SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
“With real-time AES
hardware encryption,
software free design and
a super speed USB 3.0
connection, you can
secure your data faster
than ever before.”
Looking for an effortless way to secure your data while taking advantage of the fastest USB 3.0 speeds? Look no further than
the diskAshur, the latest and fastest of iStorage’s secure drive line. With the same easy-to-use keypad design and software
free setup, the diskAshur enables you to access the drive with your own unique pin but now at data transfer speeds of up to
5Gbps.
Military Grade FIPS PUB 197 Validated Encryption: Using your choice of 128-bit or 256-bit AES-XTS hardware encryption,
the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is
removed from its enclosure.
Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the
iStorage diskAshur provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of
up to five unique user ID’s and one administrator, making it a useful business collaboration tool.
Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface,
you can now access your files faster than ever before. The diskAshur is also backwards compatible with USB 2.0 and 1.1
ports.
Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force
attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive
will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN
numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will
destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur.
Variable Timing Circuit Technology: Protection against hacker attempts doesn’t
stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is
iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing at-
tacks” aimed at accessing the drive by studying the behavior and infiltrating the
diskAshur’s electronics.
Drive Reset Feature: The diskAshur also employs a useful drive reset feature,
which can be implemented with a unique command. This clears all PINs and data,
and creates a new randomly generated encryption key, enabling the drive to be
reset and redeployed as many times as needed.
Auto-lock Feature: The unattended diskAshur can be configured to lock after a
pre-determined amount of time of your choosing. Ideal for protecting your data
when you’re away from your desk.
Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage
diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid
tipping off a potential hacker to the commonly used keys.
Data at Rest Protection: All data, PINs, and encryption keys are always encrypted
while at rest.
Compact, Rugged Design: Perfect for taking your data on the road, the
diskAshur‘s low powered design is perfect for using with notebooks and taking your
data on the road. Perfectly pocketable, the diskAshur’s compact, robust design
features a 16-point omni-directional shock mounting system and rubberised paint,
protecting the drive from drops and knocks. The convenient integrated USB 3.0
cable eliminates the need to carry around cords with you and allows you to be
connected at the flick of a fingertip.
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
• Military Grade FIPS PUB 197 Validated Encryption
• PIN activated 6-16 digits - Alphanumeric keypad use a
memorable number or word for your PIN
• Hardware Encrypted Drive - Real-time 256-bit AES
encryption seamlessly encrypts all data on the drive,
protecting the drive even if it is removed from it’s casing
• Super Speed USB 3.0 Connection
• Administrator Password Feature - Ideal for IT
departments looking to secure their mobile users, by
allowing setup of administrator access to the drive
before being distributed to their user(s)
• Brute Force Self Destruct Feature
• Auto Lock Feature
• Drive Reset Feature
• Variable Time Circuit Technology
• OS and Platform Independent – Compatible with
Windows, Mac, Linux and embedded systems
• No software or drivers required
• Wear Resistant Key Pad
• Brute Force Hack Defence Mechanism
• Customisation service available – Contact iStorage for
further information
• 3-Year warranty
Features at a glance:
Did you know that millions of external data storage devices
are lost or stolen every year and this figure is rising. Have
you ever considered the impact of losing your non-
encrypted USB hard drive? Your data would be at the
mercy of anyone who stumbles across it.
Loss of confidential data can have a devastating effect on
both businesses and consumers. It could lead to a hefty
fine, the downfall of a business, embarrassment, job losses
and adverse media attention. The iStorage diskAshur can
protect you against all of this.
Why choose diskAshur?
Technical Specifications
Capacity
250GB, 320GB, 500GB, 640GB, 750GB,
1TB, 1.5TB
Interface USB 3.0 - Up to 5Gbps
Power Supply Bus Powered
Dimensions 19mm x 84.5mm x 120mm
Buffer Size 8MB
Approvals FCC CE, RoHS
Hardware
USB 3.0 super speed compatible
Also compatible with USB 2.0 and 1.1
Operating System compatibility Windows, MAC OS, Linux
Hardware Data Encryption AES XTS
Encryption Keys 128-bit or 256-bit Hardware
iStorage Part Numbers
IS-DG3-256-XXX or IS-DG3-128-XXX
(X = Capacity)
All trademarks and brand
names are the property of
their respective owners
iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England
Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com

Weitere ähnliche Inhalte

Andere mochten auch (6)

Video Security Goes to the cloud
Video Security Goes to the cloudVideo Security Goes to the cloud
Video Security Goes to the cloud
 
5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem5 Traits of a Good Phone Sytem
5 Traits of a Good Phone Sytem
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
 
Contact centers versus call centers
Contact centers versus call centers Contact centers versus call centers
Contact centers versus call centers
 
Magnetic door lock using arduino
Magnetic door lock using arduinoMagnetic door lock using arduino
Magnetic door lock using arduino
 
Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic door
 

Ähnlich wie Diskashur Hard Disk Drives Datasheet

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
mfoudi
 
Hardware
HardwareHardware
Hardware
amal312
 
Internal components Updated
Internal components UpdatedInternal components Updated
Internal components Updated
BenRB
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)
Scott Eiser
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
BenRB
 
Dell precision-t3400-workstation-en
Dell precision-t3400-workstation-enDell precision-t3400-workstation-en
Dell precision-t3400-workstation-en
Ewerton gon?lves
 

Ähnlich wie Diskashur Hard Disk Drives Datasheet (20)

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
Fred server
Fred serverFred server
Fred server
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable Workplace
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
Hardware
HardwareHardware
Hardware
 
Harddisk
HarddiskHarddisk
Harddisk
 
Internal components Updated
Internal components UpdatedInternal components Updated
Internal components Updated
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
 
Internal components Ben Rees-Boughton
Internal components Ben Rees-BoughtonInternal components Ben Rees-Boughton
Internal components Ben Rees-Boughton
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Dell precision-t3400-workstation-en
Dell precision-t3400-workstation-enDell precision-t3400-workstation-en
Dell precision-t3400-workstation-en
 
S tora ge devices
S tora ge devicesS tora ge devices
S tora ge devices
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheet
 
Embedded presentation
Embedded presentationEmbedded presentation
Embedded presentation
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 

Mehr von Kingfin Enterprises Limited

How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT Environments
Kingfin Enterprises Limited
 

Mehr von Kingfin Enterprises Limited (20)

eSim Platform
eSim PlatformeSim Platform
eSim Platform
 
Tomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure TodayTomorrow's Server Infrastructure Today
Tomorrow's Server Infrastructure Today
 
Data Center Trends And Network Security Impact
Data Center Trends And Network Security ImpactData Center Trends And Network Security Impact
Data Center Trends And Network Security Impact
 
VoIP for Beginners
VoIP for BeginnersVoIP for Beginners
VoIP for Beginners
 
Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation. Top 10 Tips for Implementing Desktop Virtualisation.
Top 10 Tips for Implementing Desktop Virtualisation.
 
A Smarter Path to ERP Selection
A Smarter Path to ERP SelectionA Smarter Path to ERP Selection
A Smarter Path to ERP Selection
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
Fujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product IntroductionFujitsu Scansnap SV600 Product Introduction
Fujitsu Scansnap SV600 Product Introduction
 
The 7 types of Power Problems
The 7 types of Power ProblemsThe 7 types of Power Problems
The 7 types of Power Problems
 
ASUS VivoBook S400
ASUS VivoBook S400ASUS VivoBook S400
ASUS VivoBook S400
 
How to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT EnvironmentsHow to Overcome 11 Challenges for Small IT Environments
How to Overcome 11 Challenges for Small IT Environments
 
Fujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i BrochureFujitsu ScanSnap S1300i Brochure
Fujitsu ScanSnap S1300i Brochure
 
Symantec Partner Certificate
Symantec Partner CertificateSymantec Partner Certificate
Symantec Partner Certificate
 
Dell registered partner certificate
Dell registered partner certificateDell registered partner certificate
Dell registered partner certificate
 
MOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESSMOBILE DEVELOPMENT IN THE BUSINESS
MOBILE DEVELOPMENT IN THE BUSINESS
 
Microsoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter GuideMicrosoft Windows Server 2012 Early Adopter Guide
Microsoft Windows Server 2012 Early Adopter Guide
 
How Unified Communications Pays For Itself
How Unified Communications Pays For ItselfHow Unified Communications Pays For Itself
How Unified Communications Pays For Itself
 
Fujitsu STYLISTIC Q702 Tablet PC
Fujitsu STYLISTIC Q702 Tablet PCFujitsu STYLISTIC Q702 Tablet PC
Fujitsu STYLISTIC Q702 Tablet PC
 
Fujitsu PRIMERGY RX200 S7
Fujitsu PRIMERGY RX200 S7Fujitsu PRIMERGY RX200 S7
Fujitsu PRIMERGY RX200 S7
 
Fujitsu PRIMERGY RX100 S7
Fujitsu PRIMERGY RX100 S7Fujitsu PRIMERGY RX100 S7
Fujitsu PRIMERGY RX100 S7
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Diskashur Hard Disk Drives Datasheet

  • 1. “With real-time AES hardware encryption, software free design and a super speed USB 3.0 connection, you can secure your data faster than ever before.” Looking for an effortless way to secure your data while taking advantage of the fastest USB 3.0 speeds? Look no further than the diskAshur, the latest and fastest of iStorage’s secure drive line. With the same easy-to-use keypad design and software free setup, the diskAshur enables you to access the drive with your own unique pin but now at data transfer speeds of up to 5Gbps. Military Grade FIPS PUB 197 Validated Encryption: Using your choice of 128-bit or 256-bit AES-XTS hardware encryption, the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure. Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the iStorage diskAshur provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool. Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface, you can now access your files faster than ever before. The diskAshur is also backwards compatible with USB 2.0 and 1.1 ports. Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur. Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing at- tacks” aimed at accessing the drive by studying the behavior and infiltrating the diskAshur’s electronics. Drive Reset Feature: The diskAshur also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed. Auto-lock Feature: The unattended diskAshur can be configured to lock after a pre-determined amount of time of your choosing. Ideal for protecting your data when you’re away from your desk. Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Data at Rest Protection: All data, PINs, and encryption keys are always encrypted while at rest. Compact, Rugged Design: Perfect for taking your data on the road, the diskAshur‘s low powered design is perfect for using with notebooks and taking your data on the road. Perfectly pocketable, the diskAshur’s compact, robust design features a 16-point omni-directional shock mounting system and rubberised paint, protecting the drive from drops and knocks. The convenient integrated USB 3.0 cable eliminates the need to carry around cords with you and allows you to be connected at the flick of a fingertip. iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: + 44 (0) 118 973 9399 - Email: sales@istorage-africa.com - Web: www.istorage-africa.com
  • 2. • Military Grade FIPS PUB 197 Validated Encryption • PIN activated 6-16 digits - Alphanumeric keypad use a memorable number or word for your PIN • Hardware Encrypted Drive - Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from it’s casing • Super Speed USB 3.0 Connection • Administrator Password Feature - Ideal for IT departments looking to secure their mobile users, by allowing setup of administrator access to the drive before being distributed to their user(s) • Brute Force Self Destruct Feature • Auto Lock Feature • Drive Reset Feature • Variable Time Circuit Technology • OS and Platform Independent – Compatible with Windows, Mac, Linux and embedded systems • No software or drivers required • Wear Resistant Key Pad • Brute Force Hack Defence Mechanism • Customisation service available – Contact iStorage for further information • 3-Year warranty Features at a glance: Did you know that millions of external data storage devices are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non- encrypted USB hard drive? Your data would be at the mercy of anyone who stumbles across it. Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskAshur can protect you against all of this. Why choose diskAshur? Technical Specifications Capacity 250GB, 320GB, 500GB, 640GB, 750GB, 1TB, 1.5TB Interface USB 3.0 - Up to 5Gbps Power Supply Bus Powered Dimensions 19mm x 84.5mm x 120mm Buffer Size 8MB Approvals FCC CE, RoHS Hardware USB 3.0 super speed compatible Also compatible with USB 2.0 and 1.1 Operating System compatibility Windows, MAC OS, Linux Hardware Data Encryption AES XTS Encryption Keys 128-bit or 256-bit Hardware iStorage Part Numbers IS-DG3-256-XXX or IS-DG3-128-XXX (X = Capacity) All trademarks and brand names are the property of their respective owners iStorage-Africa, Unit 7, Church Farm, Church Road, Eversley, Hampshire. RG27 0PX, England Tel: +44 (0) 118 973 9399 – Email: sales@istorage-africa.com – web: www.istorage-africa.com