SlideShare a Scribd company logo
Secure Portable
Workplace and Portable Workplace
A hardware encrypted, bootable USB 3.0 Windows® 8 and Windows® 10
environment for fast, secure access on the go.
 Citrix, VPN, and more—Secure Portable Workplace is per-
fect for giving workers access to Citrix servers, virtualized
applications, remote desktops, virtual private networks,
and more.
 Office 365—Access your Office 365 work space from
almost any PC, without fear of malware capturing your
password or copying your files.
 Helps mitigate Insider and External Attacks—SEMS can be
used for remote device management including freezing
or disabling the device, or zeroizing the keys to effectively
erase the operating system, applications, and data.
Additional Information
 Security designed, engineered, and manufactured in USA.
 Hardware-based full disk encryption (FDE) prevents data
leakage.
 Dedicated cryptographic engines for fast response.
 Military strength cryptography inside FIPS 140-2 Level 3
compliant security boundary.
 Advanced hardware security includes XTS-AES 256,
ECDH, ECDSA P-384, and SHA-384, which make up the
US National Security Agency’s Suite B cryptography. ¬
 Malware protection and sophisticated self-destruct
mechanisms.
 No footprint left on host PC—as if you were never there.
SPYRUS Enterprise Management System (SEMS) and re-
mote kill stops unauthorized and rogue employee access.
 32 GB, 64 GB, 128 GB, 256 GB, 512 GB capacities.
 Host machine must be certified for use with either Windows 7
or Windows 8. ¬ Minimum 2 GB RAM; performance improves
with additional RAM.
 Minimum 2 GB RAM; performance improves with
additional RAM.
Secure Portable Workplace from SPYRUS is a Microsoft-cer-
tified Windows To Go drive that securely boots your custom
Windows 8 environment. Not a slow virtual machine, Secure
Portable Workplace boots a native Windows 8.0/8.1 operating
system using your computer hardware and the drive’s ultra-fast
SSD memory, and it never accesses or alters your computer’s
hard drive.
Run applications locally and access the Internet, your corpo-
rate network, and virtualized applications. When you’re done,
remove the device and leave no footprint behind.
Give your employees access to your corporate applications and
data while mitigating hacking and data leakage. Add Secure
Portable Workplace to your Windows domain and use Microsoft
SCCM and AD group policy for centralized management. Even
better, use SPYRUS Enterprise Management System (SEMS) for
remote device management, including temporarily disabling
the drive or permanently erasing all keys and data.
Unencrypted Portable Workplace is also available.
Features
 Optional Read Only mode erases all changes to the OS,
applications, and data files when the drive shuts down to
ensure an uncorrupted images every time the drive boots.
 Drives can be provisioned with a Data Vault read/write
partition for saving user files even when Read Only mode
is enabled. Separate data storage ensures the security of
files on the main drive.
 Configure BitLocker encryption for an additional layer of
SPYRUS “Defense-in-Depth” security on the main drive,
Data Vault, or both.
 Secure pre-boot authentication validates the integrity of
the Secure Portable Workplace and the operating system
using on-board hardware security at boot time. If tam-
pered with, it will not boot.
 Provision drives with your customized Windows image.
Designed For Security
 Microsoft Office—Install and run productivity software
locally.
Technical Specifications
© Copyright 2013-2015 SPYRUS, Inc. All rights reserved. SPYRUS, the SPYRUS logos, Secured by SPYRUS, WorkSafe, Toughboot, SPYRUS Enterprise Management System, and Rosetta are either
registered trademarks or trademarks of SPYRUS in the United States and/or other countries. All other trademarks are the property of their respective owners.
Patents: http://www.spyrus.com/patent-markings
Document number 400-451001-04
Corporate Headquarters
1860 Hartog Drive
San Jose, CA 95131-2203
+1 (408) 392-9131 phone
+1 (408) 392-0319 fax
info@SPYRUS.com
Australia Office
Level 7, 333 Adelaide Street
Brisbane QLD 4000, Australia
+61 7 3220-1133 phone
+61 7 3220-2233 fax
www.spyrus.com.au
East Coast Office
+1 (732) 329-6006 phone
+1 (732) 832-0123 fax
UK Office
+44 (0) 113 8800494
Specifications subject to change without notice.
Capacities  Dimensions (LxWxH)
32 GB, 64 GB, 128 GB, 256 GB
86.1 mm x 24.2 mm x 10.8 mm (+/- 0.20)
512 GB capacities
101.6 mm x 24.2 mm x 10.8 mm (+/- 0.20)
Performance (based on 512 GB drive)
USB 3.0 Super Speed; USB 2.0 Compatible
Please note Random Read and Random Write Performance
is the most important metrix for bootable live drives.
Sequential Read: up to 249 MB/sec
Sequential Write: up to 238 MB/sec
Reliability
Data Retention: 10 years
Other Certifications
Microsoft Windows To Go
FIPS 140-2 Algorithm Certificates
FIPS 140-2 Level 3
Electrical
Operating Voltage Vcc = 3.3 to 5 VDC
Power Consumption 275mA @ 3.3 VDC
Other
Humidity 90%, noncondensing
Physical Device Integrity:
At SPYRUS, we understand that people rely on their WTG device for mission critical func-
tions. In essence, it is their computer SSD drive. So unlike a traditional USB that is used less
regularly and is much easier to replace, we realized early-on in our customer deployments
that the device must withstand punishment from a physical design perspective. To that end
we designed our Windows To Go devices meet the highest physical standards in design and
component materials. The combination of stringent environmental testing and additional
testing for magnetic fields, X-Ray and long term immersion demonstrate the usability of
this high security configuration of the SPYRUS WTG devices in the challenging healthcare
environments as well.
Environmental
Operating Temperature (MIL-STD-202, METH 503) 0ºC -
70ºC
Non-Operating Temperature Cycling (MIL-STD-810, METH
503) -40ºC - 85ºC
High Temperature Storage (MIL-STD-810, METH 501) 85ºC;
96 hours
EMI (FCC/CE) FCC Part 15, Class B/EN55022 - EN55024/etc
ESD (EN61000-4-2) Enclosure Discharge - Contact  Air
Dust Test (IEC 60529, IP6) As per defined
Waterproof Test (IEC 60529, IPX7) As per defined
Operating Shock, MIL-STD 883J, Method 2002.5, Cond. B,
1500g, 0.5ms, 1/2 sine wave
High Temperature Storage/Data Retention, MIL-STD-810,
METH 501, 100ºC; 96 hours
Waterproof test, MIL-STD-810, METH 512.6,1 meter depth, 30
minutes
Hardware Security  Cryptographic Standards
SPYRUS Algoritm Agility includes Suite B (a set of cryp-
tographic algorithms used for cryptographic modernization)
and RSA based cryptography.
XTS - AES 256 Full Disk Encryption^
AES 128, 196, and 256 ECB, CBC, CTR, and Key Wrap Modes^
SP800 - 90 DRBG (Hash DRBG)
Elliptic Curve Cryptography (P-256, P-384, P-521)
ECDSA Digital Signature Algorithm
CVL (ECC CDH) [ECDH per SP 800-56A]
Concantenation KDF (SP800-56A)
RSA 1024 and 2048 Signature Algorithm (Note RSA 1024 has
been depricated by NIST.)
RSA 1024 and 2048 Key Exchange (Note RSA 1024 has been
depricated by NIST.)
PBKDF - 2 (per PKCS#5 version 2)^
DES, two- three-key triple DES with ECB, CBC Mode (Note
DES has been deprecated by NIST.)
SHA-1 and SHA-224/256/384/512 hash algorithms with
HMAC Support
Support for the cryptography can vary depending on version.
^ Not available on WorkSafe
FIPS 140-2 Level 3 opaque epoxy filled housing can be modified by special
order.

More Related Content

Similar to SPYRUS Secure Portable Workplace and Portable Workplace

CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionInka Traktman
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Securityguest95226d
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentationjuniortstanley
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715Patrick Eyberg
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheetMariusEnescu3
 

Similar to SPYRUS Secure Portable Workplace and Portable Workplace (20)

CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Fred server
Fred serverFred server
Fred server
 
Diskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive DatasheetDiskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive Datasheet
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Diskashur Hard Disk Drives Datasheet
Diskashur Hard Disk Drives DatasheetDiskashur Hard Disk Drives Datasheet
Diskashur Hard Disk Drives Datasheet
 
Test
TestTest
Test
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715
 
PLEXTOR SSD: The Value of PLEXTOR
PLEXTOR SSD:  The Value of PLEXTORPLEXTOR SSD:  The Value of PLEXTOR
PLEXTOR SSD: The Value of PLEXTOR
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheet
 
Coletor Ck3x - www.codeprint.com.br
Coletor Ck3x - www.codeprint.com.brColetor Ck3x - www.codeprint.com.br
Coletor Ck3x - www.codeprint.com.br
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person eventDianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath New York Community Day in-person event
UiPath New York Community Day in-person eventUiPath New York Community Day in-person event
UiPath New York Community Day in-person event
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

SPYRUS Secure Portable Workplace and Portable Workplace

  • 1. Secure Portable Workplace and Portable Workplace A hardware encrypted, bootable USB 3.0 Windows® 8 and Windows® 10 environment for fast, secure access on the go. Citrix, VPN, and more—Secure Portable Workplace is per- fect for giving workers access to Citrix servers, virtualized applications, remote desktops, virtual private networks, and more. Office 365—Access your Office 365 work space from almost any PC, without fear of malware capturing your password or copying your files. Helps mitigate Insider and External Attacks—SEMS can be used for remote device management including freezing or disabling the device, or zeroizing the keys to effectively erase the operating system, applications, and data. Additional Information Security designed, engineered, and manufactured in USA. Hardware-based full disk encryption (FDE) prevents data leakage. Dedicated cryptographic engines for fast response. Military strength cryptography inside FIPS 140-2 Level 3 compliant security boundary. Advanced hardware security includes XTS-AES 256, ECDH, ECDSA P-384, and SHA-384, which make up the US National Security Agency’s Suite B cryptography. ¬ Malware protection and sophisticated self-destruct mechanisms. No footprint left on host PC—as if you were never there. SPYRUS Enterprise Management System (SEMS) and re- mote kill stops unauthorized and rogue employee access. 32 GB, 64 GB, 128 GB, 256 GB, 512 GB capacities. Host machine must be certified for use with either Windows 7 or Windows 8. ¬ Minimum 2 GB RAM; performance improves with additional RAM. Minimum 2 GB RAM; performance improves with additional RAM. Secure Portable Workplace from SPYRUS is a Microsoft-cer- tified Windows To Go drive that securely boots your custom Windows 8 environment. Not a slow virtual machine, Secure Portable Workplace boots a native Windows 8.0/8.1 operating system using your computer hardware and the drive’s ultra-fast SSD memory, and it never accesses or alters your computer’s hard drive. Run applications locally and access the Internet, your corpo- rate network, and virtualized applications. When you’re done, remove the device and leave no footprint behind. Give your employees access to your corporate applications and data while mitigating hacking and data leakage. Add Secure Portable Workplace to your Windows domain and use Microsoft SCCM and AD group policy for centralized management. Even better, use SPYRUS Enterprise Management System (SEMS) for remote device management, including temporarily disabling the drive or permanently erasing all keys and data. Unencrypted Portable Workplace is also available. Features Optional Read Only mode erases all changes to the OS, applications, and data files when the drive shuts down to ensure an uncorrupted images every time the drive boots. Drives can be provisioned with a Data Vault read/write partition for saving user files even when Read Only mode is enabled. Separate data storage ensures the security of files on the main drive. Configure BitLocker encryption for an additional layer of SPYRUS “Defense-in-Depth” security on the main drive, Data Vault, or both. Secure pre-boot authentication validates the integrity of the Secure Portable Workplace and the operating system using on-board hardware security at boot time. If tam- pered with, it will not boot. Provision drives with your customized Windows image. Designed For Security Microsoft Office—Install and run productivity software locally.
  • 2. Technical Specifications © Copyright 2013-2015 SPYRUS, Inc. All rights reserved. SPYRUS, the SPYRUS logos, Secured by SPYRUS, WorkSafe, Toughboot, SPYRUS Enterprise Management System, and Rosetta are either registered trademarks or trademarks of SPYRUS in the United States and/or other countries. All other trademarks are the property of their respective owners. Patents: http://www.spyrus.com/patent-markings Document number 400-451001-04 Corporate Headquarters 1860 Hartog Drive San Jose, CA 95131-2203 +1 (408) 392-9131 phone +1 (408) 392-0319 fax info@SPYRUS.com Australia Office Level 7, 333 Adelaide Street Brisbane QLD 4000, Australia +61 7 3220-1133 phone +61 7 3220-2233 fax www.spyrus.com.au East Coast Office +1 (732) 329-6006 phone +1 (732) 832-0123 fax UK Office +44 (0) 113 8800494 Specifications subject to change without notice. Capacities Dimensions (LxWxH) 32 GB, 64 GB, 128 GB, 256 GB 86.1 mm x 24.2 mm x 10.8 mm (+/- 0.20) 512 GB capacities 101.6 mm x 24.2 mm x 10.8 mm (+/- 0.20) Performance (based on 512 GB drive) USB 3.0 Super Speed; USB 2.0 Compatible Please note Random Read and Random Write Performance is the most important metrix for bootable live drives. Sequential Read: up to 249 MB/sec Sequential Write: up to 238 MB/sec Reliability Data Retention: 10 years Other Certifications Microsoft Windows To Go FIPS 140-2 Algorithm Certificates FIPS 140-2 Level 3 Electrical Operating Voltage Vcc = 3.3 to 5 VDC Power Consumption 275mA @ 3.3 VDC Other Humidity 90%, noncondensing Physical Device Integrity: At SPYRUS, we understand that people rely on their WTG device for mission critical func- tions. In essence, it is their computer SSD drive. So unlike a traditional USB that is used less regularly and is much easier to replace, we realized early-on in our customer deployments that the device must withstand punishment from a physical design perspective. To that end we designed our Windows To Go devices meet the highest physical standards in design and component materials. The combination of stringent environmental testing and additional testing for magnetic fields, X-Ray and long term immersion demonstrate the usability of this high security configuration of the SPYRUS WTG devices in the challenging healthcare environments as well. Environmental Operating Temperature (MIL-STD-202, METH 503) 0ºC - 70ºC Non-Operating Temperature Cycling (MIL-STD-810, METH 503) -40ºC - 85ºC High Temperature Storage (MIL-STD-810, METH 501) 85ºC; 96 hours EMI (FCC/CE) FCC Part 15, Class B/EN55022 - EN55024/etc ESD (EN61000-4-2) Enclosure Discharge - Contact Air Dust Test (IEC 60529, IP6) As per defined Waterproof Test (IEC 60529, IPX7) As per defined Operating Shock, MIL-STD 883J, Method 2002.5, Cond. B, 1500g, 0.5ms, 1/2 sine wave High Temperature Storage/Data Retention, MIL-STD-810, METH 501, 100ºC; 96 hours Waterproof test, MIL-STD-810, METH 512.6,1 meter depth, 30 minutes Hardware Security Cryptographic Standards SPYRUS Algoritm Agility includes Suite B (a set of cryp- tographic algorithms used for cryptographic modernization) and RSA based cryptography. XTS - AES 256 Full Disk Encryption^ AES 128, 196, and 256 ECB, CBC, CTR, and Key Wrap Modes^ SP800 - 90 DRBG (Hash DRBG) Elliptic Curve Cryptography (P-256, P-384, P-521) ECDSA Digital Signature Algorithm CVL (ECC CDH) [ECDH per SP 800-56A] Concantenation KDF (SP800-56A) RSA 1024 and 2048 Signature Algorithm (Note RSA 1024 has been depricated by NIST.) RSA 1024 and 2048 Key Exchange (Note RSA 1024 has been depricated by NIST.) PBKDF - 2 (per PKCS#5 version 2)^ DES, two- three-key triple DES with ECB, CBC Mode (Note DES has been deprecated by NIST.) SHA-1 and SHA-224/256/384/512 hash algorithms with HMAC Support Support for the cryptography can vary depending on version. ^ Not available on WorkSafe FIPS 140-2 Level 3 opaque epoxy filled housing can be modified by special order.