Apricorn Aegis Secure Key 3z User Manual

5 (1)
Apricorn Aegis Secure Key 3z User Manual

Aegis Secure Key 3z

Patent Pending

HARDWARE ENCRYPTED USB 3.1 FLASH DRIVE

ON-THE-FLY 256-BIT AES-XTS HARDWARE ENCRYPTION

SOFTWARE-FREE AUTHENTICATION & OPERATION; COMPLETELY CROSS-PLATFORM COMPATIBLE

COMPATIBLE WITH ANY OS: Windows®, Mac®, Linux, etc.

AEGIS CONFIGURATOR™ COMPATIBLE FIPS 140-2 LEVEL 3 VALIDATION

HIGH-QUALITY RUGGED ALUMINUM HOUSING IP67 (PENDING) Water and Dust Resistant

EMBEDDED 7-16 DIGIT PIN AUTHENTICATION No Security Parameters Shared with Hosts

PROGRAMMABLE MINIMUM PIN LENGTH ADMIN MODE FOR SECURE DEPLOYMENT INDEPENDENT USER AND ADMIN PINS

WORKS

CONFIGURABLE

WITH:

 

The Next Big Thing in Advanced Data Protection.

Software-free, cross-platform compatible, Aegis

Configurator Compatible, plus a host of high-level security features packed into a USB 3.1 (3.0) flashkey.

Military Grade 256-bit AES XTS Hardware Encryption:

All data is encrypted on-the-fly with built-in 256-bit AES XTS. Software-Free Design: The Aegis Secure Key is ready to use right out of the box–no software, no drivers, no updates. It can even be utilized where no keyboard is present. Completely crossplatform compatible, the Aegis Secure Key excels virtually anywhere– PCs, MACs, Linux, or any OS with a powered USB port and a storage file system.

RECOVERY PINS IN CASE OF

 

Configurable:Create custom profiles and mass configure multiple Secure Keys

FORGOTTEN OR LOST PIN

 

at once with Apricorn’s new Configurator / Powered Hub bundle.

ADMIN FORCED-ENROLLMENT AT

Embedded Keypad: All PIN entries and controls are performed on the keypad of

the Aegis Secure Key. No critical security parameters are ever shared with the host

FIRST USE

 

 

computer. Since there is no host involvement in the key’s authentication or operation,

 

 

USER FORCED-ENROLLMENT

 

the risks of software hacking and key-logging are completely circumvented.

TOUGH EPOXY INTERNAL

 

Super Tough, Inside and Out: The Aegis Secure Key’s rugged, extruded aluminum

 

casing and polymer-coated keypad is resistant to dust and water (IP67 certified.) Inside,

FILLING FOR PHYSICAL-

 

 

another layer of protection is added by encasing the inner componentry with a hardened

ATTACK PROTECTION

 

epoxy compound to prevent physical access to the encryption circuitry.

BRUTE-FORCE PROTECTION

 

Independent User and Admin PINs: The Aegis Secure Key can be configured with

 

independent User and Admin PINs, making it an ideal device for corporate and government

SELF-DESTRUCT PIN

 

 

deployment. Should the User forget his or her PIN, the drive can still be unlocked with the Admin

LOCK-OVERRIDE MODE

 

PIN after which, a new User PIN can then be created.

 

One-Time Recovery PINs: In the event that a User PIN is forgotten, up to 4 one-time use recovery

DRIVE-RESET FEATURE

 

PINs can be programmed to permit access to the drive’s data.

AUTO-LOCK FEATURE

Auto-Lock: Locks automatically whenever it’s unplugged from its powered USB port, and is further

programmable to lock after a predetermined period of inactivity.

 

Drive Reset: Allows the drive to be cleared and redeployed. Capable of generating an infinite number of randomly generated encryption keys, The Aegis Secure Key 3z can be reset as many times as desired.

Brute-Force Protection: After a predetermined number (programmable; up to 20) of incorrect PIN entry attempts, the Aegis Secure Key will conclude that it is under Brute Force Attack and will respond by performing a crypto-erase – deleting the encryption key which will render all of the key’s data useless. Lock-Override Mode: Designated for specific cases in which the key needs to remain unlocked, e.g., during reboot, passing the key through a virtual machine, or other similar situations that would normally prompt the key to automatically lock. When enabled, Lock-Override Mode allows the key to remain unlocked through USB port re-enumeration and will not re-lock until USB power is interrupted.

Two Read-Only Modes: Perfect for accessing data on the key in a public setting to protect against USB viruses. Particularly important in forensics, Read-Only Mode is ideal for applications that require data to be preserved in its original, unaltered state and can’t be overwritten or modified. The Secure Key 3z has two read-only modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well.

Self-Destruct PIN: The last line of defense for data security where all of the drive’s contents must be wiped to avert breach. The Secure Key’s Self-Destruct PIN defends against physically compromising situations by erasing the key’s contents, leaving it in normal working order and to appear as if it has yet to be deployed.

Visit our web site at www.apricorn.com or call 1-800-458-5448

©2016 Apricorn, Inc. Corporate Offices: 12191 Kirkham Rd., Poway, CA. 92064

Loading...
+ 1 hidden pages