EDGE (Enhanced Dual Generating Encryption) Technology
Offering advanced portable data security via built-in FIPS PUB 197 validated AES-XTS 256-bit hardware encryption engine. The data encryption key is randomly generated by a Common Criteria EAL4+ ready Random Number Generator and protected by FIPS validated wrapping algorithms. Uniquely featuring a dedicated on-board Common Criteria EAL4+ ready secure microprocessor to enhance security through true random number generation and built-in cryptography. The security component employs physical protection mechanisms to protect itself from any external tamper, bypass laser attacks and fault injections and incorporates active-shield violation technology. More specifically, the secure microprocessor reacts to all forms of automated hacking attempts by entering the deadlock frozen state where the device can only restart through a ‘Power On’ reset procedure (i.e. power off/power on). The security lock feature protects the device against any unauthorised firmware modifications from the host side (fully protected against BadUSB). The diskAshur2 uniquely incorporates a secure microprocessor providing secure algorithms to encrypt both the data and the encryption key, giving you confidence that your data is protected to the highest standards at any given time.
FIPS PUB 197 Validated Encryption Algorithm
Employing AES-XTS 256-bit hardware encryption, the iStorage diskAshur2 seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.
Super-fast USB 3.1
With super-fast USB 3.1 data transfer speeds of 148 MBps (Read) and 140 MBps (Write), you can now access your files faster than ever before. The iStorage diskAshur2 is also backwards compatible with USB 2.0 and 1.1 ports.
Brute Force Hack Defence Mechanism
The iStorage diskAshur2 is intelligently programmed to protect against all forms of Brute Force attacks. After five consecutive incorrect PIN entries, the drive will freeze, requiring the drive to be disconnected and reconnected to the USB port to get a further five PIN entry attempts. If a further five (10 in total) consecutive incorrect PIN attempts are entered again, the diskAshur2 will freeze again. To get a further and final five PIN attempts (15 in total), the “shift” button must be pressed whilst inserting the USB cable to the USB port and then an iStorage preset PIN will need to be entered. On the fifteenth consecutive incorrect PIN entry, the diskAshur2 assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.
Self Destruct Feature
You can pre-program the diskAshur2 with your own unique Self Destruct PIN which, once implemented, instantly deletes the encryption key, all PINs, data and then creates a new encryption key.
Drive Reset Feature
The iStorage diskAshur2 also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.
Unattended Auto-Lock Feature
Set the unattended diskAshur2 to automatically lock after a pre-determined amount of time.
Tamper Proof Design
In addition to incorporating a secure microprocessor, encrypting the data and the encryption key, the diskAshur2 adds another barrier between your data and a hacker. All the components of the diskAshur2 are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. This barrier prevents a potential hacker from accessing the critical components and launching a variety of futile attacks.
Data at rest protection
All data and encryption keys are always encrypted while at rest.
Wear Resistant Epoxy Coated Keypad
Designed with protection in mind, the diskAshur2 wear resistant epoxy coated keypad hides key usage to avoid tipping off a potential hacker to commonly used keys.