e.g., HIPAA, GDPR, or PCI-DSS) may require encryption solutions with more complex policies or reporting than what BitLocker alone provides. Using it in conjunction with compliance-oriented security solutions ensures that an organization meets all regulatory obligations. • Tamper Protection: While BitLocker can prevent unauthorized access to a device's data, additional security tools can monitor and prevent tampering with the physical hardware or firmware. For example, solutions like Endpoint Detection and Response (EDR) systems or UEFI Secure Boot. 4. Granular Control and Reporting • Audit and Reporting: BitLocker by itself provides limited auditing and logging. Security management platforms integrated with BitLocker allow for more detailed reporting on encryption status, user activity, and compliance monitoring, which is especially important in enterprise environments. 5. Data Loss Prevention (DLP) • Data Integrity: BitLocker is focused on encrypting data at rest, but it doesn't prevent data from being exfiltrated or altered once the drive is unlocked. Combining BitLocker with Data Loss Prevention (DLP) solutions helps protect sensitive data from unauthorized sharing or access when the device is in use. 6. Cloud Integration and Remote Wipe • Cloud Security: Many organizations use BitLocker in conjunction with cloud-based tools (e.g., Microsoft Intune, Azure) to manage remote encryption policies or enable features like remote wipe, which allows for the erasure of data if a device is lost or stolen. Conclusion While BitLocker provides robust hard drive encryption, combining it with additional tools or features helps ensure comprehensive data protection, especially in enterprise environments where security, compliance, and management are critical factors.
-
Why do I need both malware protection and hard drive encryption?Using both malware protection and drive encryption offers comprehensive security for your data and devices. Each addresses different aspects of digital security and combining them provides layered protection against threats. 1. Malware Protection • Prevents infection: Malware (viruses, ransomware, spyware, etc.) can compromise your system, steal sensitive data, or damage files. Malware protection helps identify and block these malicious programs before they can harm your device. • Detects and removes threats: Even if a malicious file gets through, good malware protection can detect and remove it, minimizing damage. • Real-time defense: Many malware protection systems offer real-time scanning and monitoring to stop attacks as they happen. 2. Drive Encryption • Protects data at rest: Encryption ensures that data stored on your drive is unreadable without the proper decryption key. If your device is lost, stolen, or accessed by unauthorized users, encryption keeps the data secure. • Limits access: Even if someone gains physical access to your device or drive, they won’t be able to read or modify encrypted data without the correct credentials. • Compliance: In many industries, encryption is required to comply with data protection regulations. Together, they provide a more robust security posture, making it harder for attackers to compromise your data and device.
-
Why is NuSource Hyosung's largest partner in the USA?NuSource's position as the #1 Hyosung partner in the United States likely stems from a combination of factors: Comprehensive Service and Support: NuSource is renowned for its exceptional customer service and support. This includes on-site technical assistance, remote monitoring, and 24/7 availability. This level of service ensures that Hyosung ATM and ITM owners can rely on NuSource for timely and effective support. Deep Industry Expertise: NuSource has a deep understanding of the financial services industry and the specific needs of ATM and ITM operators. This expertise allows them to provide tailored solutions to their clients and they have become a trusted advisor to many and who believes in the quality and service of Hyosung. Strong Partnership with Hyosung: NuSource likely has a strong and longstanding partnership with Hyosung. This partnership may involve joint marketing efforts, co-development of products or services, and shared resources. Strategic Focus on Hyosung Products: NuSource made a strategic decision to focus on distributing Hyosung products. This specialization has lead to greater market share and expertise in Hyosung-specific solutions. Customer Satisfaction and Loyalty:
-
How is encryption key management being handled and what does the key rotation process look like?We manage the BitLocker keys with a hosted solution from Sophos that keeps the 40-digit key off site and can easily be retrieved if needed.
-
Will the entire disk be encrypted or will just certain partitions?The entire disk
-
Is the algorithm being used a known encryption standard like SHA, RSA, etc. or are you using something you built in house?The solution leverages BitLocker that is built into the Windows operating system with the convenience of remote key management.
bottom of page