Aegis Secure Key 3NXPatent Pending
HARDWARE ENCRYPTED USB 3.1 FLASH DRIVE
ON-THE-FLY 256-BIT AES-XTS HARDWARE ENCRYPTION |
WORKS WITH: |
CONFIGURABLE |
|||
SOFTWARE-FREE AUTHENTICATION & OPERATION; |
|
|
|||
COMPLETELY CROSS-PLATFORM COMPATIBLE |
|
|
|
||
COMPATIBLE WITH ANY OS: |
|
|
|
|
|
Windows®, Mac®, Linux, etc. |
|
The NeXt Generation of |
|||
AEGIS CONFIGURATOR™ COMPATIBLE |
|||||
|
|
|
|||
FIPS 140-2 LEVEL 3 VALIDATION (PENDING) |
Aegis Secure Key Brings |
|
|||
HIGH-QUALITY RUGGED ALUMINUM HOUSING |
|
||||
IP67 as Water and Dust Resistant |
|
NeXt Level Security Features |
|
||
|
|
|
|
||
EMBEDDED 7-16 DIGIT PIN AUTHENTICATION |
Our Fourth Generation of Platform Agnostic Secure Keys |
||||
No Security Parameters Shared with Hosts |
|||||
intruduces a host of new security enhancements and up |
|||||
PROGRAMMABLE MINIMUM PIN LENGTH |
|||||
to 25% cooler running temperatures, all packed into a lower |
|||||
ADMIN MODE FOR SECURE DEPLOYMENT |
priced USB 3.1 (3.0) flashkey. |
|
|
||
INDEPENDENT USER AND ADMIN PINS |
M i l i t a r y G r a d e 2 5 6 - b i t A E S X T S |
H a r d w a r e E n c r y p t i o n : |
|||
RECOVERY PINS IN CASE OF FORGOTTEN OR |
All data is encrypted on-the-fly with built-in 256-bit AES XTS. |
|
|||
Software-Free Design: The Aegis Secure Key 3NX is ready to use |
|||||
LOST PIN |
|
||||
|
right out of the box–no software, no drivers, no updates. It can |
||||
|
|
||||
ADMIN FORCED-ENROLLMENT |
|
even be utilized where no keyboard is present. Completely cross- |
|||
AT FIRST USE |
|
platform compatible, the Aegis Secure Key excels virtually anywhere– |
|||
PIN GUARD™ ACCIDENTAL KEY PRESS |
PCs, MACs, Linux, or any OS with a powered USB port and a storage file system. |
||||
Configurable: Create custom profiles and mass configure multiple Secure Keys at |
|||||
RECOGNITION |
|
||||
|
once with Apricorn’s new Configurator / Powered Hub bundle. |
|
|||
REMOVABLE MEDIA OR FIXED DISK |
|
||||
Embedded Keypad: All PIN entries and controls are performed on the keypad of |
|||||
SETUP OPTION |
|
||||
|
the Aegis Secure Key. No critical security parameters are ever shared with the host |
||||
USER FORCED-ENROLLMENT |
|
computer. Since there is no host involvement in the key’s authentication or operation, |
|||
TOUGH EPOXY INTERNAL |
|
the risks of software hacking and key-logging are completely circumvented. |
|
||
Super Tough, Inside and Out: The Aegis Secure Key’s rugged, extruded aluminum casing |
|||||
FILLING FOR PHYSICAL-ATTACK |
|||||
and polymer-coated keypad is IP67 rated as resistant to dust and water. Inside, another |
|||||
PROTECTION |
|||||
layer of protection is added by encasing the inner componentry with a hardened epoxy |
|||||
|
|||||
BRUTE-FORCE PROTECTION |
compound to prevent physical access to the encryption circuitry. |
|
|||
SELF-DESTRUCT PIN |
Independent User and Admin PINs: The Aegis Secure Key can be configured with independent |
||||
User and Admin PINs, making it an ideal device for corporate and government deployment. |
|||||
LOCK-OVERRIDE MODE |
|||||
Should the User forget his or her PIN, the drive can still be unlocked with the Admin PIN after |
|||||
DRIVE-RESET FEATURE |
which, a new User PIN can then be created. |
|
|
||
One-Time Recovery PINs: In the event that a User PIN is forgotten, up to 4 one-time use recovery |
|||||
AUTO-LOCK FEATURE |
|||||
PINs can be programmed to permit access to the drive’s data. |
|
|
|||
2 READ-ONLY MODES |
|
|
|||
Removable Media / Fixed Disk Toggle: Configure at time of setup to be recognized by any OS or |
|||||
|
machine with a USB port as one or the other |
|
|
Auto-Lock: Locks automatically whenever it’s unplugged from its powered USB port, and is further programmable to lock after a predetermined period of inactivity.
Drive Reset: Allows the drive to be cleared and redeployed as many times as needed. Capable of generating an infinite number of randomly generated encryption keys,
Brute-Force Protection: After a predetermined number (programmable; up to 20) of incorrect PIN entry attempts, the Aegis Secure Key will conclude that it is under Brute Force Attack and will respond by performing a crypto-erase – deleting the encryption key which will render all of the key’s data useless.
Lock-Override Mode: Designated for specific cases in which the key needs to remain unlocked, e.g., during reboot, passing the key through a virtual machine, or other similar situations that would normally prompt the key to automatically lock. When enabled, Lock-Override Mode allows the key to remain unlocked through USB port re-enumeration and will not re-lock until USB power is interrupted.
Two Read-Only Modes: Perfect for accessing data on the key in a public setting to protect against USB viruses. Particularly important in forensics, Read-Only Mode is ideal for applications that require data to be preserved in its original, unaltered state and can’t be overwritten or modified. The Secure Key 3NX has two read-only modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well.
Self-Destruct PIN: The last line of defense for data security where all of the drive’s contents must be wiped to avert breach. The Secure Key’s Self-Destruct PIN defends against physically compromising situations by erasing the key’s contents, leaving it in normal working order and to appear as if it has yet to be deployed.