IS-DAM2-256-500 Includes Only:
- Portable SSD with Protective Sleeve
- Protective carry case
- Type A + C cables
- Quick Start Guide
Features:
- Easy to use
- FIPS 140-3 Level 3 compliant
- Independent User & Admin PINs
- Ultra fast transfer speeds
- One-time User recovery PIN
- Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor
- Read only (write product) – Dual mode
- Brute Force protection
- Ultra-portable and lightweight
- Rugged, shockproof & crushproof
- IP68 certified Water & Dust Resistant
- OS & platform independent
- USB Type A & C cables
- Bootable feature
- Auto-lock
- Self-destruct
- Drive reset
- Whitelisting on networks
The diskAshur M² PIN authenticated, hardware encrypted SSD has a, ultra-portable, rugged and sleek design, incorporating the most advanced security attributes that iStorage is renowned for.
The diskAshur M² encrypts data using FIPS PUB 197 validated, AES-XTS 256-bit hardware encryption and uniquely incorporates a Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor., which employs built-in physical protection mechanisms designed to defend against external tamper, bypass physical attacks and more.
The drive features ultra-fast backwards compatible USB 3.2 data transfer speeds. The diskAshur M² is lightweight, dust and waterproof (IP68 certified), shock proof (survives a drop of 4m on to a concrete surface) and crush-proof (withstands the weight of a 2.7 ton vehicle), making it extremely rugged and ultra-portable.
Easy to use
Simply enter a 7-15 digit PIN to authenticate and use as a normal portable SSD. When the drive is disconnected, all data is encrypted using AES-XTS 256-bit hardware encryption (no software required).
FIPS 140-3 Level 3 compliant, tamper proof & evident design
All data stored on the diskAshur M² is encrypted using FIPS PUB 197 validated, AES-XTS 256-bit hardware encryption. All components incorporated within the diskAshur M² are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. The drive is also designed to be tamper evident making it obvious to the User if it has been pried open and tampered with.
Wear resistant keypad
The onboard keypad is covered with a layer of polymer coating that protects the keys and hides key usage to avoid tipping off a potential hacker to commonly used keys.
Rugged, Shockproof & Crushproof
The diskAshur M² is extremely rugged, surviving a drop of up to 4m onto a concrete surface. The drive is also crushproof, withstands the weight of a 2.7 ton vehicle.
No need to worry about spills
The drive's IP68 accreditation means it will survive being submerged under 1.5m of water for 30 minutes and deemed fit enough to withstand dust, dirt and sand.
Slim & sleek design
Lightweight and smaller than the size of a phone, making it ultra-portable.
Independent User & Admin PINs
Which makes it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN. The Administrator can then allow the User to set a User PIN.
User PIN enrolment
The Admin can set a restriction policy for the User PIN. This setting the minimum length of the PIN, as well as requiring the input of one or more 'Special Characters'. The 'Special Character' functions as 'SHIFT + digit'.
Transfer your files in seconds
Lightning fast backwards compatible USB 3.2 data transfer speeds.
One-time User recovery PIN
Admin configurable, extremely useful in situations where a User has forgotten their PIN, allowing the User to unlock the device and set a User PIN.
Uniquely incorporates a Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor.
Which enhances security through true random number generation and built-in cryptography. The data encryption key is protected by FIPS and Common Criteria validated wrapping algorithms.
Offers ultimate security against hackers, detecting and responding to tampering with features such as:
- Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks
- Advanced protection against physical attacks, Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors
- Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection
- Secure Memory Management/Access Protection
Read only (write protect) - Dual Mode
Both the Admin and User can configure the diskAshur M² as a read only (write protect) drive. If configured by the Admin, the drive cannot be modified or disabled by the User, allowing the Admin to pre-provision a drive with pre-loaded content as read-only for the User.
OS & Host independent - works across any host and embedded systems
No software required; the drive will work on any device with a USB port. USB Type C and Type A connectivity
Compatible with: MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients, Embedded Systems, Citrix and VMware
Bootable feature
Install an OS on the diskAshur M2 and boot directly from it.
Brute force hack defence mechanism
Intelligently programmed to protect against all forms of brute force attacks.
If the User PIN is entered incorrectly 10 consecutive times, the User PIN will be deleted and the drive can only be accessed by entering the Admin PIN or One-time User recovery PIN. (Admin can change this from the default 10 incorrect PIN entries, to 1-9, for the User only)
If the Admin PIN is entered incorrectly 10 consecutive times, all data, PINs and the encrypted encryption key will be lost forever.
| Auto-lock:Automatically locks when unplugged from the host computer or when power to the USB port is turned off. It can also be set to automatically lock after a predetermined amount of time. |
| Self-destruct:Pre-program the diskAshur M² with a self-destruct PIN, once entered, the data, encrypted encryption key and all PINs are deleted and rendered as lost forever. |
| Drive Reset:Deletes the encrypted encryption key, all PINs and renders all data as lost forever. The drive can then be redeployed which randomly generates a encrypted encryption key, a process that can be repeated as many times as required. |
| Whitelisting on networks: Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements. |