Aegis Secure Key 3.0
CONFIGURABLE
HARDWARE ENCRYPTED USB 3.1 (3.0) FLASH DRIVE
ON-THE-FLY 256-BIT AES-XTS HARDWARE ENCRYPTION
SOFTWARE-FREE AUTHENTICATION & OPERATION; |
|
|
|
|
|
|||
WORKS |
|
|
||||||
|
||||||||
COMPLETELY CROSS-PLATFORM COMPATIBLE |
WITH: |
|
|
|||||
|
||||||||
COMPATIBLE WITH ANY OS: Windows®, Mac®, Linux, etc. |
||||||||
AEGIS CONFIGURATOR™ COMPATIBLE |
|
|
|
|
|
|||
FIPS 140-2 LEVEL 3 VALIDATION |
|
Inside This Tiny Key is a World |
||||||
HIGH-QUALITY RUGGED ALUMINUM HOUSING |
||||||||
Of Advanced Data Protection. |
||||||||
IP68 CERTIFIED: Water and Dust Resistant |
||||||||
EMBEDDED 7-16 DIGIT PIN AUTHENTICATION |
Software-free operation, cross-platform compatibility, USB 3.1 |
|||||||
speed, increased capacities of up to 480GB, plus a host of high- |
||||||||
No Security Parameters Shared with Hosts |
||||||||
level security features that you’d never expect to find in a flashkey. |
||||||||
PROGRAMMABLE MINIMUM PIN LENGTH |
||||||||
Military Grade 256-bit AES XTS Hardware Encryption: All data on the |
||||||||
|
|
|
||||||
ADMIN MODE FOR SECURE DEPLOYMENT |
Aegis Secure Key is encrypted on-the-fly with built-in 256-bit AES XTS. |
|||||||
INDEPENDENT USER AND ADMIN PINS |
Software-Free Design: The Aegis Secure Key is ready to use right out of the |
|||||||
box–no software, no drivers, no updates involved. It can even be utilized where |
||||||||
|
|
|
||||||
RECOVERY PINS IN CASE OF |
|
no keyboard is present (e.g., cockpits, medical equipment, AV gear.) Completely |
||||||
FORGOTTEN OR LOST PIN |
|
cross-platform compatible, the Aegis Secure Key excels just about anywhere– |
||||||
|
PCs, MACs, Linux, or any OS with a powered USB port and a storage file system. |
|||||||
ADMIN FORCED-ENROLLMENT AT |
||||||||
Configurable: Create custom profiles and mass configure multiple Secure Keys at |
||||||||
FIRST USE |
|
once with Apricorn’s new Configurator / Powered Hub bundle. |
||||||
USER FORCED-ENROLLMENT |
|
Embedded Keypad: All PIN entries and controls are performed on the keypad of |
||||||
|
the Aegis Secure Key. Since there is no host involvement in the key’s authentication |
|||||||
TOUGH EPOXY INTERNAL |
|
|||||||
|
or operation, the risk of software hacking and key-logging is completely circumvented. |
|||||||
FILLING FOR PHYSICAL- |
|
Super Tough, Inside and Out: IP-68 certified as tough enough to go anywhere, the Aegis |
||||||
ATTACK PROTECTION |
|
Secure Key’s resilient design makes it perfect for travel. Its rugged, extruded aluminum |
||||||
BRUTE-FORCE PROTECTION |
|
casing is resistant to dust and water, and the keypad is wear-resistant. Inside, another layer |
||||||
|
of protection is added with the injection of a tough epoxy compound to prevent physical |
|||||||
|
|
|||||||
SELF-DESTRUCT PIN |
|
access to the key’s encryption circuitry. |
||||||
LOCK-OVERRIDE MODE |
|
Independent User and Admin PINs: The Aegis Secure Key can be configured with independent |
||||||
|
User and Admin PINs, making it an ideal device for corporate and government deployment. |
|||||||
DRIVE-RESET FEATURE |
Should the User forget his or her PIN, the drive can still be unlocked with the Admin PIN and a new |
|||||||
User PIN can be created. |
||||||||
AUTO-LOCK FEATURE |
||||||||
One-Time Recovery PINs: In the event that a User PIN is forgotten, up to 4 one-time use recovery |
||||||||
|
PINs can be programmed to permit access to the drive’s data. |
Auto-Lock: Locks automatically whenever it’s unplugged from its powered USB port, and is further programmable to lock after a predetermined period of inactivity.
Drive Reset: Allows the drive to be cleared and redeployed. Capable of generating an infinite number of randomly generated encryption keys, The Aegis Secure Key 3 can be reset as many times as desired. Brute-Force Protection: After a predetermined number (programmable; up to 20) of incorrect PIN entry attempts, the Aegis Secure Key will conclude that it is under Brute Force Attack and will respond by performing a crypto-erase – deleting the encryption key which will render all of the key’s data useless. Lock-Override Mode Feature:Designated for specific cases in which the key needs to remain unlocked, e.g., during reboot, passing the key through a virtual machine, or other similar situations that would normally prompt the key to automatically lock. When enabled, Lock-Override Mode allows the key to remain unlocked through USB port re-enumeration and will not re-lock until USB power is interrupted.
Two Read-Only Modes: Perfect for accessing data on the key in a public setting to protect against USB viruses. Particularly important in forensics, Read-Only Mode is ideal for applications that require data to be preserved in its original, unaltered state and can’t be overwritten or modified. The Secure Key 3z has two readonly modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well.
Self-Destruct Feature: The last line of defense for data security where all of the drive’s contents must be wiped to avert breach. The Secure Key’s Self-Destruct PIN defends against physically compromising situations by erasing the key’s contents, leaving it in normal working order and to appear as if it has yet to be deployed.
Visit our web site at www.apricorn.com or call 1-800-458-5448
©2017 Apricorn, Inc. Corporate Offices: 12191 Kirkham Rd., Poway, CA. 92064