datAshur Personal2

Capacities: 8/16/32/64GB

All data transferred to the datAshur Personal2 is encrypted in real-time with the built in hardware encryption engine

 

All data transferred to the datAshur Personal2 is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access even if your datAshur Personal2 is lost or stolen. The datAshur Personal2 automatically locks when unplugged from the host computer or power to the USB port is turned off and can be set to timeout (lock) after a predetermined amount of time.

The datAshur Personal2 operates straight out of the box, does not require any software or drivers to be installed and is compatible with Windows, Mac, Linux, Chrome, Android, Thin Clients and embedded systems. The datAshur Personal2 delivers drag and drop encryption, plug and play simplicity and can be used with any software.
The datAshur Personal2 can be configured with independent User and Admin PINs, making it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN. The datAshur Personal2 also incorporates a drive reset feature which clears both User and Admin PINs, deletes all data, creates a new randomly generated encryption key and allows the drive to be reused. The datAshur Personal2 is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required.
As the iStorage datAshur Personal2 is unlocked via the on-board keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. The datAshur Personal2 protects your data with a “Brute Force Hack Defence Mechanism”. If both Admin and User PINs have been created and a User enters an incorrect User PIN 10 (ten) consecutive times, the datAshur Personal2's brute force mechanism will trigger and the User PIN will be deleted. All data will remain on the datAshur Personal2 and can only be accessed by the Admin entering the correct Admin PIN. If Admin enters an incorrect Admin PIN 10 (ten) consecutive times, then both the User and Admin PINs, the encryption key and all data will be deleted and lost forever The datAshur Personal2 will then revert back to factory default settings and will need to be formatted before it can be reused.
The datAshur Personal2 is an investment that will last for years.

 

Why choose datAshur Personal2?

Did you know that millions of flash drives are lost or stolen every year and this figure is rising? Have you ever considered the impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it.
Information Commissioner's Office (ICO)
The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB flash drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.
General Data Protection Regulation (GDPR)
The European Union will soon have the power to fine companies €20 million or 4% of their annual turnover if they are found to be in breach of the new General Data Protection Regulation (GDPR). The forthcoming legislation compels anyone who holds data on EU Citizens to implement adequate security measures to protect data from loss or theft.
Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage datAshur Personal2 can protect you against all of this.

What is the difference between software and hardware encryption?

Software encryption:

  • Complex passwords can be cracked easily and quickly with a Brute Force Attack
  • Simple password cracking software is readily available on the internet, often free of charge
  • Software encryption is vulnerable to key loggers – where every key pressed is logged in either a software or hardware key logger
  • Software encryption can be corrupted by viruses
  • Software encryption is much slower when compared to hardware encryption
  • Software encryption needs to be installed on each computer that the external storage device is used on
  • Software encryption shares computers resources to encrypt data with other programs on the computer, making it only as safe as your computer.

Hardware encryption:

  • The datAshur Personal2 cannot be brute force attacked
  • The datAshur Personal2 is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard
  • The datAshur Personal2 does not require any software and can be used on any Windows, Mac, Linux, Chrome, Android, Thin Clients and Embedded Systems.
  • Encryption is performed in real-time thus there is no speed degradation
  • No software or drivers are required

datAshur Personal2 DatasheetdatAshur Personal2 Manual

Interface USB 3.0
Capacity 8GB, 16GB, 32GB & 64GB*
Speed Up to 116 MB per second read. Up to 43MB per second write.
Dimensions (drive with cap) 83mm x 17.4mm x 8.6mm
Dimensions (drive without cap) 77.5mm x 17.4mm x 8.6mm
Weight 20 grams
Hardware USB 3.0 high speed - compatible with USB 2 & USB 1
Operating System compatibility Windows, Mac, Linux, Chrome, Android, Thin Clients & Embedded Systems
Hardware Data Encryption XTS-AES
Encryption Keys 256-bit Hardware
Hashing 256-bit SHA
Ordering Information iStorage Part Number: IS-FL-DAP3-B-8   |   IS-FL-DAP3-B-16  |   IS-FL-DAP3-B-32  |   IS-FL-DAP3-B-64

Kontakt oss for mer informasjon