IS-DAP2-256-SSD-16000-C-X Includes Only:
- Portable SSD with integrated USB cable
- Protective carry case
- Quick Start Guide
Features:
- Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor
- The world's first and only NCSC CPA, FIPS 140-2 Level 2/3, NLNCSA BSPA and NATO restricted level certified encrypted portable SSD.
- FIPS PUB 197 validated encryption algorithm
- Encryption keys are always encrypted whilst at rest
- Brute force hack defence mechanism
- Tamper proof and evident design
- Immune to BadUSB – diskAshur PRO2 SSD are not vulnerable to malicious attacks on USB technology
- IP56 certified – dust and water resistant
- PIN authenticated (7-15 digits – alphanumeric keypad)
- Wear resistant epoxy coated keypad
- No speed degradation – as fast as any non-encrypted SSD
- Desk lock slot
- Read only (write protect) & read/write modes
- All components are covered with a layer of super tough epoxy resin
- Unattended auto lock feature – programmable lock after a predetermined amount of time (5-99 minutes)
- Supports independent user and admin PINs
- Drive reset – deletes all data/PINs/encryption key and resets the drive to factory default setting
- Compatible with:smartphones, tablets, PC/laptops, printers, scanners, CCTV cameras – any device with a USB/OTG port
- Auto lock on removal
Introducing the diskAshur PRO2
The diskAshur PRO² USB 3.2 SSD is a PIN-authenticated, FIPS certified, AES-XTS 256-bit hardware encrypted portable drive that securely encrypts, stores and protects data to military standards.
The diskAshur PRO² has been certified to the highest government accreditations (FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & NATO Restricted), helping you safeguard valuable and sensitive data to ensure compliance with stringent data protection and confidentiality regulations and directives, such as GDPR, HIPAA, SOX, CCPA and more.
Easy to use
Simply enter a 7-15 digit PIN to authenticate and use as a normal portable SSD.
When the drive is disconnected, all data is encrypted using AES-XTS 256-bit hardware encryption (no software required).
FIPS 140-2 Level 2/3 compliant, tamper proof & evident design
All data stored on the diskAshur PRO² is encrypted using FIPS PUB 197 validated, AES-XTS 256-bit hardware encryption. All components incorporated within the diskAshur PRO² are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. The drive is also designed to be tamper evident making it obvious to the User if it has been pried open and tampered with.
Wear resistant keypad
The onboard keypad is covered with a layer of polymer coating that protects the keys and hides key usage to avoid tipping off a potential hacker to commonly used keys.
Uniquely incorporates a Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor.
Which enhances security through true random number generation and built-in cryptography. The data encryption key is protected by FIPS and Common Criteria validated wrapping algorithms.
Offers ultimate security against hackers, detecting and responding to tampering with features such as:
⋅ Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks
· Advanced protection against physical attacks, Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors
· Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection
· Secure Memory Management/Access Protection
Splash and dustproof
The diskAshur PRO2 has been certified to IP56, meaning the drive is dust and waterproof.
Independent User & Admin PINs
Which makes it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN. The Administrator can then allow the User to set a User PIN.
Read only (write protect) - Dual Mode
Both the Admin and User can configure the diskAshur PRO² as a read only (write protect) drive. If configured by the Admin, the drive cannot be modified or disabled by the User, allowing the Admin to pre-provision a drive with pre-loaded content as read-only for the User.
Transfer your files in seconds
Lightning fast backwards compatible USB 3.2 data transfer speeds.
OS & Host independent - works across any host and embedded systems
No software required; the drive will work on any device with a USB port.
Compatible with: MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients, Embedded Systems, Citrix and VMware
Brute force hack defence mechanism
Intelligently programmed to protect against all forms of brute force attacks.
First 5 incorrect PIN entries
The drive will freeze, requiring the drive to be disconnected and reconnected to the USB port to get a further five PIN entry attempts.
Next 5 incorrect PIN entries
If the following five (10 in total) consecutive PIN attempts are entered incorrectly again, the diskAshur PRO2 will freeze again. To get a further and final five PIN attempts (15 in total), the "shift" button must be pressed whilst inserting the USB cable to the USB port and then an iStorage preset PIN will need to be entered.
Last 5 incorrect PIN entries
On the fifteenth consecutive incorrect PIN entry, the diskAshur PRO2 assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.
| Auto-lock:Automatically locks when unplugged from the host computer or when power to the USB port is turned off. It can also be set to automatically lock after a predetermined amount of time. |
| Self-destruct:Pre-program the diskAshur PRO² with a self-destruct PIN, once entered, the data, encrypted encryption key and all PINs are deleted and rendered as lost forever. |
| Drive Reset:Deletes the encrypted encryption key, all PINs and renders all data as lost forever. The drive can then be redeployed which randomly generates a encrypted encryption key, a process that can be repeated as many times as required. |
| Whitelisting on networks:Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements. |