SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
“With real-time AES
hardware encryption,
software free design and
a super speed USB 3.0
connection, you can
secure your data faster
than ever before.”
Looking for an effortless way to secure your data while taking advantage of the fastest USB 3.0 speeds? Look no further than
the diskAshur, the latest and fastest of iStorage’s secure drive line. With the same easy-to-use keypad design and software
free setup, the diskAshur enables you to access the drive with your own unique pin but now at data transfer speeds of up to
5Gbps.
Military Grade FIPS PUB 197 Validated Encryption: Using your choice of 128-bit or 256-bit AES-XTS hardware encryption,
the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is
removed from its enclosure.
Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the
iStorage diskAshur provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of
up to five unique user ID’s and one administrator, making it a useful business collaboration tool.
Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface,
you can now access your files faster than ever before. The diskAshur is also backwards compatible with USB 2.0 and 1.1
ports.
Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force
attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive
will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN
numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will
destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur.
Variable Timing Circuit Technology: Protection against hacker attempts doesn’t
stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is
iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing at-
tacks” aimed at accessing the drive by studying the behavior and infiltrating the
diskAshur’s electronics.
Drive Reset Feature: The diskAshur also employs a useful drive reset feature,
which can be implemented with a unique command. This clears all PINs and data,
and creates a new randomly generated encryption key, enabling the drive to be
reset and redeployed as many times as needed.
Auto-lock Feature: The unattended diskAshur can be configured to lock after a
pre-determined amount of time of your choosing. Ideal for protecting your data
when you’re away from your desk.
Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage
diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid
tipping off a potential hacker to the commonly used keys.
Data at Rest Protection: All data, PINs, and encryption keys are always encrypted
while at rest.
Compact, Rugged Design: Perfect for taking your data on the road, the
diskAshur‘s low powered design is perfect for using with notebooks and taking your
data on the road. Perfectly pocketable, the diskAshur’s compact, robust design
features a 16-point omni-directional shock mounting system and rubberised paint,
protecting the drive from drops and knocks. The convenient integrated USB 3.0
cable eliminates the need to carry around cords with you and allows you to be
connected at the flick of a fingertip.
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
• Military Grade FIPS PUB 197 Validated Encryption
• PIN activated 6-16 digits - Alphanumeric keypad use a
memorable number or word for your PIN
• Hardware Encrypted Drive - Real-time 256-bit AES
encryption seamlessly encrypts all data on the drive,
protecting the drive even if it is removed from it’s casing
• Super Speed USB 3.0 Connection
• Administrator Password Feature - Ideal for IT
departments looking to secure their mobile users, by
allowing setup of administrator access to the drive
before being distributed to their user(s)
• Brute Force Self Destruct Feature
• Auto Lock Feature
• Drive Reset Feature
• Variable Time Circuit Technology
• OS and Platform Independent – Compatible with
Windows, Mac, Linux and embedded systems
• No software or drivers required
• Wear Resistant Key Pad
• Brute Force Hack Defence Mechanism
• Customisation service available – Contact iStorage for
further information
• 3-Year warranty
Features at a glance:
Did you know that millions of external data storage devices
are lost or stolen every year and this figure is rising. Have
you ever considered the impact of losing your non-
encrypted USB hard drive? Your data would be at the
mercy of anyone who stumbles across it.
Loss of confidential data can have a devastating effect on
both businesses and consumers. It could lead to a hefty
fine, the downfall of a business, embarrassment, job losses
and adverse media attention. The iStorage diskAshur can
protect you against all of this.
Why choose diskAshur?
Technical Specifications
Capacity
250GB, 320GB, 500GB, 640GB, 750GB,
1TB, 1.5TB
Interface USB 3.0 - Up to 5Gbps
Power Supply Bus Powered
Dimensions 19mm x 84.5mm x 120mm
Buffer Size 8MB
Approvals FCC CE, RoHS
Hardware
USB 3.0 super speed compatible
Also compatible with USB 2.0 and 1.1
Operating System compatibility Windows, MAC OS, Linux
Hardware Data Encryption AES XTS
Encryption Keys 128-bit or 256-bit Hardware
iStorage Part Numbers
IS-DG3-256-XXX or IS-DG3-128-XXX
(X = Capacity)
All trademarks and brand
names are the property of
their respective owners
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com

Contenu connexe

En vedette (6)

Video Security Goes to the cloud
Video Security Goes to the cloudVideo Security Goes to the cloud
Video Security Goes to the cloud
 
5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
 
Contact centers versus call centers
Contact centers versus call centers Contact centers versus call centers
Contact centers versus call centers
 
Magnetic door lock using arduino
Magnetic door lock using arduinoMagnetic door lock using arduino
Magnetic door lock using arduino
 
Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic door
 

Similaire à Diskashur Hard Disk Drives Datasheet

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UKmfoudi
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstationsjkvr100
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Vishal Tandel
 
Hardware
HardwareHardware
Hardwareamal312
 
Internal components Updated
Internal components UpdatedInternal components Updated
Internal components UpdatedBenRB
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)Scott Eiser
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonBenRB
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonBenRB
 
Dell precision-t3400-workstation-en
Dell precision-t3400-workstation-enDell precision-t3400-workstation-en
Dell precision-t3400-workstation-enEwerton gon?lves
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheettmaliyil
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentationrohancool
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 

Similaire à Diskashur Hard Disk Drives Datasheet (20)

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
Fred server
Fred serverFred server
Fred server
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable Workplace
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
Hardware
HardwareHardware
Hardware
 
Harddisk
HarddiskHarddisk
Harddisk
 
Internal components Updated
Internal components UpdatedInternal components Updated
Internal components Updated
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Dell precision-t3400-workstation-en
Dell precision-t3400-workstation-enDell precision-t3400-workstation-en
Dell precision-t3400-workstation-en
 
S tora ge devices
S tora ge devicesS tora ge devices
S tora ge devices
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheet
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentation
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 

Plus de Kingfin Enterprises Limited

Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Kingfin Enterprises Limited
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionKingfin Enterprises Limited
 
How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsKingfin Enterprises Limited
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideKingfin Enterprises Limited
 

Plus de Kingfin Enterprises Limited (20)

eSim Platform
eSim PlatformeSim Platform
eSim Platform
 
Tomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure TodayTomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure Today
 
Data Center Trends And Network Security Impact
Data Center Trends And Network Security ImpactData Center Trends And Network Security Impact
Data Center Trends And Network Security Impact
 
VoIP for Beginners
VoIP for BeginnersVoIP for Beginners
VoIP for Beginners
 
Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation.
 
A Smarter Path to ERP Selection
A Smarter Path to ERP SelectionA Smarter Path to ERP Selection
A Smarter Path to ERP Selection
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
Fujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product IntroductionFujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product Introduction
 
The 7 types of Power Problems
The 7 types of Power ProblemsThe 7 types of Power Problems
The 7 types of Power Problems
 
ASUS VivoBook S400
ASUS VivoBook S400ASUS VivoBook S400
ASUS VivoBook S400
 
How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT Environments
 
Fujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i BrochureFujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i Brochure
 
Symantec Partner Certificate
Symantec Partner CertificateSymantec Partner Certificate
Symantec Partner Certificate
 
Dell registered partner certificate
Dell registered partner certificateDell registered partner certificate
Dell registered partner certificate
 
MOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESSMOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESS
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter Guide
 
How Unified Communications Pays For Itself
How Unified Communications Pays For ItselfHow Unified Communications Pays For Itself
How Unified Communications Pays For Itself
 
Fujitsu STYLISTIC Q702 Tablet PC
Fujitsu STYLISTIC Q702 Tablet PCFujitsu STYLISTIC Q702 Tablet PC
Fujitsu STYLISTIC Q702 Tablet PC
 
Fujitsu PRIMERGY RX200 S7
Fujitsu PRIMERGY RX200 S7Fujitsu PRIMERGY RX200 S7
Fujitsu PRIMERGY RX200 S7
 
Fujitsu PRIMERGY RX100 S7
Fujitsu PRIMERGY RX100 S7Fujitsu PRIMERGY RX100 S7
Fujitsu PRIMERGY RX100 S7
 

Dernier

Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 

Dernier (20)

Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 

Diskashur Hard Disk Drives Datasheet

  • 1. “With real-time AES hardware encryption, software free design and a super speed USB 3.0 connection, you can secure your data faster than ever before.” Looking for an effortless way to secure your data while taking advantage of the fastest USB 3.0 speeds? Look no further than the diskAshur, the latest and fastest of iStorage’s secure drive line. With the same easy-to-use keypad design and software free setup, the diskAshur enables you to access the drive with your own unique pin but now at data transfer speeds of up to 5Gbps. Military Grade FIPS PUB 197 Validated Encryption: Using your choice of 128-bit or 256-bit AES-XTS hardware encryption, the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure. Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the iStorage diskAshur provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool. Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface, you can now access your files faster than ever before. The diskAshur is also backwards compatible with USB 2.0 and 1.1 ports. Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur. Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing at- tacks” aimed at accessing the drive by studying the behavior and infiltrating the diskAshur’s electronics. Drive Reset Feature: The diskAshur also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed. Auto-lock Feature: The unattended diskAshur can be configured to lock after a pre-determined amount of time of your choosing. Ideal for protecting your data when you’re away from your desk. Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Data at Rest Protection: All data, PINs, and encryption keys are always encrypted while at rest. Compact, Rugged Design: Perfect for taking your data on the road, the diskAshur‘s low powered design is perfect for using with notebooks and taking your data on the road. Perfectly pocketable, the diskAshur’s compact, robust design features a 16-point omni-directional shock mounting system and rubberised paint, protecting the drive from drops and knocks. The convenient integrated USB 3.0 cable eliminates the need to carry around cords with you and allows you to be connected at the flick of a fingertip. iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
  • 2. • Military Grade FIPS PUB 197 Validated Encryption • PIN activated 6-16 digits - Alphanumeric keypad use a memorable number or word for your PIN • Hardware Encrypted Drive - Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from it’s casing • Super Speed USB 3.0 Connection • Administrator Password Feature - Ideal for IT departments looking to secure their mobile users, by allowing setup of administrator access to the drive before being distributed to their user(s) • Brute Force Self Destruct Feature • Auto Lock Feature • Drive Reset Feature • Variable Time Circuit Technology • OS and Platform Independent – Compatible with Windows, Mac, Linux and embedded systems • No software or drivers required • Wear Resistant Key Pad • Brute Force Hack Defence Mechanism • Customisation service available – Contact iStorage for further information • 3-Year warranty Features at a glance: Did you know that millions of external data storage devices are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non- encrypted USB hard drive? Your data would be at the mercy of anyone who stumbles across it. Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskAshur can protect you against all of this. Why choose diskAshur? Technical Specifications Capacity 250GB, 320GB, 500GB, 640GB, 750GB, 1TB, 1.5TB Interface USB 3.0 - Up to 5Gbps Power Supply Bus Powered Dimensions 19mm x 84.5mm x 120mm Buffer Size 8MB Approvals FCC CE, RoHS Hardware USB 3.0 super speed compatible Also compatible with USB 2.0 and 1.1 Operating System compatibility Windows, MAC OS, Linux Hardware Data Encryption AES XTS Encryption Keys 128-bit or 256-bit Hardware iStorage Part Numbers IS-DG3-256-XXX or IS-DG3-128-XXX (X = Capacity) All trademarks and brand names are the property of their respective owners iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com