Apricorn Aegis Secure Key 3NX User Manual

5 (1)
Apricorn Aegis Secure Key 3NX User Manual

Aegis Secure Key 3NXPatent Pending

HARDWARE ENCRYPTED USB 3.1 FLASH DRIVE

ON-THE-FLY 256-BIT AES-XTS HARDWARE ENCRYPTION

WORKS WITH:

CONFIGURABLE

SOFTWARE-FREE AUTHENTICATION & OPERATION;

 

 

COMPLETELY CROSS-PLATFORM COMPATIBLE

 

 

 

COMPATIBLE WITH ANY OS:

 

 

 

 

Windows®, Mac®, Linux, etc.

 

The NeXt Generation of

AEGIS CONFIGURATOR™ COMPATIBLE

 

 

 

FIPS 140-2 LEVEL 3 VALIDATION (PENDING)

Aegis Secure Key Brings

 

HIGH-QUALITY RUGGED ALUMINUM HOUSING

 

IP67 as Water and Dust Resistant

 

NeXt Level Security Features

 

 

 

 

 

EMBEDDED 7-16 DIGIT PIN AUTHENTICATION

Our Fourth Generation of Platform Agnostic Secure Keys

No Security Parameters Shared with Hosts

intruduces a host of new security enhancements and up

PROGRAMMABLE MINIMUM PIN LENGTH

to 25% cooler running temperatures, all packed into a lower

ADMIN MODE FOR SECURE DEPLOYMENT

priced USB 3.1 (3.0) flashkey.

 

 

INDEPENDENT USER AND ADMIN PINS

M i l i t a r y G r a d e 2 5 6 - b i t A E S X T S

H a r d w a r e E n c r y p t i o n :

RECOVERY PINS IN CASE OF FORGOTTEN OR

All data is encrypted on-the-fly with built-in 256-bit AES XTS.

 

Software-Free Design: The Aegis Secure Key 3NX is ready to use

LOST PIN

 

 

right out of the box–no software, no drivers, no updates. It can

 

 

ADMIN FORCED-ENROLLMENT

 

even be utilized where no keyboard is present. Completely cross-

AT FIRST USE

 

platform compatible, the Aegis Secure Key excels virtually anywhere–

PIN GUARD™ ACCIDENTAL KEY PRESS

PCs, MACs, Linux, or any OS with a powered USB port and a storage file system.

Configurable: Create custom profiles and mass configure multiple Secure Keys at

RECOGNITION

 

 

once with Apricorn’s new Configurator / Powered Hub bundle.

 

REMOVABLE MEDIA OR FIXED DISK

 

Embedded Keypad: All PIN entries and controls are performed on the keypad of

SETUP OPTION

 

 

the Aegis Secure Key. No critical security parameters are ever shared with the host

USER FORCED-ENROLLMENT

 

computer. Since there is no host involvement in the key’s authentication or operation,

TOUGH EPOXY INTERNAL

 

the risks of software hacking and key-logging are completely circumvented.

 

Super Tough, Inside and Out: The Aegis Secure Key’s rugged, extruded aluminum casing

FILLING FOR PHYSICAL-ATTACK

and polymer-coated keypad is IP67 rated as resistant to dust and water. Inside, another

PROTECTION

layer of protection is added by encasing the inner componentry with a hardened epoxy

 

BRUTE-FORCE PROTECTION

compound to prevent physical access to the encryption circuitry.

 

SELF-DESTRUCT PIN

Independent User and Admin PINs: The Aegis Secure Key can be configured with independent

User and Admin PINs, making it an ideal device for corporate and government deployment.

LOCK-OVERRIDE MODE

Should the User forget his or her PIN, the drive can still be unlocked with the Admin PIN after

DRIVE-RESET FEATURE

which, a new User PIN can then be created.

 

 

One-Time Recovery PINs: In the event that a User PIN is forgotten, up to 4 one-time use recovery

AUTO-LOCK FEATURE

PINs can be programmed to permit access to the drive’s data.

 

 

2 READ-ONLY MODES

 

 

Removable Media / Fixed Disk Toggle: Configure at time of setup to be recognized by any OS or

 

machine with a USB port as one or the other

 

 

Auto-Lock: Locks automatically whenever it’s unplugged from its powered USB port, and is further programmable to lock after a predetermined period of inactivity.

Drive Reset: Allows the drive to be cleared and redeployed as many times as needed. Capable of generating an infinite number of randomly generated encryption keys,

Brute-Force Protection: After a predetermined number (programmable; up to 20) of incorrect PIN entry attempts, the Aegis Secure Key will conclude that it is under Brute Force Attack and will respond by performing a crypto-erase – deleting the encryption key which will render all of the key’s data useless.

Lock-Override Mode: Designated for specific cases in which the key needs to remain unlocked, e.g., during reboot, passing the key through a virtual machine, or other similar situations that would normally prompt the key to automatically lock. When enabled, Lock-Override Mode allows the key to remain unlocked through USB port re-enumeration and will not re-lock until USB power is interrupted.

Two Read-Only Modes: Perfect for accessing data on the key in a public setting to protect against USB viruses. Particularly important in forensics, Read-Only Mode is ideal for applications that require data to be preserved in its original, unaltered state and can’t be overwritten or modified. The Secure Key 3NX has two read-only modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well.

Self-Destruct PIN: The last line of defense for data security where all of the drive’s contents must be wiped to avert breach. The Secure Key’s Self-Destruct PIN defends against physically compromising situations by erasing the key’s contents, leaving it in normal working order and to appear as if it has yet to be deployed.

Loading...
+ 1 hidden pages