SlideShare a Scribd company logo
1 of 2
Download to read offline
“With real-time AES
hardware encryption,
software free design and
a super speed USB 3.0
connection, you can
secure your data faster
than ever before.”
Looking for an effortless way to secure your data while taking advantage of the fastest USB 3.0 speeds? Look no further than
the diskAshur, the latest and fastest of iStorage’s secure drive line. With the same easy-to-use keypad design and software
free setup, the diskAshur enables you to access the drive with your own unique pin but now at data transfer speeds of up to
5Gbps.
Military Grade FIPS PUB 197 Validated Encryption: Using your choice of 128-bit or 256-bit AES-XTS hardware encryption,
the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is
removed from its enclosure.
Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the
iStorage diskAshur provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of
up to five unique user ID’s and one administrator, making it a useful business collaboration tool.
Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface,
you can now access your files faster than ever before. The diskAshur is also backwards compatible with USB 2.0 and 1.1
ports.
Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force
attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive
will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN
numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will
destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur.
Variable Timing Circuit Technology: Protection against hacker attempts doesn’t
stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is
iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing at-
tacks” aimed at accessing the drive by studying the behavior and infiltrating the
diskAshur’s electronics.
Drive Reset Feature: The diskAshur also employs a useful drive reset feature,
which can be implemented with a unique command. This clears all PINs and data,
and creates a new randomly generated encryption key, enabling the drive to be
reset and redeployed as many times as needed.
Auto-lock Feature: The unattended diskAshur can be configured to lock after a
pre-determined amount of time of your choosing. Ideal for protecting your data
when you’re away from your desk.
Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage
diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid
tipping off a potential hacker to the commonly used keys.
Data at Rest Protection: All data, PINs, and encryption keys are always encrypted
while at rest.
Compact, Rugged Design: Perfect for taking your data on the road, the
diskAshur‘s low powered design is perfect for using with notebooks and taking your
data on the road. Perfectly pocketable, the diskAshur’s compact, robust design
features a 16-point omni-directional shock mounting system and rubberised paint,
protecting the drive from drops and knocks. The convenient integrated USB 3.0
cable eliminates the need to carry around cords with you and allows you to be
connected at the flick of a fingertip.
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
• Military Grade FIPS PUB 197 Validated Encryption
• PIN activated 6-16 digits - Alphanumeric keypad use a
memorable number or word for your PIN
• Hardware Encrypted Drive - Real-time 256-bit AES
encryption seamlessly encrypts all data on the drive,
protecting the drive even if it is removed from it’s casing
• Super Speed USB 3.0 Connection
• Administrator Password Feature - Ideal for IT
departments looking to secure their mobile users, by
allowing setup of administrator access to the drive
before being distributed to their user(s)
• Brute Force Self Destruct Feature
• Auto Lock Feature
• Drive Reset Feature
• Variable Time Circuit Technology
• OS and Platform Independent – Compatible with
Windows, Mac, Linux and embedded systems
• No software or drivers required
• Wear Resistant Key Pad
• Brute Force Hack Defence Mechanism
• Customisation service available – Contact iStorage for
further information
• 3-Year warranty
Features at a glance:
Did you know that millions of external data storage devices
are lost or stolen every year and this figure is rising. Have
you ever considered the impact of losing your non-
encrypted USB hard drive? Your data would be at the
mercy of anyone who stumbles across it.
Loss of confidential data can have a devastating effect on
both businesses and consumers. It could lead to a hefty
fine, the downfall of a business, embarrassment, job losses
and adverse media attention. The iStorage diskAshur can
protect you against all of this.
Why choose diskAshur?
Technical Specifications
Capacity
250GB, 320GB, 500GB, 640GB, 750GB,
1TB, 1.5TB
Interface USB 3.0 - Up to 5Gbps
Power Supply Bus Powered
Dimensions 19mm x 84.5mm x 120mm
Buffer Size 8MB
Approvals FCC CE, RoHS
Hardware
USB 3.0 super speed compatible
Also compatible with USB 2.0 and 1.1
Operating System compatibility Windows, MAC OS, Linux
Hardware Data Encryption AES XTS
Encryption Keys 128-bit or 256-bit Hardware
iStorage Part Numbers
IS-DG3-256-XXX or IS-DG3-128-XXX
(X = Capacity)
All trademarks and brand
names are the property of
their respective owners
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com

More Related Content

Viewers also liked (6)

Video Security Goes to the cloud
Video Security Goes to the cloudVideo Security Goes to the cloud
Video Security Goes to the cloud
 
5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
 
Contact centers versus call centers
Contact centers versus call centers Contact centers versus call centers
Contact centers versus call centers
 
Magnetic door lock using arduino
Magnetic door lock using arduinoMagnetic door lock using arduino
Magnetic door lock using arduino
 
Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic door
 

Similar to Diskashur Hard Disk Drives Datasheet

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
mfoudi
 
Hardware
HardwareHardware
Hardware
amal312
 
Internal components Updated
Internal components UpdatedInternal components Updated
Internal components Updated
BenRB
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)
Scott Eiser
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
BenRB
 
Dell precision-t3400-workstation-en
Dell precision-t3400-workstation-enDell precision-t3400-workstation-en
Dell precision-t3400-workstation-en
Ewerton gon?lves
 

Similar to Diskashur Hard Disk Drives Datasheet (20)

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
Fred server
Fred serverFred server
Fred server
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable Workplace
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
Hardware
HardwareHardware
Hardware
 
Harddisk
HarddiskHarddisk
Harddisk
 
Internal components Updated
Internal components UpdatedInternal components Updated
Internal components Updated
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Dell precision-t3400-workstation-en
Dell precision-t3400-workstation-enDell precision-t3400-workstation-en
Dell precision-t3400-workstation-en
 
S tora ge devices
S tora ge devicesS tora ge devices
S tora ge devices
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheet
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentation
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 

More from Kingfin Enterprises Limited

How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT Environments
Kingfin Enterprises Limited
 

More from Kingfin Enterprises Limited (20)

eSim Platform
eSim PlatformeSim Platform
eSim Platform
 
Tomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure TodayTomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure Today
 
Data Center Trends And Network Security Impact
Data Center Trends And Network Security ImpactData Center Trends And Network Security Impact
Data Center Trends And Network Security Impact
 
VoIP for Beginners
VoIP for BeginnersVoIP for Beginners
VoIP for Beginners
 
Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation.
 
A Smarter Path to ERP Selection
A Smarter Path to ERP SelectionA Smarter Path to ERP Selection
A Smarter Path to ERP Selection
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
Fujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product IntroductionFujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product Introduction
 
The 7 types of Power Problems
The 7 types of Power ProblemsThe 7 types of Power Problems
The 7 types of Power Problems
 
ASUS VivoBook S400
ASUS VivoBook S400ASUS VivoBook S400
ASUS VivoBook S400
 
How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT Environments
 
Fujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i BrochureFujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i Brochure
 
Symantec Partner Certificate
Symantec Partner CertificateSymantec Partner Certificate
Symantec Partner Certificate
 
Dell registered partner certificate
Dell registered partner certificateDell registered partner certificate
Dell registered partner certificate
 
MOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESSMOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESS
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter Guide
 
How Unified Communications Pays For Itself
How Unified Communications Pays For ItselfHow Unified Communications Pays For Itself
How Unified Communications Pays For Itself
 
Fujitsu STYLISTIC Q702 Tablet PC
Fujitsu STYLISTIC Q702 Tablet PCFujitsu STYLISTIC Q702 Tablet PC
Fujitsu STYLISTIC Q702 Tablet PC
 
Fujitsu PRIMERGY RX200 S7
Fujitsu PRIMERGY RX200 S7Fujitsu PRIMERGY RX200 S7
Fujitsu PRIMERGY RX200 S7
 
Fujitsu PRIMERGY RX100 S7
Fujitsu PRIMERGY RX100 S7Fujitsu PRIMERGY RX100 S7
Fujitsu PRIMERGY RX100 S7
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Diskashur Hard Disk Drives Datasheet

  • 1. “With real-time AES hardware encryption, software free design and a super speed USB 3.0 connection, you can secure your data faster than ever before.” Looking for an effortless way to secure your data while taking advantage of the fastest USB 3.0 speeds? Look no further than the diskAshur, the latest and fastest of iStorage’s secure drive line. With the same easy-to-use keypad design and software free setup, the diskAshur enables you to access the drive with your own unique pin but now at data transfer speeds of up to 5Gbps. Military Grade FIPS PUB 197 Validated Encryption: Using your choice of 128-bit or 256-bit AES-XTS hardware encryption, the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure. Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the iStorage diskAshur provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool. Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface, you can now access your files faster than ever before. The diskAshur is also backwards compatible with USB 2.0 and 1.1 ports. Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur. Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing at- tacks” aimed at accessing the drive by studying the behavior and infiltrating the diskAshur’s electronics. Drive Reset Feature: The diskAshur also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed. Auto-lock Feature: The unattended diskAshur can be configured to lock after a pre-determined amount of time of your choosing. Ideal for protecting your data when you’re away from your desk. Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Data at Rest Protection: All data, PINs, and encryption keys are always encrypted while at rest. Compact, Rugged Design: Perfect for taking your data on the road, the diskAshur‘s low powered design is perfect for using with notebooks and taking your data on the road. Perfectly pocketable, the diskAshur’s compact, robust design features a 16-point omni-directional shock mounting system and rubberised paint, protecting the drive from drops and knocks. The convenient integrated USB 3.0 cable eliminates the need to carry around cords with you and allows you to be connected at the flick of a fingertip. iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
  • 2. • Military Grade FIPS PUB 197 Validated Encryption • PIN activated 6-16 digits - Alphanumeric keypad use a memorable number or word for your PIN • Hardware Encrypted Drive - Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from it’s casing • Super Speed USB 3.0 Connection • Administrator Password Feature - Ideal for IT departments looking to secure their mobile users, by allowing setup of administrator access to the drive before being distributed to their user(s) • Brute Force Self Destruct Feature • Auto Lock Feature • Drive Reset Feature • Variable Time Circuit Technology • OS and Platform Independent – Compatible with Windows, Mac, Linux and embedded systems • No software or drivers required • Wear Resistant Key Pad • Brute Force Hack Defence Mechanism • Customisation service available – Contact iStorage for further information • 3-Year warranty Features at a glance: Did you know that millions of external data storage devices are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non- encrypted USB hard drive? Your data would be at the mercy of anyone who stumbles across it. Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskAshur can protect you against all of this. Why choose diskAshur? Technical Specifications Capacity 250GB, 320GB, 500GB, 640GB, 750GB, 1TB, 1.5TB Interface USB 3.0 - Up to 5Gbps Power Supply Bus Powered Dimensions 19mm x 84.5mm x 120mm Buffer Size 8MB Approvals FCC CE, RoHS Hardware USB 3.0 super speed compatible Also compatible with USB 2.0 and 1.1 Operating System compatibility Windows, MAC OS, Linux Hardware Data Encryption AES XTS Encryption Keys 128-bit or 256-bit Hardware iStorage Part Numbers IS-DG3-256-XXX or IS-DG3-128-XXX (X = Capacity) All trademarks and brand names are the property of their respective owners iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com