SlideShare a Scribd company logo
“The world’s first PIN
operated portable hard
drive with built-in
hardware encryption
and capacities of up to
4TB”
Looking for a fast and effortless way to secure your data? The iStorage diskAshur DT is the ultimate desktop hard drive and
secure storage system. Sporting a super fast USB 3.0 interface, you can access your data faster than ever before. With an
easy-to-use keypad design and software free setup, the iStorage diskAshur DT enables you to access the drive with your own
unique pin.
Military Grade FIPS PUB 197 Validated Encryption: Using AES-256-bit hardware encryption, the iStorage diskAshur
seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its
enclosure.
Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the
iStorage diskAshur DT provides stress free deployment in corporate environments. Its Administrator Feature allows enrolment
of up to five unique user ID’s and one administrator, making it a useful business collaboration tool.
Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface,
you can now access your files faster than ever before. The iStorage diskAshur DT is also backwards compatible with USB 2.0
and 1.1 ports.
Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force
attack. The first step is to deny access to the drive until the drive can verify the user PIN. After several incorrect attempts the
drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter
PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will
destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur.
Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the
iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing attacks” aimed
at accessing the drive by studying the behaviour and infiltrating the diskAshur’s electronics.
Sealed from Physical Attacks by Tough Epoxy Coating: In
addition to encrypting all of the PINs, data and the encryption
key itself, the iStorage diskAshur DT adds another barrier
between your data and a hacker. The encryption chip and
circuitry of the iStorage diskAshur DT are completely protected
by a super tough epoxy compound, which is virtually impossible
to remove without causing permanent damage to the
electronics. This barrier prevents a potential hacker from
accessing the encryption circuitry and launching a variety of
potential attacks.
Wear Resistant Key Pad: Designed with protection in mind, the
entire iStorage diskAshur family incorporates ‘wear resistant’
keypads to hide key usage and avoid tipping off a potential
hacker to the commonly used keys.
Data at Rest Protection: All data, PINs, and encryption keys
are always encrypted while at rest.
Auto Lock feature: Set the unattended drive to lock after a
pre-determined amount of time.
High quality aluminum, heat dissipating enclosure.
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
Features at a glance:
Did you know that millions of external data storage devices
are lost or stolen every year and this figure is rising. Have
you ever considered the impact of losing your non-
encrypted USB hard drive? Your data would be at the
mercy of anyone who stumbles across it.
Loss of confidential data can have a devastating effect on
both businesses and consumers. It could lead to a hefty
fine, the downfall of a business, embarrassment, job losses
and adverse media attention. The iStorage diskAshur DT
can protect you against all of this.
Why choose diskAshur DT?
• Military Grade FIPS PUB 197 Validated Encryption
• PIN activated 6-16 digits - Alphanumeric keypad use
a memorable number or word for your PIN
• Hardware Encrypted Drive - Real-time 256-bit AES
encryption seamlessly encrypts all data on the drive,
protecting the drive even if it is removed from it’s
casing
• Super Speed USB 3.0 Connection
• Administrator Password feature - Ideal for IT depart-
ments looking to secure their mobile users, by allow-
ing setup of administrator access to the drive before
being distributed to their user(s)
• Sealed from Physical Attacks by Tough Epoxy Coat-
ing
• Brute Force Self Destruct Feature
• Auto Lock Feature
• Variable Time Circuit Technology
• OS and platform independent – compatible with
Windows, Mac, Linux and embedded systems
• No software or drivers required
• Wear Resistant Key Pad
• Brute Force Hack Defence Mechanism
• Customisation service available – contact iStorage
for further information
• 3-Year warranty
Technical Specifications
Capacity 1TB, 2TB, 3TB & 4TB
Interface USB 3.0 - Up to 5Gbps
Power supply 12V AC Adapter
Dimensions 114.3mm 182.88mm x 38.1mm
Buffer size 8MB
Hardware
USB 3.0 super speed compatible
Also compatible with USB 2.0 and 1.1
Approvals FC CE, RoHS
RPM 7200
Operating System compatibility Windows, MAC OS, Linux
Hardware Data Encryption AES XTS
Encryption Keys 256-bit Hardware
All trademarks and brand
names are the property of
their respective owners
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com

More Related Content

What's hot

IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
Andy Shutka
 
Beginners guide on how to start exploring IoT 2nd session
Beginners  guide on how to start exploring IoT 2nd sessionBeginners  guide on how to start exploring IoT 2nd session
Beginners guide on how to start exploring IoT 2nd session
veerababu penugonda(Mr-IoT)
 
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
Byeongseok Yu
 
File Encryption
File EncryptionFile Encryption
File Encryption
brittanyjespersen
 
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden FeaturesControlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden Features
xabean
 
Securing network devices
Securing network devicesSecuring network devices
Securing network devices
beko-badr
 
Arjun it
Arjun  itArjun  it
Arjun it
Thakur Prasad
 
Windows IoT
Windows IoTWindows IoT
Windows IoT
Sameer Sapra
 
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
Setia Juli Irzal Ismail
 
Anti secure data sharing scheme in the cloud
Anti secure data sharing scheme in the cloudAnti secure data sharing scheme in the cloud
Anti secure data sharing scheme in the cloud
CrystalRose25
 
Pa or die
Pa or diePa or die
Info
InfoInfo
Pivoting Networks - CSSIG Presentation
Pivoting Networks - CSSIG PresentationPivoting Networks - CSSIG Presentation
Pivoting Networks - CSSIG Presentation
Jose L. Quiñones-Borrero
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
Rob Levey
 
Security Onion: Watching for Leeks
Security Onion: Watching for LeeksSecurity Onion: Watching for Leeks
Security Onion: Watching for Leeks
Kory Kyzar
 
Android Mobile forensics with custom recoveries
Android Mobile forensics with custom recoveriesAndroid Mobile forensics with custom recoveries
Android Mobile forensics with custom recoveries
Ibrahim Mosaad
 
Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the net
Chris Hammond-Thrasher
 
Intel McAfee DeepSAFE Technology
Intel McAfee DeepSAFE TechnologyIntel McAfee DeepSAFE Technology
Intel McAfee DeepSAFE Technology
Can Your Security
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - Brief
Ashley Deuble
 
HWallet: The simplest Bitcoin hardware wallet
HWallet: The simplest Bitcoin hardware walletHWallet: The simplest Bitcoin hardware wallet
HWallet: The simplest Bitcoin hardware wallet
Nemanja Nikodijević
 

What's hot (20)

IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Beginners guide on how to start exploring IoT 2nd session
Beginners  guide on how to start exploring IoT 2nd sessionBeginners  guide on how to start exploring IoT 2nd session
Beginners guide on how to start exploring IoT 2nd session
 
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...
 
File Encryption
File EncryptionFile Encryption
File Encryption
 
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden FeaturesControlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden Features
 
Securing network devices
Securing network devicesSecuring network devices
Securing network devices
 
Arjun it
Arjun  itArjun  it
Arjun it
 
Windows IoT
Windows IoTWindows IoT
Windows IoT
 
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
 
Anti secure data sharing scheme in the cloud
Anti secure data sharing scheme in the cloudAnti secure data sharing scheme in the cloud
Anti secure data sharing scheme in the cloud
 
Pa or die
Pa or diePa or die
Pa or die
 
Info
InfoInfo
Info
 
Pivoting Networks - CSSIG Presentation
Pivoting Networks - CSSIG PresentationPivoting Networks - CSSIG Presentation
Pivoting Networks - CSSIG Presentation
 
Rune - Empowering User-based Security
Rune  - Empowering User-based SecurityRune  - Empowering User-based Security
Rune - Empowering User-based Security
 
Security Onion: Watching for Leeks
Security Onion: Watching for LeeksSecurity Onion: Watching for Leeks
Security Onion: Watching for Leeks
 
Android Mobile forensics with custom recoveries
Android Mobile forensics with custom recoveriesAndroid Mobile forensics with custom recoveries
Android Mobile forensics with custom recoveries
 
Alice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the netAlice and bob: Love & the most important crypto on the net
Alice and bob: Love & the most important crypto on the net
 
Intel McAfee DeepSAFE Technology
Intel McAfee DeepSAFE TechnologyIntel McAfee DeepSAFE Technology
Intel McAfee DeepSAFE Technology
 
Security Onion - Brief
Security Onion - BriefSecurity Onion - Brief
Security Onion - Brief
 
HWallet: The simplest Bitcoin hardware wallet
HWallet: The simplest Bitcoin hardware walletHWallet: The simplest Bitcoin hardware wallet
HWallet: The simplest Bitcoin hardware wallet
 

Viewers also liked

Alpha Tech
Alpha TechAlpha Tech
Alpha Tech
thinkict
 
Stb 52341
Stb 52341Stb 52341
Stb 52341
Van Powers
 
Купить дом на Майорке
Купить дом на МайоркеКупить дом на Майорке
Купить дом на Майорке
salvagtv
 
Markovian application to brand switching behaviour
Markovian application to brand switching behaviourMarkovian application to brand switching behaviour
Markovian application to brand switching behaviour
Alexander Decker
 
2011 Restaurant & Bar HK Brochure
2011 Restaurant & Bar HK Brochure2011 Restaurant & Bar HK Brochure
2011 Restaurant & Bar HK Brochure
restaurant_and_bar_hk
 
Optimaza House Seo En
Optimaza House Seo EnOptimaza House Seo En
Optimaza House Seo En
Valentin Pertsiya
 
Yangon Matu Awlthang Vol 1, Issue 3
Yangon Matu Awlthang Vol 1, Issue 3Yangon Matu Awlthang Vol 1, Issue 3
Yangon Matu Awlthang Vol 1, Issue 3
Jimmy Rezar Boi
 
E governance of university health center
E governance of university health centerE governance of university health center
E governance of university health center
Vee Institute of Library Science
 
Dancing baby meme
Dancing baby memeDancing baby meme
Dancing baby meme
pinal003
 
Ideaazione e progettazione multimediale 4a parte
Ideaazione e progettazione multimediale 4a parteIdeaazione e progettazione multimediale 4a parte
Ideaazione e progettazione multimediale 4a parte
Valerio Eletti
 
Tabel cf OMAI 88 din 2012 registru produse certificate
Tabel cf OMAI 88 din 2012 registru produse certificateTabel cf OMAI 88 din 2012 registru produse certificate
Tabel cf OMAI 88 din 2012 registru produse certificate
Pompierii Români
 
N3 tanki master
N3 tanki masterN3 tanki master
N3 tanki master
Alexandra Mihai
 
The Planning Maturity Curve by Rand Heer
The Planning Maturity Curve by Rand HeerThe Planning Maturity Curve by Rand Heer
The Planning Maturity Curve by Rand Heer
Ben Lamorte
 
Der Technologieradar des Vereins Zukunftswerkstatt Kultur- und Wissensvermitt...
Der Technologieradar des Vereins Zukunftswerkstatt Kultur- und Wissensvermitt...Der Technologieradar des Vereins Zukunftswerkstatt Kultur- und Wissensvermitt...
Der Technologieradar des Vereins Zukunftswerkstatt Kultur- und Wissensvermitt...
Christoph Deeg
 
34202868 transpo-cases-under-atty-de-grano
34202868 transpo-cases-under-atty-de-grano34202868 transpo-cases-under-atty-de-grano
34202868 transpo-cases-under-atty-de-grano
Jape Balboa
 
Golden Tulip Hospitality Group. Worldwide Hotel Directory 2010
Golden Tulip Hospitality Group. Worldwide Hotel Directory 2010Golden Tulip Hospitality Group. Worldwide Hotel Directory 2010
Golden Tulip Hospitality Group. Worldwide Hotel Directory 2010
IFK Hotel Management, управление гостиницами
 
Programming with NV_path_rendering: An Annex to the SIGGRAPH Asia 2012 paper...
Programming with NV_path_rendering:  An Annex to the SIGGRAPH Asia 2012 paper...Programming with NV_path_rendering:  An Annex to the SIGGRAPH Asia 2012 paper...
Programming with NV_path_rendering: An Annex to the SIGGRAPH Asia 2012 paper...
Mark Kilgard
 
Top 8 resident engineer resume samples
Top 8 resident engineer resume samplesTop 8 resident engineer resume samples
Top 8 resident engineer resume samples
gedihutes
 
Low-Cost Embedded UA Using DITA
Low-Cost Embedded UA Using DITALow-Cost Embedded UA Using DITA
Low-Cost Embedded UA Using DITA
The Transformation Society
 

Viewers also liked (20)

Alpha Tech
Alpha TechAlpha Tech
Alpha Tech
 
Stb 52341
Stb 52341Stb 52341
Stb 52341
 
Купить дом на Майорке
Купить дом на МайоркеКупить дом на Майорке
Купить дом на Майорке
 
Markovian application to brand switching behaviour
Markovian application to brand switching behaviourMarkovian application to brand switching behaviour
Markovian application to brand switching behaviour
 
2011 Restaurant & Bar HK Brochure
2011 Restaurant & Bar HK Brochure2011 Restaurant & Bar HK Brochure
2011 Restaurant & Bar HK Brochure
 
Optimaza House Seo En
Optimaza House Seo EnOptimaza House Seo En
Optimaza House Seo En
 
Тайланд. Пляжи и Острова.
Тайланд. Пляжи и Острова.Тайланд. Пляжи и Острова.
Тайланд. Пляжи и Острова.
 
Yangon Matu Awlthang Vol 1, Issue 3
Yangon Matu Awlthang Vol 1, Issue 3Yangon Matu Awlthang Vol 1, Issue 3
Yangon Matu Awlthang Vol 1, Issue 3
 
E governance of university health center
E governance of university health centerE governance of university health center
E governance of university health center
 
Dancing baby meme
Dancing baby memeDancing baby meme
Dancing baby meme
 
Ideaazione e progettazione multimediale 4a parte
Ideaazione e progettazione multimediale 4a parteIdeaazione e progettazione multimediale 4a parte
Ideaazione e progettazione multimediale 4a parte
 
Tabel cf OMAI 88 din 2012 registru produse certificate
Tabel cf OMAI 88 din 2012 registru produse certificateTabel cf OMAI 88 din 2012 registru produse certificate
Tabel cf OMAI 88 din 2012 registru produse certificate
 
N3 tanki master
N3 tanki masterN3 tanki master
N3 tanki master
 
The Planning Maturity Curve by Rand Heer
The Planning Maturity Curve by Rand HeerThe Planning Maturity Curve by Rand Heer
The Planning Maturity Curve by Rand Heer
 
Der Technologieradar des Vereins Zukunftswerkstatt Kultur- und Wissensvermitt...
Der Technologieradar des Vereins Zukunftswerkstatt Kultur- und Wissensvermitt...Der Technologieradar des Vereins Zukunftswerkstatt Kultur- und Wissensvermitt...
Der Technologieradar des Vereins Zukunftswerkstatt Kultur- und Wissensvermitt...
 
34202868 transpo-cases-under-atty-de-grano
34202868 transpo-cases-under-atty-de-grano34202868 transpo-cases-under-atty-de-grano
34202868 transpo-cases-under-atty-de-grano
 
Golden Tulip Hospitality Group. Worldwide Hotel Directory 2010
Golden Tulip Hospitality Group. Worldwide Hotel Directory 2010Golden Tulip Hospitality Group. Worldwide Hotel Directory 2010
Golden Tulip Hospitality Group. Worldwide Hotel Directory 2010
 
Programming with NV_path_rendering: An Annex to the SIGGRAPH Asia 2012 paper...
Programming with NV_path_rendering:  An Annex to the SIGGRAPH Asia 2012 paper...Programming with NV_path_rendering:  An Annex to the SIGGRAPH Asia 2012 paper...
Programming with NV_path_rendering: An Annex to the SIGGRAPH Asia 2012 paper...
 
Top 8 resident engineer resume samples
Top 8 resident engineer resume samplesTop 8 resident engineer resume samples
Top 8 resident engineer resume samples
 
Low-Cost Embedded UA Using DITA
Low-Cost Embedded UA Using DITALow-Cost Embedded UA Using DITA
Low-Cost Embedded UA Using DITA
 

Similar to Diskashur Desktop Hard Disk Drive Datasheet

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
mfoudi
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
Tyson Supasatit
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheet
tmaliyil
 
Fred server
Fred serverFred server
Fred server
Yansi Keim
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
Kingfin Enterprises Limited
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Irsandi Hasan
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
jkvr100
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
Vishal Tandel
 
Product Manual Momentus 7200 Rpm Fde
Product Manual   Momentus 7200 Rpm FdeProduct Manual   Momentus 7200 Rpm Fde
Product Manual Momentus 7200 Rpm Fde
harshadthakar
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
Javier Arrospide
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
Network_security
 
Easy Guard 3 April 2008
Easy Guard 3 April 2008Easy Guard 3 April 2008
Easy Guard 3 April 2008
Toshiba Canada Ltd.
 
Easy Guard 3 April 2008
Easy Guard 3 April 2008Easy Guard 3 April 2008
Easy Guard 3 April 2008
Toshiba Canada Ltd.
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
Javier Arrospide
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
Stuart Marsh
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
Javier Arrospide
 
Hardware
HardwareHardware
Hardware
amal312
 
Behind The Code // by Exness
Behind The Code // by ExnessBehind The Code // by Exness
Behind The Code // by Exness
Maxim Gaponov
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
Mani Rathnam
 

Similar to Diskashur Desktop Hard Disk Drive Datasheet (20)

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable Workplace
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheet
 
Fred server
Fred serverFred server
Fred server
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
Product Manual Momentus 7200 Rpm Fde
Product Manual   Momentus 7200 Rpm FdeProduct Manual   Momentus 7200 Rpm Fde
Product Manual Momentus 7200 Rpm Fde
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Easy Guard 3 April 2008
Easy Guard 3 April 2008Easy Guard 3 April 2008
Easy Guard 3 April 2008
 
Easy Guard 3 April 2008
Easy Guard 3 April 2008Easy Guard 3 April 2008
Easy Guard 3 April 2008
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Hardware
HardwareHardware
Hardware
 
Behind The Code // by Exness
Behind The Code // by ExnessBehind The Code // by Exness
Behind The Code // by Exness
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 

More from Kingfin Enterprises Limited

eSim Platform
eSim PlatformeSim Platform
5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem
Kingfin Enterprises Limited
 
Contact centers versus call centers
Contact centers versus call centers Contact centers versus call centers
Contact centers versus call centers
Kingfin Enterprises Limited
 
Video Security Goes to the cloud
Video Security Goes to the cloudVideo Security Goes to the cloud
Video Security Goes to the cloud
Kingfin Enterprises Limited
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
Kingfin Enterprises Limited
 
Tomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure TodayTomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure Today
Kingfin Enterprises Limited
 
Data Center Trends And Network Security Impact
Data Center Trends And Network Security ImpactData Center Trends And Network Security Impact
Data Center Trends And Network Security Impact
Kingfin Enterprises Limited
 
VoIP for Beginners
VoIP for BeginnersVoIP for Beginners
VoIP for Beginners
Kingfin Enterprises Limited
 
Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation.
Kingfin Enterprises Limited
 
A Smarter Path to ERP Selection
A Smarter Path to ERP SelectionA Smarter Path to ERP Selection
A Smarter Path to ERP Selection
Kingfin Enterprises Limited
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
Kingfin Enterprises Limited
 
Fujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product IntroductionFujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product Introduction
Kingfin Enterprises Limited
 
The 7 types of Power Problems
The 7 types of Power ProblemsThe 7 types of Power Problems
The 7 types of Power Problems
Kingfin Enterprises Limited
 
ASUS VivoBook S400
ASUS VivoBook S400ASUS VivoBook S400
ASUS VivoBook S400
Kingfin Enterprises Limited
 
How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT Environments
Kingfin Enterprises Limited
 
Fujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i BrochureFujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i Brochure
Kingfin Enterprises Limited
 
Symantec Partner Certificate
Symantec Partner CertificateSymantec Partner Certificate
Symantec Partner Certificate
Kingfin Enterprises Limited
 
Dell registered partner certificate
Dell registered partner certificateDell registered partner certificate
Dell registered partner certificate
Kingfin Enterprises Limited
 
MOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESSMOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESS
Kingfin Enterprises Limited
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter Guide
Kingfin Enterprises Limited
 

More from Kingfin Enterprises Limited (20)

eSim Platform
eSim PlatformeSim Platform
eSim Platform
 
5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem
 
Contact centers versus call centers
Contact centers versus call centers Contact centers versus call centers
Contact centers versus call centers
 
Video Security Goes to the cloud
Video Security Goes to the cloudVideo Security Goes to the cloud
Video Security Goes to the cloud
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
 
Tomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure TodayTomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure Today
 
Data Center Trends And Network Security Impact
Data Center Trends And Network Security ImpactData Center Trends And Network Security Impact
Data Center Trends And Network Security Impact
 
VoIP for Beginners
VoIP for BeginnersVoIP for Beginners
VoIP for Beginners
 
Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation.
 
A Smarter Path to ERP Selection
A Smarter Path to ERP SelectionA Smarter Path to ERP Selection
A Smarter Path to ERP Selection
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
Fujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product IntroductionFujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product Introduction
 
The 7 types of Power Problems
The 7 types of Power ProblemsThe 7 types of Power Problems
The 7 types of Power Problems
 
ASUS VivoBook S400
ASUS VivoBook S400ASUS VivoBook S400
ASUS VivoBook S400
 
How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT Environments
 
Fujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i BrochureFujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i Brochure
 
Symantec Partner Certificate
Symantec Partner CertificateSymantec Partner Certificate
Symantec Partner Certificate
 
Dell registered partner certificate
Dell registered partner certificateDell registered partner certificate
Dell registered partner certificate
 
MOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESSMOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESS
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter Guide
 

Recently uploaded

(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
Priyanka Aash
 
How to build a generative AI solution A step-by-step guide (2).pdf
How to build a generative AI solution A step-by-step guide (2).pdfHow to build a generative AI solution A step-by-step guide (2).pdf
How to build a generative AI solution A step-by-step guide (2).pdf
ChristopherTHyatt
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
Jimmy Lai
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
Edge AI and Vision Alliance
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Torry Harris
 
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
sunilverma7884
 
Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
CEPTES Software Inc
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
Shiv Technolabs
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
HackersList
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Zilliz
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
aslasdfmkhan4750
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
BrainSell Technologies
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
Anant Gupta
 

Recently uploaded (20)

(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI...
 
How to build a generative AI solution A step-by-step guide (2).pdf
How to build a generative AI solution A step-by-step guide (2).pdfHow to build a generative AI solution A step-by-step guide (2).pdf
How to build a generative AI solution A step-by-step guide (2).pdf
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
 
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python CodebaseEuroPython 2024 - Streamlining Testing in a Large Python Codebase
EuroPython 2024 - Streamlining Testing in a Large Python Codebase
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...Evolution of iPaaS - simplify IT workloads to provide a unified view of  data...
Evolution of iPaaS - simplify IT workloads to provide a unified view of data...
 
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
 
Salesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot WorkshopSalesforce AI & Einstein Copilot Workshop
Salesforce AI & Einstein Copilot Workshop
 
The Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF GuideThe Role of IoT in Australian Mobile App Development - PDF Guide
The Role of IoT in Australian Mobile App Development - PDF Guide
 
WhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring AppsWhatsApp Spy Online Trackers and Monitoring Apps
WhatsApp Spy Online Trackers and Monitoring Apps
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and OllamaTirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
Tirana Tech Meetup - Agentic RAG with Milvus, Llama3 and Ollama
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
 

Diskashur Desktop Hard Disk Drive Datasheet

  • 1. “The world’s first PIN operated portable hard drive with built-in hardware encryption and capacities of up to 4TB” Looking for a fast and effortless way to secure your data? The iStorage diskAshur DT is the ultimate desktop hard drive and secure storage system. Sporting a super fast USB 3.0 interface, you can access your data faster than ever before. With an easy-to-use keypad design and software free setup, the iStorage diskAshur DT enables you to access the drive with your own unique pin. Military Grade FIPS PUB 197 Validated Encryption: Using AES-256-bit hardware encryption, the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure. Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the iStorage diskAshur DT provides stress free deployment in corporate environments. Its Administrator Feature allows enrolment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool. Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface, you can now access your files faster than ever before. The iStorage diskAshur DT is also backwards compatible with USB 2.0 and 1.1 ports. Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After several incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur. Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing attacks” aimed at accessing the drive by studying the behaviour and infiltrating the diskAshur’s electronics. Sealed from Physical Attacks by Tough Epoxy Coating: In addition to encrypting all of the PINs, data and the encryption key itself, the iStorage diskAshur DT adds another barrier between your data and a hacker. The encryption chip and circuitry of the iStorage diskAshur DT are completely protected by a super tough epoxy compound, which is virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks. Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Data at Rest Protection: All data, PINs, and encryption keys are always encrypted while at rest. Auto Lock feature: Set the unattended drive to lock after a pre-determined amount of time. High quality aluminum, heat dissipating enclosure. iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
  • 2. Features at a glance: Did you know that millions of external data storage devices are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non- encrypted USB hard drive? Your data would be at the mercy of anyone who stumbles across it. Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskAshur DT can protect you against all of this. Why choose diskAshur DT? • Military Grade FIPS PUB 197 Validated Encryption • PIN activated 6-16 digits - Alphanumeric keypad use a memorable number or word for your PIN • Hardware Encrypted Drive - Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from it’s casing • Super Speed USB 3.0 Connection • Administrator Password feature - Ideal for IT depart- ments looking to secure their mobile users, by allow- ing setup of administrator access to the drive before being distributed to their user(s) • Sealed from Physical Attacks by Tough Epoxy Coat- ing • Brute Force Self Destruct Feature • Auto Lock Feature • Variable Time Circuit Technology • OS and platform independent – compatible with Windows, Mac, Linux and embedded systems • No software or drivers required • Wear Resistant Key Pad • Brute Force Hack Defence Mechanism • Customisation service available – contact iStorage for further information • 3-Year warranty Technical Specifications Capacity 1TB, 2TB, 3TB & 4TB Interface USB 3.0 - Up to 5Gbps Power supply 12V AC Adapter Dimensions 114.3mm 182.88mm x 38.1mm Buffer size 8MB Hardware USB 3.0 super speed compatible Also compatible with USB 2.0 and 1.1 Approvals FC CE, RoHS RPM 7200 Operating System compatibility Windows, MAC OS, Linux Hardware Data Encryption AES XTS Encryption Keys 256-bit Hardware All trademarks and brand names are the property of their respective owners iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com