SlideShare a Scribd company logo
1 of 2
Download to read offline
Secure Portable
Workplace and Portable Workplace
A hardware encrypted, bootable USB 3.0 Windows® 8 and Windows® 10
environment for fast, secure access on the go.
 Citrix, VPN, and more—Secure Portable Workplace is per-
fect for giving workers access to Citrix servers, virtualized
applications, remote desktops, virtual private networks,
and more.
 Office 365—Access your Office 365 work space from
almost any PC, without fear of malware capturing your
password or copying your files.
 Helps mitigate Insider and External Attacks—SEMS can be
used for remote device management including freezing
or disabling the device, or zeroizing the keys to effectively
erase the operating system, applications, and data.
Additional Information
 Security designed, engineered, and manufactured in USA.
 Hardware-based full disk encryption (FDE) prevents data
leakage.
 Dedicated cryptographic engines for fast response.
 Military strength cryptography inside FIPS 140-2 Level 3
compliant security boundary.
 Advanced hardware security includes XTS-AES 256,
ECDH, ECDSA P-384, and SHA-384, which make up the
US National Security Agency’s Suite B cryptography. ¬
 Malware protection and sophisticated self-destruct
mechanisms.
 No footprint left on host PC—as if you were never there.
SPYRUS Enterprise Management System (SEMS) and re-
mote kill stops unauthorized and rogue employee access.
 32 GB, 64 GB, 128 GB, 256 GB, 512 GB capacities.
 Host machine must be certified for use with either Windows 7
or Windows 8. ¬ Minimum 2 GB RAM; performance improves
with additional RAM.
 Minimum 2 GB RAM; performance improves with
additional RAM.
Secure Portable Workplace from SPYRUS is a Microsoft-cer-
tified Windows To Go drive that securely boots your custom
Windows 8 environment. Not a slow virtual machine, Secure
Portable Workplace boots a native Windows 8.0/8.1 operating
system using your computer hardware and the drive’s ultra-fast
SSD memory, and it never accesses or alters your computer’s
hard drive.
Run applications locally and access the Internet, your corpo-
rate network, and virtualized applications. When you’re done,
remove the device and leave no footprint behind.
Give your employees access to your corporate applications and
data while mitigating hacking and data leakage. Add Secure
Portable Workplace to your Windows domain and use Microsoft
SCCM and AD group policy for centralized management. Even
better, use SPYRUS Enterprise Management System (SEMS) for
remote device management, including temporarily disabling
the drive or permanently erasing all keys and data.
Unencrypted Portable Workplace is also available.
Features
 Optional Read Only mode erases all changes to the OS,
applications, and data files when the drive shuts down to
ensure an uncorrupted images every time the drive boots.
 Drives can be provisioned with a Data Vault read/write
partition for saving user files even when Read Only mode
is enabled. Separate data storage ensures the security of
files on the main drive.
 Configure BitLocker encryption for an additional layer of
SPYRUS “Defense-in-Depth” security on the main drive,
Data Vault, or both.
 Secure pre-boot authentication validates the integrity of
the Secure Portable Workplace and the operating system
using on-board hardware security at boot time. If tam-
pered with, it will not boot.
 Provision drives with your customized Windows image.
Designed For Security
 Microsoft Office—Install and run productivity software
locally.
Technical Specifications
© Copyright 2013-2015 SPYRUS, Inc. All rights reserved. SPYRUS, the SPYRUS logos, Secured by SPYRUS, WorkSafe, Toughboot, SPYRUS Enterprise Management System, and Rosetta are either
registered trademarks or trademarks of SPYRUS in the United States and/or other countries. All other trademarks are the property of their respective owners.
Patents: http://www.spyrus.com/patent-markings
Document number 400-451001-04
Corporate Headquarters
1860 Hartog Drive
San Jose, CA 95131-2203
+1 (408) 392-9131 phone
+1 (408) 392-0319 fax
info@SPYRUS.com
Australia Office
Level 7, 333 Adelaide Street
Brisbane QLD 4000, Australia
+61 7 3220-1133 phone
+61 7 3220-2233 fax
www.spyrus.com.au
East Coast Office
+1 (732) 329-6006 phone
+1 (732) 832-0123 fax
UK Office
+44 (0) 113 8800494
Specifications subject to change without notice.
Capacities  Dimensions (LxWxH)
32 GB, 64 GB, 128 GB, 256 GB
86.1 mm x 24.2 mm x 10.8 mm (+/- 0.20)
512 GB capacities
101.6 mm x 24.2 mm x 10.8 mm (+/- 0.20)
Performance (based on 512 GB drive)
USB 3.0 Super Speed; USB 2.0 Compatible
Please note Random Read and Random Write Performance
is the most important metrix for bootable live drives.
Sequential Read: up to 249 MB/sec
Sequential Write: up to 238 MB/sec
Reliability
Data Retention: 10 years
Other Certifications
Microsoft Windows To Go
FIPS 140-2 Algorithm Certificates
FIPS 140-2 Level 3
Electrical
Operating Voltage Vcc = 3.3 to 5 VDC
Power Consumption 275mA @ 3.3 VDC
Other
Humidity 90%, noncondensing
Physical Device Integrity:
At SPYRUS, we understand that people rely on their WTG device for mission critical func-
tions. In essence, it is their computer SSD drive. So unlike a traditional USB that is used less
regularly and is much easier to replace, we realized early-on in our customer deployments
that the device must withstand punishment from a physical design perspective. To that end
we designed our Windows To Go devices meet the highest physical standards in design and
component materials. The combination of stringent environmental testing and additional
testing for magnetic fields, X-Ray and long term immersion demonstrate the usability of
this high security configuration of the SPYRUS WTG devices in the challenging healthcare
environments as well.
Environmental
Operating Temperature (MIL-STD-202, METH 503) 0ºC -
70ºC
Non-Operating Temperature Cycling (MIL-STD-810, METH
503) -40ºC - 85ºC
High Temperature Storage (MIL-STD-810, METH 501) 85ºC;
96 hours
EMI (FCC/CE) FCC Part 15, Class B/EN55022 - EN55024/etc
ESD (EN61000-4-2) Enclosure Discharge - Contact  Air
Dust Test (IEC 60529, IP6) As per defined
Waterproof Test (IEC 60529, IPX7) As per defined
Operating Shock, MIL-STD 883J, Method 2002.5, Cond. B,
1500g, 0.5ms, 1/2 sine wave
High Temperature Storage/Data Retention, MIL-STD-810,
METH 501, 100ºC; 96 hours
Waterproof test, MIL-STD-810, METH 512.6,1 meter depth, 30
minutes
Hardware Security  Cryptographic Standards
SPYRUS Algoritm Agility includes Suite B (a set of cryp-
tographic algorithms used for cryptographic modernization)
and RSA based cryptography.
XTS - AES 256 Full Disk Encryption^
AES 128, 196, and 256 ECB, CBC, CTR, and Key Wrap Modes^
SP800 - 90 DRBG (Hash DRBG)
Elliptic Curve Cryptography (P-256, P-384, P-521)
ECDSA Digital Signature Algorithm
CVL (ECC CDH) [ECDH per SP 800-56A]
Concantenation KDF (SP800-56A)
RSA 1024 and 2048 Signature Algorithm (Note RSA 1024 has
been depricated by NIST.)
RSA 1024 and 2048 Key Exchange (Note RSA 1024 has been
depricated by NIST.)
PBKDF - 2 (per PKCS#5 version 2)^
DES, two- three-key triple DES with ECB, CBC Mode (Note
DES has been deprecated by NIST.)
SHA-1 and SHA-224/256/384/512 hash algorithms with
HMAC Support
Support for the cryptography can vary depending on version.
^ Not available on WorkSafe
FIPS 140-2 Level 3 opaque epoxy filled housing can be modified by special
order.

More Related Content

Similar to SPYRUS Secure Portable Workplace and Portable Workplace

CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionInka Traktman
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Securityguest95226d
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentationjuniortstanley
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715Patrick Eyberg
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheetMariusEnescu3
 

Similar to SPYRUS Secure Portable Workplace and Portable Workplace (20)

CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Fred server
Fred serverFred server
Fred server
 
Diskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive DatasheetDiskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive Datasheet
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
Secure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protectionSecure deduplication-evault-endpoint-protection
Secure deduplication-evault-endpoint-protection
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Diskashur Hard Disk Drives Datasheet
Diskashur Hard Disk Drives DatasheetDiskashur Hard Disk Drives Datasheet
Diskashur Hard Disk Drives Datasheet
 
Test
TestTest
Test
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Data Protection Fde Solution Presentation
Data Protection Fde Solution PresentationData Protection Fde Solution Presentation
Data Protection Fde Solution Presentation
 
DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715DataLockerOverview vs 3.9 Final_120715
DataLockerOverview vs 3.9 Final_120715
 
PLEXTOR SSD: The Value of PLEXTOR
PLEXTOR SSD:  The Value of PLEXTORPLEXTOR SSD:  The Value of PLEXTOR
PLEXTOR SSD: The Value of PLEXTOR
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheet
 
Coletor Ck3x - www.codeprint.com.br
Coletor Ck3x - www.codeprint.com.brColetor Ck3x - www.codeprint.com.br
Coletor Ck3x - www.codeprint.com.br
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

SPYRUS Secure Portable Workplace and Portable Workplace

  • 1. Secure Portable Workplace and Portable Workplace A hardware encrypted, bootable USB 3.0 Windows® 8 and Windows® 10 environment for fast, secure access on the go. Citrix, VPN, and more—Secure Portable Workplace is per- fect for giving workers access to Citrix servers, virtualized applications, remote desktops, virtual private networks, and more. Office 365—Access your Office 365 work space from almost any PC, without fear of malware capturing your password or copying your files. Helps mitigate Insider and External Attacks—SEMS can be used for remote device management including freezing or disabling the device, or zeroizing the keys to effectively erase the operating system, applications, and data. Additional Information Security designed, engineered, and manufactured in USA. Hardware-based full disk encryption (FDE) prevents data leakage. Dedicated cryptographic engines for fast response. Military strength cryptography inside FIPS 140-2 Level 3 compliant security boundary. Advanced hardware security includes XTS-AES 256, ECDH, ECDSA P-384, and SHA-384, which make up the US National Security Agency’s Suite B cryptography. ¬ Malware protection and sophisticated self-destruct mechanisms. No footprint left on host PC—as if you were never there. SPYRUS Enterprise Management System (SEMS) and re- mote kill stops unauthorized and rogue employee access. 32 GB, 64 GB, 128 GB, 256 GB, 512 GB capacities. Host machine must be certified for use with either Windows 7 or Windows 8. ¬ Minimum 2 GB RAM; performance improves with additional RAM. Minimum 2 GB RAM; performance improves with additional RAM. Secure Portable Workplace from SPYRUS is a Microsoft-cer- tified Windows To Go drive that securely boots your custom Windows 8 environment. Not a slow virtual machine, Secure Portable Workplace boots a native Windows 8.0/8.1 operating system using your computer hardware and the drive’s ultra-fast SSD memory, and it never accesses or alters your computer’s hard drive. Run applications locally and access the Internet, your corpo- rate network, and virtualized applications. When you’re done, remove the device and leave no footprint behind. Give your employees access to your corporate applications and data while mitigating hacking and data leakage. Add Secure Portable Workplace to your Windows domain and use Microsoft SCCM and AD group policy for centralized management. Even better, use SPYRUS Enterprise Management System (SEMS) for remote device management, including temporarily disabling the drive or permanently erasing all keys and data. Unencrypted Portable Workplace is also available. Features Optional Read Only mode erases all changes to the OS, applications, and data files when the drive shuts down to ensure an uncorrupted images every time the drive boots. Drives can be provisioned with a Data Vault read/write partition for saving user files even when Read Only mode is enabled. Separate data storage ensures the security of files on the main drive. Configure BitLocker encryption for an additional layer of SPYRUS “Defense-in-Depth” security on the main drive, Data Vault, or both. Secure pre-boot authentication validates the integrity of the Secure Portable Workplace and the operating system using on-board hardware security at boot time. If tam- pered with, it will not boot. Provision drives with your customized Windows image. Designed For Security Microsoft Office—Install and run productivity software locally.
  • 2. Technical Specifications © Copyright 2013-2015 SPYRUS, Inc. All rights reserved. SPYRUS, the SPYRUS logos, Secured by SPYRUS, WorkSafe, Toughboot, SPYRUS Enterprise Management System, and Rosetta are either registered trademarks or trademarks of SPYRUS in the United States and/or other countries. All other trademarks are the property of their respective owners. Patents: http://www.spyrus.com/patent-markings Document number 400-451001-04 Corporate Headquarters 1860 Hartog Drive San Jose, CA 95131-2203 +1 (408) 392-9131 phone +1 (408) 392-0319 fax info@SPYRUS.com Australia Office Level 7, 333 Adelaide Street Brisbane QLD 4000, Australia +61 7 3220-1133 phone +61 7 3220-2233 fax www.spyrus.com.au East Coast Office +1 (732) 329-6006 phone +1 (732) 832-0123 fax UK Office +44 (0) 113 8800494 Specifications subject to change without notice. Capacities Dimensions (LxWxH) 32 GB, 64 GB, 128 GB, 256 GB 86.1 mm x 24.2 mm x 10.8 mm (+/- 0.20) 512 GB capacities 101.6 mm x 24.2 mm x 10.8 mm (+/- 0.20) Performance (based on 512 GB drive) USB 3.0 Super Speed; USB 2.0 Compatible Please note Random Read and Random Write Performance is the most important metrix for bootable live drives. Sequential Read: up to 249 MB/sec Sequential Write: up to 238 MB/sec Reliability Data Retention: 10 years Other Certifications Microsoft Windows To Go FIPS 140-2 Algorithm Certificates FIPS 140-2 Level 3 Electrical Operating Voltage Vcc = 3.3 to 5 VDC Power Consumption 275mA @ 3.3 VDC Other Humidity 90%, noncondensing Physical Device Integrity: At SPYRUS, we understand that people rely on their WTG device for mission critical func- tions. In essence, it is their computer SSD drive. So unlike a traditional USB that is used less regularly and is much easier to replace, we realized early-on in our customer deployments that the device must withstand punishment from a physical design perspective. To that end we designed our Windows To Go devices meet the highest physical standards in design and component materials. The combination of stringent environmental testing and additional testing for magnetic fields, X-Ray and long term immersion demonstrate the usability of this high security configuration of the SPYRUS WTG devices in the challenging healthcare environments as well. Environmental Operating Temperature (MIL-STD-202, METH 503) 0ºC - 70ºC Non-Operating Temperature Cycling (MIL-STD-810, METH 503) -40ºC - 85ºC High Temperature Storage (MIL-STD-810, METH 501) 85ºC; 96 hours EMI (FCC/CE) FCC Part 15, Class B/EN55022 - EN55024/etc ESD (EN61000-4-2) Enclosure Discharge - Contact Air Dust Test (IEC 60529, IP6) As per defined Waterproof Test (IEC 60529, IPX7) As per defined Operating Shock, MIL-STD 883J, Method 2002.5, Cond. B, 1500g, 0.5ms, 1/2 sine wave High Temperature Storage/Data Retention, MIL-STD-810, METH 501, 100ºC; 96 hours Waterproof test, MIL-STD-810, METH 512.6,1 meter depth, 30 minutes Hardware Security Cryptographic Standards SPYRUS Algoritm Agility includes Suite B (a set of cryp- tographic algorithms used for cryptographic modernization) and RSA based cryptography. XTS - AES 256 Full Disk Encryption^ AES 128, 196, and 256 ECB, CBC, CTR, and Key Wrap Modes^ SP800 - 90 DRBG (Hash DRBG) Elliptic Curve Cryptography (P-256, P-384, P-521) ECDSA Digital Signature Algorithm CVL (ECC CDH) [ECDH per SP 800-56A] Concantenation KDF (SP800-56A) RSA 1024 and 2048 Signature Algorithm (Note RSA 1024 has been depricated by NIST.) RSA 1024 and 2048 Key Exchange (Note RSA 1024 has been depricated by NIST.) PBKDF - 2 (per PKCS#5 version 2)^ DES, two- three-key triple DES with ECB, CBC Mode (Note DES has been deprecated by NIST.) SHA-1 and SHA-224/256/384/512 hash algorithms with HMAC Support Support for the cryptography can vary depending on version. ^ Not available on WorkSafe FIPS 140-2 Level 3 opaque epoxy filled housing can be modified by special order.