Media Encryption Products


media-becrypt_logo.png.....

Disk Protect Baseline Licence

DISK Protect Baseline provides 3 layers of security.

Full disk encryption

When first installed, DISK Protect transparently encrypts a computer’s hard disk(s) using an Encryption Key supplied by CESG. From then on, data is automatically decrypted and re encrypted on the fly (as and when required). If anyone attempts to bypass Authentication, the data is encrypted and unintelligible.

Pre-boot authentication

DISK Protect can be configured to authenticate by password or by password and token. In either case, an embedded password generator provides the level of security required. Authenticating the user pre-boot allows DISK Protect to encrypt the Operating System and ensure that data cannot be accessed using low level tools.

Removable media encryption

Optional removable media encryption secures data on USB connected storage devices and floppy disks. Data may be encrypted using a shared Encryption Key or a personal Encryption Key. DISK Protect can be configured to allow the use of both encrypted and unencrypted removable media.

Token support

DISK Protect supports Aladdin R2e and eToken PRO USB tokens, and RSA 5100, 5200, 6100 and SID800 smart cards to provide dual-factor authentication. Extended smart card support gives an organisation the option of using a card that is already part of its security systems, issuing its staff with a single Smart Card for all access control and authentication purposes.

Also requires mandatory Disk Protect Baseline 1 year maintenance

 

Download Data Sheet


media-becrypt_logo.png

Disk Protect Enhanced Licence

DISK Protect™ Enhanced DISK Protect is a full-disk encryption solution for laptop and desktop computers running Windows operating systems. DISK Protect Enhanced is approved under the CESG Assisted Products Scheme (CAPS) to handle protectively marked data to Enhanced grade.

DISK Protect Enhanced provides 2 layers of security.

Full disk encryption

When first installed, DISK Protect transparently encrypts a computer’s hard disk(s) using an Encryption Key supplied by CESG. From then on, data is automatically decrypted and re encrypted on the fly (as and when required). If anyone attempts to bypass Authentication, the data is encrypted and unintelligible.

Pre-boot authentication

DISK Protect enforces mandatory dual-factor authentication, authenticating the user by username, password and token. Authenticating the user pre-boot allows DISK Protect to encrypt the Operating System, ensuring that data cannot be accessed using low level tools.

Removable media

Data may be exchanged via encrypted removable media. Users may import Transport Keys for use with removable media.

Token support

DISK Protect Enhanced enforces mandatory dual factor authentication by user name, password and personalised Dallas iButton touch token.

Also requires mandatory Disk Protect Enhanced 1 year maintenance

 

Download Data Sheet


media-becrypt_logo.png

Advanced Port Control

Advanced Port Control is a CAPS approved peripheral device control solution that provides assured protection against a variety of risks associated with the use of such devices. It is specifically designed for use in environments that host protectively marked data.

Advanced Port Control may be installed on individual client computers or via a software distribution platform.

Advanced Port Control is managed via a password-protected Configuration Tool, which allows the administrator to create and maintain separate policies (white lists of allowed devices) for the client computer and for each individual user (if required).

Also requires mandatory Advanced Port Control (APC) Maintenance 1 Year

 

Download Data Sheet


media-becrypt_logo.png

Connect Protect Licence

Connect Protect 2.1 is a port control solution, designed to secure a desktop or laptop computer from the introduction of unauthorised material (including software, music and graphical images), and from the accidental or malicious leakage of data, via Plug and Play devices such as removable disk drives, MP3 players, and printers. Connect Protect is remotely installed using standard tools and configured via Active Directory or via the BeCrypt Configuration Tool.

Devices are configured by type and may be set to:

Also requires mandatory Advanced Port Control (APC) Maintenance 1 Year

  • Enabled
  • Controlled Access (Via Audited File Copy)
  • Read Only (if applicable)
  • Disabled

Also requires mandatory Connect Protect Maintenance 1 Year

 

Download Data Sheet


media-becrypt_logo.png

Media Client

BeCrypt Media Client offers a simple and easy way of protecting data in transit with file encryption and media encryption. Media Client resides on any removable device and has a zero footprint, allowing a recipient to access protected data without needing to install software.

Key Features

  • Folders and/or files selected by the user are encrypted and written to the chosen media with an assigned passphrase.
  • An audit trail is automatically generated for policy compliance and management.
  • File names are obfuscated for complete data confidentiality.
  • Zero footprint design ensures flexible data sharing: an extractor application on the protected media allows the recipient to recover the encrypted data with no Becrypt software installed.
  • Recovery tools allow straightforward management of forgotten passphrases.
  • The integrity of media contents are verified to protect against data tampering and corruption.

Also requires mandatory Media Client Baseline Maintenance 1 Year

 

Download Data Sheet


media-ViaSat-Logo.png

Eclypt Core

media-eclypt-core.png

The ViaSat Eclypt Core encrypted internal hard drive protects data at rest in commercial-off-the-shelf (COTS) laptop and desktop computers in enterprise and tactical environments, as well as data stored in vehicles, aircraft, and ships. During high-risk operations, this self-encrypting hard drive protects your valuable data on manned and unmanned mobile platforms with accredited hardware-based security. In the event of computer theft, loss, or attack, the hard drive ensures that your data is completely protected and secure.
ViaSat’s Eclypt technology integrates sophisticated authentication, entire-disk encryption and data storage into tamper-resistant internal or portable hardware that safeguards your data. This provides instant data protection without any noticeable adverse effects on your computer’s performance.

Key Features

  • Encrypts and decrypts your data immediately and invisibly with no noticeable effects on the computer’s performance Independent of any operating system, application, service pack or software patch
  • Unique tamper-proof and tamper-evident construction
  • Requires no specialist IT knowledge
  • Up to 128 user accounts per drive
  • Multiple user profiles — 3-tier management system
  • Lifetime key (user-defined on Core 200)
  • Windows/Mac OS X/Linux-based software provides easy to use management and authentication functionality
  • Supports imaging, ghosting, partitioning and diagnostic applications
  • Non-volatile keys stored within tamper proof device, protected by AES-256 keywrap
  • Optional Eclypt Orion provides easy-to-use Central Management Server functionality for Eclypt Core 200 devices and users
    media-CAPS-logo.png 

 

Download Data Sheet


media-ViaSat-Logo.png

Eclypt Freedom

media-eclypt-freedom.png

The ViaSat Eclypt® Freedom is an external USB hardware-encrypted hard drive that can store, archive, or back-up data and easily transport to different computers.

Used by governments, military forces, and law enforcement organizations worldwide, this secure portable hard drive integrates sophisticated authentication, entire-disk encryption and data storage into tamper-resistant portable hardware that safeguards your data. It provides instant data protection without any noticeable adverse effects on your computer performance.

USB connectivity allows information to be securely:

  • USB Connectivity allows information to be securely:
    • Transferred between computers
    • Stored, archived or backed-u
    • Transported between/to different locations
  • HDD (rotating) or SSD (solid state) versions
  • USB connectivity
  • Encrypts and decrypts your data immediately and invisibly with no noticeable effects on the computer’s performance
  • Unique tamper-proof and tamper-evident construction
  • Data is secure even if your unit is stolen
  • Up to 128 user accounts per drive
  • Plug & Play capability (No pre-loaded drivers needed) with protection level 200
  • Complete range of protection level configurations available (600, 400, 300, and 200) to choose from based on the classification of your data
    • USB 3.0 is available in 100 and 600 configurations
      media-CAPS-logo.png 

 

Download Data Sheet


media-ViaSat-Logo.png

Eclypt Nano

media-eclypt-nano.png

The Eclypt Nano encrypted portable flash drive has been accredited by government organisations around the world to protect data with advanced hardware-based security and rugged, waterproof construction. In the event of theft, loss, or attack, this portable flash drive ensures that your data is completely protected and secure.

Key Features

  • Military-grade rugged, waterproof construction is designed to meet MIL-STD 810G standard
  • Complete range of CAPS approved protection level configurations available (600, 400, 300 and 200) to choose from based on the security level of your data
  • Ready for PC-on-a-stick applications
  • SLC Memory for increased performance, reliability and longevity
  • USB Plug & Play connectivity: no pre-loaded drivers required with protection level 200
  • Encrypts and decrypts your data immediately and invisibly with no noticeable effects on the computer’s performance
  • Unique tamper-proof and tamper-evident construction
  • Data is secure even if your unit is stolen
  • Requires no specialist IT knowledge
  • Up to 128 user accounts per drive
  • Multiple user profiles—3-tier management system
  • Lifetime key (user-defined on Nano 200)
  • Windows/Mac OS X/Linux based software provides easy to use management and authentication functionality; independent of operating system, service packs and software
  • Supports imaging, ghosting, partitioning, diagnostic and PC-on-a-stick applications
  • Non-volatile keys stored within tamper proof device, protected by AES-256 keywrap
    media-CAPS-logo.png 

 

Download Data Sheet


media-sdms_logo.jpg

SDMS AES LOCK Encrypted USB Stick MK III

The SDMS MK III encrypted USB pen drives incorporate AES 256 hardware encryption (CBC) and are colour coded and serialised for audit purposes.

General Specification

  • Transfer rates of 20MB/s with Ciphered Read/writes
  • Capacities of 4GB – 64GB
  • Full disk hardware encrypted data partition only accessible after authentication
  • Colour coded housing to meet protective marking specifications
  • Read Only CDROM Partition containing authentication application
  • Operating Temperature 0-70 degrees C 
  • Driverless Operation which does not require administrator rights
  • Hardware based Continuous DMA (Direct Memory Access) Transfer
  • Password failure count to prevent brute force attack
  • System tray Icon for Device Status/Control
  • Bespoke internal ID for use with connectivity control software
  • DIPCOG approved
  • USB 2.0 with USB 1.1 Backward compatibility
  • Compatible with Windows 2000 SP3/4, XP, Vista, Windows 7, Windows 8 and Windows 10. Mac OSX

 

Key Features:

  • UK Design and Manufacture
  • Shock, Water and Debris Resistant Encapsulation
  • Robust Metal Casing
  • Coloured Rugged Rubber Sleeve
  • Etched with Individual Serial Number
  • Audit Trail

 

Download Data Sheet


media-sdms_logo.jpg

SDMS AES LOCK Encrypted USB Stick MK III - Isolator Equipped

Isolator function is designed to prevent connection to non approved computers. Working with third party port control the Isolator extends the secure boundary of your system, introducing a significant additional barrier to protect sensitive data.

The isolator application was developed so that system specific USBs could not be accessed outside the controlled/approved network.

General Specification

  • Transfer rates of 20MB/s with Ciphered Read/writes
  • Capacities of 4GB – 64GB
  • Full disk hardware encrypted data partition only accessible after authentication
  • Colour coded housing to meet protective marking specifications
  • Read Only CDROM Partition containing authentication application
  • Operating Temperature 0-70 degrees C
  • Driverless Operation which does not require administrator rights
  • Hardware based Continuous DMA (Direct Memory Access) Transfer
  • Password failure count to prevent brute force attack
  • System tray Icon for Device Status/Control
  • Bespoke internal ID for use with connectivity control software
  • DIPCOG approved
  • USB 2.0 with USB 1.1 Backward compatibility
  • Compatible with Windows 2000 SP3/4, XP, Vista, Windows 7, Windows 8 and Windows 10. Mac OSX

 

Key Features:

  • UK Design and Manufacture
  • Shock, Water and Debris Resistant Encapsulation
  • Robust Metal Casing
  • Coloured Rugged Rubber Sleeve
  • Etched with Individual Serial Number
  • Audit Trail

 

Download Data Sheet


media-sdms_logo.jpg

SDMS Secure Drive 256 USB3.0

General Specification

  • Host (I/O) Ports: (1) USB 3.0: up to 5 Gbps
  • Drive types supported: SATA 2.5″ HDD to 2TB or SSD up to 1TB capacity
  • Encryption: Advanced Encryption Standard (AES) 256-bit, Hardware based encryption
  • AES Encryption Key: AES Encryption Key is stored apart from unit so data is protected if unit is lost or stolen
  • Whole Disk Encryption: Encrypts entire HDD – including boot sector, file allocation table, OS, temp and swap files
  • Encryption Engine: Performs Self-test to check for problems
  • Dimensions: 5.20″ x 3.15″ x 0.83″ (132mm x 80mm x 21mm)
  • Compliancy: FCC, CE, RoHS

 

Download Data Sheet


Warning: imagejpeg(): Unable to open 'C:\inetpub\Akhter2012/files/cache/c2fab5143847d225156405d0edca3041.jpg' for writing: Permission denied in C:\inetpub\Akhter2012\concrete\helpers\image.php on line 172 Warning: imagejpeg(): Unable to open 'C:\inetpub\Akhter2012/files/cache/77b11caff5456b47cb08719acb460196.jpg' for writing: Permission denied in C:\inetpub\Akhter2012\concrete\helpers\image.php on line 172 Warning: imagepng(): Unable to open 'C:\inetpub\Akhter2012/files/cache/c12c1f7993cc1d3f43973bd9ccb3db59.png' for writing: Permission denied in C:\inetpub\Akhter2012\concrete\helpers\image.php on line 175 Warning: imagepng(): Unable to open 'C:\inetpub\Akhter2012/files/cache/8eaeae0e71e4a9fd1f538abba021cb15.png' for writing: Permission denied in C:\inetpub\Akhter2012\concrete\helpers\image.php on line 175 Warning: imagepng(): Unable to open 'C:\inetpub\Akhter2012/files/cache/60a9088b8faeaca2bbaa7bfae594bc46.png' for writing: Permission denied in C:\inetpub\Akhter2012\concrete\helpers\image.php on line 175

ISTORAGE_LOGO_220.png

 

 

What is datAshur Pro?


prodtitle-logo-datAshurPro.pngThe iStorage datAshur Pro is the world’s most secure, easy to use and affordable USB 3.0 flash drive, employing PIN code access with military grade XTS-AES 256-bit hardware encryption. The datAshur Pro incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port.

datAshur-Pro.jpgAll data transferred to the datAshur Pro is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access even if your datAshur Pro is lost or stolen. The datAshur Pro automatically locks when unplugged from the host computer or power to the USB port is turned off and can be set to timeout (lock) after a predetermined amount of time.

The datAshur Pro operates straight out of the box, does not require any software or drivers to be installed and is compatible with Windows, Mac, Linux, Chrome, Android, Thin Clients and embedded systems. The datAshur Pro delivers drag and drop encryption, plug and play simplicity and can be used with any software.

datashur-Pro-2-150x173.jpgThe datAshur Pro can be configured with independent User and Admin PINs, making it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN. The datAshur Pro also incorporates a drive reset feature which clears both User and Admin PINs, deletes all data, creates a new randomly generated encryption key and allows the drive to be reused. The datAshur Pro is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required.

datAshur-pro-4-150x173.jpgAs the iStorage datAshur Pro is unlocked via the on-board keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. The datAshur Pro protects your data with a “Brute Force Hack Defence Mechanism”. If both Admin and User PINs have been created and a User enters an incorrect User PIN 10 (ten) consecutive times, the datAshur Pro’s brute force mechanism will trigger and the User PIN will be deleted. All data will remain on the datAshur Pro and can only be accessed by the Admin entering the correct Admin PIN. If Admin enters an incorrect Admin PIN 10 (ten) consecutive times, then both the User and Admin PINs, the encryption key and all data will be deleted and lost forever The datAshur Pro will then revert back to factory default settings and will need to be formatted before it can be reused.

The datAshur Pro is an investment that will last for years. Its rugged, extruded aluminium, water proof casing protects the drive against physical damage. The internal drive components are also sealed with a tamper proof coating.

How does datAshur Pro work?

step-1-datAshur-Pro-300x225.png Step 1: Enter your PIN step-2-plug-and-play-datAshur-Pro-1-300x225.png Step 2: Plug & Play step-3-plug_in-datAshur-Pro-300x225.png Step 3: Unplug to automatically lock


Why choose datAshur Pro?

Did you know that millions of flash drives are lost or stolen every year and this figure is rising? Have you ever considered the impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it.

Information Commissioner's Office (ICO)

The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB flash drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.

General Data Protection Regulation (GDPR)

The European Union will soon have the power to fine companies €20 million or 4% of their annual turnover if they are found to be in breach of the new General Data Protection Regulation (GDPR). The forthcoming legislation compels anyone who holds data on EU Citizens to implement adequate security measures to protect data from loss or theft.

Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage datAshur Pro can protect you against all of this.

What is the difference between software and hardware encryption?


Software encryption:

  • Complex passwords can be cracked easily and quickly with a Brute Force Attack
  • Simple password cracking software is readily available on the internet, often free of charge
  • Software encryption is vulnerable to key loggers – where every key pressed is logged in either a software or hardware key logger
  • Software encryption can be corrupted by viruses
  • Software encryption is much slower when compared to hardware encryption
  • Software encryption needs to be installed on each computer that the external storage device is used on
  • Software encryption shares computers resources to encrypt data with other programs on the computer, making it only as safe as your computer.

 

Hardware encryption:

  • The datAshur Pro cannot be brute force attacked
  • The datAshur Pro is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard
  • The datAshur Pro does not require any software and can be used on any Windows, Mac, Linux, Chrome, Android, Thin Clients and Embedded Systems.
  • Encryption is performed in real-time thus there is no speed degradation
  • No software or drivers are required

 

Key Features

  • USB 3.0 Flash Drive
  • Capacities up to 64GB*
  • FIPS PUB 197 certified
  • IP57 certified – water/dust resistant
  • Bootable drive
  • AES 256- bit hardware encryption – no software required
  • OS & Platform independent
  • FIPS 140-2 Level3 / CESG CPA / NLNCSA – certifications pending

 

Download  datAshur Pro Datasheet

big_cert_logos_citrix_datashur_pro-cropped.png

Warning: imagejpeg(): Unable to open 'C:\inetpub\Akhter2012/files/cache/eae1d25278c6fa32c08258789f00004c.jpg' for writing: Permission denied in C:\inetpub\Akhter2012\concrete\helpers\image.php on line 172 Warning: imagejpeg(): Unable to open 'C:\inetpub\Akhter2012/files/cache/1142dca0bcc57c7ca877c3e42cda720d.jpg' for writing: Permission denied in C:\inetpub\Akhter2012\concrete\helpers\image.php on line 172

ISTORAGE_LOGO_220.png

 

What is diskAshur Pro?

Portable encrypted USB 3.0 Solid State Drive with ultra-secure PIN Access
Looking for the highest level of security for your data while utilising the fastest USB 3.0 speeds?
Look no further than the iStorage diskAshur Pro SSD, certified and tested to NIST FIPS 140-2 Level 2 requirements(certprodtitle-logo-diskAshurPRO.pngificate no.1970). Sporting an easy-to-use keypad design that is impervious to dust and grit, a software free setup and operation, the diskAshur Pro SSD enables you to access the drive simply and easily with your own unique PIN and with a super-fast integrated USB 3.0 cable, you can access your data faster than ever before!


FIPS 140-2 Level 2 Certified


diskAshur-Pro.jpgThe iStorage diskAshur Pro certification is the cryptography standard required by the US federal government for protection of sensitive data. It covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity.

Military Grade Encryption


diskashur-pro-2-150x173.jpgFeaturing XTS-AES 256-bit hardware encryption, the diskAshur Pro seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.

Software Free Design


diskashur-Pro-3-150x173.jpgWith no admin rights to contend with the diskAshur Pro is a breeze to implement: Setup takes just minutes. With no software installation required for setup or operation and the ability to run on any platform, the diskAshur Pro provides stress free deployment in corporate environments. Its Administrator feature allows enrolment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool.

Data at Rest Protection


diskashur-pro-4-150x173.jpgAll data, PINs, and encryption keys are always encrypted while at rest.

Drive Reset Feature


diskashur-pro-watersplash-150x173.jpgThe diskAshur Pro employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and








Key Features

  • USB 3.0 Portable Hard Drive
  • Capacities up to 2TB*
  • FIPS 140-2 Level 2 certified
  • XTS-AES 256-bit hardware encryption – no software required
  • OS & Platform independent

 

Download diskAshur Pro Datasheet

big_cert_logos_diskashur_pro-1-cropped.png