Features:
- Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor
- FIPS PUB 197 validated encryption algorithm
- Encryption keys are always encrypted whilst at rest
- Brute force hack defence mechanism
- Tamper proof
- Immune to BadUSB - diskAshur2 HDD are not vulnerable to malicious attacks
- FIPS 140-2 level 3 certified
- IP56 certified - dust and water resistant
- PIN authenticated
- Wear resistant epoxy coated keypad
- No speed degradation - as fast as any non-encrypted HDD
- Desk lock slot
- Read only (write protect) and read/write modes
- Unattended auto lock feature - programmable lock after a predetermined amount of time (5-99 minutes)
- Supports independent user and admin PINs
- Drive reset - deletes all data/PINs/encryption key and resets the drive to factory default setting
- Compatible with: smartphones, tablets, PC/laptops, printers, scanners, CCTV cameras
- Auto lock on removal
Government validations
FIPS 140-2 Level 3 (pending) FIPS 140-2 Level 3 compliant Tamper proof & evident design All critical components are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components. If breached, the tamper evident design of the datAshur PRO² will provide visible evidence that tampering has occurred.
Performance:
168MB/secread speed. 116MB/sec write speed.
Independent user & admin PIN
Which makes it perfect for corporate and government deployment. If the user forgets their PIN, the drive can be unlocked by the admin PIN, the admin can then allow the user to set a PIN.
Bootable feature
Install an OS on the datAshur PRO² and boot directly from it.
OS & platform independent
No software required.Works on any device with a USB port!
compatible with: MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients, Embedded Systems, Citrix and VMware
On-device Crypto-chip
Offering 100% real-time military grade AES-XTS 256-bit Hardware Encryption with FIPS PUB 197 validated encryption algorithm Uniquely incorporates Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor.
Which offers ultimate security against hackers, detecting and responding to tampering with features such as:
- Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks
- Advanced protection against physical attacks, Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors
- Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection
- Secure Memory Management/Access Protection
Brute Force Hack Defence Mechanism
Intelligently programmed to protect against all forms of brute force attacks.
If the User PIN is entered incorrectly 10 consecutive times, the User PIN will be deleted and the drive can only be accessed by entering the Admin PIN in order to reset the User PIN. (Admin can change this from the default 10 incorrect PIN entries, to 1-9, for the User only)
If the Admin PIN is entered incorrectly 10 consecutive times, all PINs and the encrypted encryption key will be lost forever.
User PIN enrolment
The Admin can set a restriction policy for the user PIN. This setting the minimum length of the PIN, as well as requiring the input of one or more 'Special Character' if needed.
One-time User recovery PIN
Admin configurable, extremely useful in situations where a User has forgotten their PIN, allowing the User to unlock the device and set a User PIN.
Device reset feature
Deletes the encrypted encryption key, all PINs and renders all data as lost forever. The device can then be redeployed which randomly generates a encrypted encryption key, a process that can be repeated as many times as required.
Whitelisting on networks
Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements.
Self-destruct feature
Pre-program the datAshur PRO² with a self-destruct PIN, once entered, the encrypted encryption key and all PINs are deleted and all data is rendered as lost forever.