<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>iStorage &#8211; BEDRIFTSYSTEMER AS</title>
	<atom:link href="https://insec.no/product-brand/istorage/feed/" rel="self" type="application/rss+xml" />
	<link>https://insec.no</link>
	<description>Secure Storage Solutions</description>
	<lastBuildDate>Fri, 15 Oct 2021 20:06:52 +0000</lastBuildDate>
	<language>nb-NO</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.3.11</generator>

<image>
	<url>https://insec.no/wp-content/uploads/2016/10/cropped-BedriftsystemerLogoIcon2-32x32.png</url>
	<title>iStorage &#8211; BEDRIFTSYSTEMER AS</title>
	<link>https://insec.no</link>
	<width>32</width>
	<height>32</height>
</image> 
                                          	<item>
		<title>Nyhet! datAshur BT</title>
		<link>https://insec.no/produkt/nyhet-datashur-bt/</link>
				<pubDate>Tue, 09 Mar 2021 12:02:03 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">https://insec.no/?post_type=product&#038;p=2606</guid>
				<description><![CDATA[<h1 class="vc_custom_heading">Hardware Encrypted USB Flash Drive</h1>
<h3 class="vc_custom_heading vc_custom_1596201951546">Security with Unparalleled Simplicity</h3>
<strong>Unlocking and handle trough Encrypted Bluetooth protocol between BT Device and Mobile Phone</strong>

<strong>Use as a Personal standalone Device or trough </strong><span style="font-size: 12pt"><b>datAshur BT Remote Management Console</b></span>]]></description>
								<content:encoded><![CDATA[<p><strong>The iStorage datAshur BT is an ultra-secure, hardware encrypted USB 3.2 (Gen 1) flash drive</strong> that is available in capacities from 4GB-128GB¹. datAshur BT offers multi-factor smartphone (Android and iOS) secure wireless user-authentication via an encrypted Bluetooth® channel between the phone and the drive. Users can authenticate the datAshur BT Flash Drive by entering a 7-15-character password or simply use Biometric unlock (Face ID/Facial recognition, Touch ID/Fingerprint and IRIS Scanning) via their smartphone.</p>
<p>The datAshur BT encrypts data in real-time using a FIPS certified AES-XTS 256-bit hardware encryption algorithm. datAshur BT is OS/Host independent and works with all operating systems (Windows, Mac, Linux, Chrome, etc.) and devices supporting USB mass storage (computers, medical devices, TVs, drones, printers, scanners, etc.).</p>
<p>datAshur BT drives can be provisioned and remotely managed via the <a href="https://istorage-uk.com/product/datashur-bt-rmc/">iStorage datAshur BT Remote Management Web Console</a> (optional, annual subscription required).The iStorage datAshur BT is an ultra-secure, hardware encrypted USB 3.2 (Gen 1) flash drive that is available in capacities from 4GB-128GB¹. datAshur BT offers multi-factor smartphone (Android and iOS) secure wireless user-authentication via an encrypted Bluetooth® channel between the phone and the drive. Users can authenticate the datAshur BT Flash Drive by entering a 7-15-character password or simply use Biometric unlock (Face ID/Facial recognition, Touch ID/Fingerprint and IRIS Scanning) via their smartphone.<br />
The datAshur BT encrypts data in real-time using a FIPS certified AES-XTS 256-bit hardware encryption algorithm. datAshur BT is OS/Host independent and works with all operating systems (Windows, Mac, Linux, Chrome, etc.) and devices supporting USB mass storage (computers, medical devices, TVs, drones, printers, scanners, etc.).<br />
datAshur BT drives can be provisioned and remotely managed via the iStorage datAshur BT Remote Management Web Console (optional, annual subscription required).</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt"><strong>Secure confidential data with the datAshur BT USB flash drive</strong></span></p>
<ul>
<li>All data stored on the drive is encrypted in real-time using military grade AES-XTS 256-bit hardware encryption (FIPS compliant)</li>
<li>FIPS 140-2 Level 3 compliant design and technology<br />
– All critical components are covered by a layer of super tough epoxy resin</li>
<li>Drive reset – once performed, the password, encryption key and data will be lost forever. The datAshur BT will revert to factory default settings for redeployment</li>
<li>Authenticate using a 7-15-character password or Biometric unlock (Face ID/Facial recognition, Touch ID/Fingerprint and IRIS scanning). User app supports        12 languages2</li>
<li>Automatic antivirus – iStorage DriveSecurity® Powered by ESET free 1-year license included</li>
<li>USB 3.2 Gen 1 data transfer speeds – backward compatible with older USB interfaces</li>
<li>Access to the drive is protected using Bluetooth authentication (FIPS compliant) via any smartphone/tablet (iOS/Android) or Apple Watch</li>
<li>Available capacities ranging from 4GB to 128GB</li>
<li>Supports 2-Factor Authentication via SMS</li>
<li>IP57 Certified – Dust &amp; Water resistant</li>
<li>Remote management ready via the iStorage Remote Management Console (optional). datAshur BT drives can be provisioned and deployed as Managed drives within minutes</li>
<li>Brute Force protection</li>
</ul>
<p><span style="font-size: 14pt"><strong>Manage users and devices with the datAshur BT Remote Management Console</strong></span></p>
<p>datAshur BT drives can be provisioned and deployed within minutes to be remotely managed via the iStorage Remote Management Web Console.<br />
Remote Management enables IT Administrators to remotely wipe or disable user access, restrict the time and locations that datAshur BT USB flash drives can be used, remotely unlock and change user password, view user activity logs as well as a host of additional features.<br />
Remote Management requires a periodic subscription2 and can be deployed within minutes (30-day Free Trial available, contact iStorage for further details).</p>
<p><a href="https://istorage-uk.com/product/datashur-bt-rmc/">Click here to learn more about the iStorage datAshur BT Remote Management Web Console</a></p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt"><strong>datAshur BT &#8211; Personal App</strong></span></p>
<p>Download and install the datAshur BT Personal App if you will be using the datAshur BT drive without Remote Management.<br />
Main features</p>
<p>• Authenticate using a 7-15-character password or Biometric unlock (Face ID/Facial recognition, Touch ID/Fingerprint and IRIS scanning). User app supports 12 languages.2<br />
• Supports 2-Factor Authentication via SMS<br />
• Remote wipe – The datAshur BT hardware encrypted USB flash drive can be remotely wiped in the event the drive is lost or stolen.<br />
• Step away auto-lock – locks the drive when the iOS/Android device is moved approximately 5m away from the drive for longer than 5 seconds.<br />
• Inactivity Auto lock – protects against unauthorised access if the datAshur BT USB flash drive is unlocked and inactive for a pre-determined period of time (between 1–60 minutes).<br />
• Read Only (Write Protect) feature<br />
• Password recovery, and more.</p>
<p><strong>Download it for free</strong></p>
<p>Note: This app requires the purchase of a datAshur BT Secure USB flash drive.</p>
]]></content:encoded>
										</item>
		<item>
		<title>NYHET ! iStorage datAshur BT Remote Management</title>
		<link>https://insec.no/produkt/nyhet-istorage-datashur-bt-remote-management/</link>
				<pubDate>Thu, 28 Jan 2021 09:53:42 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">https://insec.no/?post_type=product&#038;p=2585</guid>
				<description><![CDATA[<div class="vc_row wpb_row vc_row-fluid vc_custom_1593512809761 vc_row-o-equal-height vc_row-o-content-middle vc_row-flex">
<div class="wpb_column vc_column_container vc_col-sm-10">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<h2 class="vc_custom_heading vc_custom_1596435772156">Take complete control of all iStorage datAshur BT drives with the iStorage datAshur BT Remote Management Web Console</h2>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid vc_custom_1593520592023 vc_row-o-equal-height vc_row-o-content-middle vc_row-flex">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner vc_custom_1593767436946">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element vc_custom_1597418465096">
<div class="wpb_wrapper">

The iStorage datAshur BT Remote Management (RM) Web Console provides IT Administrators full access control of all datAshur BT USB flash drives deployed within the organisation, empowering the Administrator with a simple and effective solution to cybersecurity and data protection threats that are being increasingly faced by businesses and government organisations alike.

</div>
</div>
</div>
</div>
</div>
</div>]]></description>
								<content:encoded><![CDATA[<h2 class="vc_custom_heading vc_custom_1596435772156"><img class="alignleft" src="https://istorage-uk.com/wp-content/uploads/2020/06/datAshur-BT-RM_icon-180x180.png" alt="datAshur BT RM_icon" /></h2>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3 class="vc_custom_heading vc_custom_1593767813296">Browser-based</h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p style="text-align: left"><img class="alignleft" src="https://istorage-uk.com/wp-content/uploads/2020/07/BT-RM-browser-1024x661.jpg" width="417" height="269" /></p>
</div>
</div>
<h3 class="vc_custom_heading vc_custom_1593767813296"></h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p>&nbsp;</p>
<p>iStorage datAshur BT RM is a browser-based Web Manager that offers remote access management with full audit trail as a Software as a Service (SaaS) solution, using secure global cloud services that comply with GDPR, HIPAA and many other regulatory requirements. Specifically, it offers features such as the ability to remotely wipe or disable user access, restrict the time and locations that datAshur BT USB flash drives can be used, remotely unlock and change user password, view user activity logs as well as a host of additional features.</p>
</div>
</div>
</div>
<h3></h3>
<h3></h3>
<h3></h3>
<h3 class="vc_custom_heading vc_custom_1593767833676">Provision drives and enforce user policies</h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p>iStorage datAshur BT RM requires IT Administrators to use the iStorage datAshur BT Admin mobile app to provision datAshur BT USB flash drives and enforce user policies (iOS, Android). All authorised users of the Managed drives are required to use the iStorage datAshur BT Managed mobile app (iOS, Android) to authenticate themselves and the drive. Access rights are updatable wirelessly – anywhere and anytime via a FIPS 140-2 Level 3 compliant secure wireless connection between the mobile phone and the datAshur BT USB flash drive.</p>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid vc_custom_1593772864745">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<h2></h2>
<h2 class="vc_custom_heading">Benefits and Differentiators (vs competing RM solutions):</h2>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-flex">
<div class="wpb_column vc_column_container vc_col-sm-6">
<div class="vc_column-inner vc_custom_1593772663326">
<div class="wpb_wrapper">
<div class="vc_row wpb_row vc_inner vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex">
<div class="wpb_column vc_column_container vc_col-sm-9">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<p class="vc_custom_heading">Host/OS independent – datAshur BT drives work across any computer, printer, scanner, thin-client, embedded equipment, medical device and military device</p>
</div>
</div>
</div>
</div>
<div class="wpb_column vc_column_container vc_col-sm-9">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<p class="vc_custom_heading">No USB communication when drive is locked &#8211; you cannot hack what you don’t see</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="wpb_column vc_column_container vc_col-sm-6">
<div class="vc_column-inner vc_custom_1593772687910">
<div class="wpb_wrapper">
<div class="vc_row wpb_row vc_inner vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex">
<div class="wpb_column vc_column_container vc_col-sm-9">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<p class="vc_custom_heading">No software application is required to run on the host (e.g. computer, printer, etc) to control access and authenticate the user</p>
<p class="vc_custom_heading">Geo-fencing is based on the precision of GPS components used in mobile devices, which is far more accurate than remote management systems that rely on an IP address-based methods and tools.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p>&nbsp;</p>
</div>
<h3 class="vc_custom_heading">How access rights are updated wirelessly</h3>
<p>&nbsp;</p>
<table style="border-collapse: collapse;width: 65.005%">
<tbody>
<tr>
<td style="width: 15.8866%;text-align: center"><span style="font-family: 'arial black', sans-serif">STEP 1</span></td>
<td style="width: 15.9856%;text-align: center"><span style="font-family: 'arial black', sans-serif">Step 2</span></td>
<td style="width: 16.0352%;text-align: center"><span style="font-family: 'arial black', sans-serif">Step 3</span></td>
<td style="width: 17.1248%;text-align: center"><span style="font-family: 'arial black', sans-serif">Step 4</span></td>
</tr>
<tr>
<td style="width: 15.8866%"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Step-01-300x257.png" /></td>
<td style="width: 15.9856%"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Step-02-300x257.png" /></td>
<td style="width: 16.0352%"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Step-03-300x257.png" /></td>
<td style="width: 17.1248%"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Step-04-1-300x257.png" /></td>
</tr>
<tr>
<td style="width: 15.8866%">Administrator executes a command on the iStorage datAshur BT Remote Management Web Console.</td>
<td style="width: 15.9856%">The command is sent as an encrypted signal from the Remote Management Web Console to the <strong>datAshur BT Managed</strong> app.</td>
<td style="width: 16.0352%">User enters credentials into the <strong>datAshur BT Managed</strong> app to seamlessly authenticate via the server and then unlock the drive via the app.</td>
<td style="width: 17.1248%"><strong>datAshur BT Managed</strong> app receives the administrator command and transmits it to the drive via a FIPS compliant encrypted Bluetooth channel.</td>
</tr>
</tbody>
</table>
</div>
<table style="border-collapse: collapse;width: 65.005%;height: 700px">
<tbody>
<tr style="height: 61px">
<td style="width: 15.8866%;height: 61px;text-align: right"><strong><span style="font-size: 24pt">Main</span></strong></td>
<td style="width: 15.9856%;height: 61px;text-align: left"><strong><span style="font-size: 24pt"> Features</span></strong></td>
<td style="width: 16.0352%;text-align: center;height: 61px"></td>
<td style="width: 17.1248%;text-align: center;height: 61px"></td>
</tr>
<tr>
<td style="width: 15.8866%;text-align: center;vertical-align: top"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Feature_Temporarily-disable-or-reset-drive-1024x720.jpg" /></p>
<h3 class="vc_custom_heading vc_custom_1595233102170"></h3>
</td>
<td style="width: 15.9856%;text-align: center;vertical-align: top">
<h3 class="vc_custom_heading vc_custom_1593509035874"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Feature_User-Location-1024x720.jpg" /></h3>
</td>
<td style="width: 16.0352%;text-align: center;vertical-align: top">
<h3 class="vc_custom_heading vc_custom_1593511942347"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Feature_Login-attempts-1024x720.jpg" /></h3>
</td>
<td style="width: 17.1248%;text-align: center;vertical-align: top">
<h3 class="vc_custom_heading vc_custom_1593513044789"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Feature_Remote-Unlock-1024x720.jpg" /></h3>
</td>
</tr>
<tr style="height: 200px">
<td style="width: 15.8866%;text-align: left;vertical-align: top;height: 200px">
<h3 class="vc_custom_heading vc_custom_1595233102170">Temporarily disable or reset users datAshur BT</h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p>– <em>in the event of suspicious activity or an employee leaving the organisation without returning their datAshur BT.</em></p>
</div>
</div>
</td>
<td style="width: 15.9856%;text-align: left;vertical-align: top;height: 200px">
<h3 class="vc_custom_heading vc_custom_1593509035874">Display user&#8217;s location</h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p>– <em>you can view the location of datAshur BT drives via an on-screen map that uses precision GPS rather than an IP address.</em></p>
</div>
</div>
</td>
<td style="width: 16.0352%;text-align: left;vertical-align: top;height: 200px">
<h3 class="vc_custom_heading vc_custom_1593511942347">User login attempts</h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p>– <em>each login is monitored and saved, displaying drive location, date and time each user used their datAshur BT, as well as showing if the login attempt was successful or not. </em></p>
</div>
</div>
</td>
<td style="width: 17.1248%;text-align: left;vertical-align: top;height: 200px">
<h3 class="vc_custom_heading vc_custom_1593513044789">Remote unlock</h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><em>– IT Administrators can remotely unlock a user’s drive using the Admin credentials. This is a very useful feature if the user has forgotten their password.</em></p>
</div>
</div>
</td>
</tr>
<tr>
<td style="width: 15.8866%;text-align: center;vertical-align: top"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Feature_Geo-and-Timefencing-1024x720.jpg" /></p>
<h3 class="vc_custom_heading vc_custom_1593511851795"></h3>
</td>
<td style="width: 15.9856%;text-align: center;vertical-align: top">
<h3 class="vc_custom_heading vc_custom_1593512074392"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Feature_Two-Factor-Authentication-1024x720.jpg" /></h3>
</td>
<td style="width: 16.0352%;text-align: center;vertical-align: top">
<h3 class="vc_custom_heading vc_custom_1593513118998"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Feature_Remote-Wipe-1024x720.jpg" /></h3>
</td>
<td style="width: 17.1248%;text-align: center;vertical-align: top">
<h3 class="vc_custom_heading vc_custom_1593513237221"><img src="https://istorage-uk.com/wp-content/uploads/2020/07/Feature_Change-password-1024x720.jpg" /></h3>
</td>
</tr>
<tr style="height: 348px">
<td style="width: 15.8866%;text-align: left;vertical-align: top;height: 348px">
<h3 class="vc_custom_heading vc_custom_1593511851795">Geofencing &amp; Time fencing</h3>
<div class="wpb_text_column wpb_content_element vc_custom_1597418761795">
<div class="wpb_wrapper">
<p><em>– </em><em>restrict the time and location of where and when users can use their datAshur BT. Admins can limit user access by Continent, Country, City, State or postal/ZIP code, start/end time (any time zone) and can select the radius in KM/MI away from the chosen location, (down to 2 meters). Geofencing is based on the precision of the GPS chip used in users’ mobile devices, which is extremely accurate.</em></p>
</div>
</div>
</td>
<td style="width: 15.9856%;text-align: left;vertical-align: top;height: 348px">
<h3 class="vc_custom_heading vc_custom_1593512074392">Two Factor Authentication</h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p>– <em>to unlock a datAshur BT USB flash drive, each user must have their own <strong>username and password</strong> to authenticate themselves as authorised users of the company Remote Management account, once credentials are confirmed, users can unlock their datAshur BT using a <strong>7-15-character password</strong> or Biometric unlock (Face ID/Facial recognition, Touch ID/Fingerprint and IRIS scanning).  User app supports 12 languages<sup>2</sup></em></p>
</div>
</div>
</td>
<td style="width: 16.0352%;text-align: left;vertical-align: top;height: 348px">
<h3 class="vc_custom_heading vc_custom_1593513118998">Remote wipe</h3>
<div class="wpb_text_column wpb_content_element vc_custom_1597418890446">
<div class="wpb_wrapper">
<p>– <em>remotely wipe a user’s device, which will reset the datAshur BT back to factory default settings (the drive performs a “safe erase” of all data and user credentials). This is an essential feature if an employee leaves the organisation and still has possession of the datAshur BT USB flash drive or if the drive is lost or stolen. By performing a Remote Wipe operation, all attempts to gain access to the data stored on the drive are blocked.</em></p>
</div>
</div>
</td>
<td style="width: 17.1248%;text-align: left;vertical-align: top;height: 348px">
<h3 class="vc_custom_heading vc_custom_1593513237221">Change password</h3>
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><em>– IT Administrators can remotely reset a user’s password without losing any data stored on the drive.</em></p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
</div>
<div class="wpb_column vc_column_container vc_col-sm-9"></div>
<div></div>
<div></div>
<div></div>
<div>
<table style="border-collapse: collapse;width: 65.005%;height: 700px">
<tbody>
<tr>
<td style="width: 31.8722%;text-align: center;vertical-align: middle" colspan="2"><span style="font-size: 12pt"><strong>Control your BT Devices using APPS on your SmartPhone (Android / iPhone)</strong></span></td>
<td style="width: 10.7801%;text-align: left;vertical-align: top">
<h3 class="vc_custom_heading vc_custom_1593511942347"></h3>
</td>
<td style="width: 22.3799%;text-align: left;vertical-align: top">
<div class="wpb_single_image wpb_content_element vc_align_left vc_custom_1593094402048">
<div class="vc_single_image-wrapper vc_box_border_grey"></div>
</div>
</td>
</tr>
<tr style="height: 200px">
<td style="width: 10.7838%;text-align: left;vertical-align: top;height: 200px">
<h3 class="vc_custom_heading vc_custom_1595233102170"><img class="" src="https://istorage-uk.com/wp-content/uploads/2020/06/BT_managed_iphone@2x-432x772.png" alt="BT_managed_iphone@2x" width="224" height="401" /></h3>
</td>
<td style="width: 21.0884%;text-align: left;vertical-align: top;height: 200px">
<div class="wpb_single_image wpb_content_element vc_align_left vc_custom_1593093913528">
<figure class="wpb_wrapper vc_figure">
<div class="vc_single_image-wrapper vc_box_border_grey"><img class="vc_single_image-img " title="BT_managed_app icon@2x" src="https://istorage-uk.com/wp-content/uploads/2020/06/BT_managed_app-icon@2x-110x110.png" alt="BT_managed_app icon@2x" width="110" height="110" /></div>
</figure>
</div>
<h3 class="vc_custom_heading vc_custom_1593094006450">datAshur BT Managed App</h3>
<div class="wpb_text_column wpb_content_element vc_custom_1596203672578">
<div class="wpb_wrapper">
<p>Download and install the datAshur BT Managed App if the datAshur BT drive will be managed using the iStorage datAshur BT Remote Management Web Console.</p>
<p><strong>Main features:</strong></p>
<p>• * Lock and unlock the iStorage datAshur BT USB flash drive using a 7-15-character password or Biometric unlock (Face ID/Facial recognition, Touch ID/Fingerprint and IRIS scanning)</p>
<p>• Inactivity Auto lock – protects against unauthorised access if the datAshur BT USB flash drive is unlocked and inactive for a pre-determined period of time (between 1–60 minutes)</p>
<p>• *Step away auto lock – locks the drive when the iOS/Android device is moved approximately 5m away from the drive for longer than 5 seconds</p>
<p>• *Read only (Write protect) feature</p>
<p>• *Remember password – unlock the datAshur BT USB flash drive without entering a password</p>
<p><em>*The above features may be enabled/disabled by the Administrator when provisioning datAshur BT USB flash drives via the datAshur BT Admin APP.</em></p>
<p>&nbsp;</p>
<p><em>Subscription for datAshur BT Remote Management (via iStorage) is required.</em></p>
</div>
</div>
</td>
<td style="width: 10.7801%;text-align: left;vertical-align: top;height: 200px">
<h3 class="vc_custom_heading vc_custom_1593511942347"><img class="" src="https://istorage-uk.com/wp-content/uploads/2020/06/BT_admin_iphone@2x-432x772.png" alt="BT_admin_iphone@2x" width="243" height="434" /></h3>
</td>
<td style="width: 22.3799%;text-align: left;vertical-align: top;height: 200px">
<div class="wpb_single_image wpb_content_element vc_align_left vc_custom_1593094402048">
<figure class="wpb_wrapper vc_figure">
<div class="vc_single_image-wrapper vc_box_border_grey"><img class="vc_single_image-img " title="BT_admin_app icon@2x" src="https://istorage-uk.com/wp-content/uploads/2020/06/BT_admin_app-icon@2x-110x110.png" alt="BT_admin_app icon@2x" width="110" height="110" /></div>
</figure>
</div>
<h3 class="vc_custom_heading vc_custom_1593094473939">datAshur BT Admin App</h3>
<div class="wpb_text_column wpb_content_element vc_custom_1597421516305">
<div class="wpb_wrapper">
<p>Download and install the datAshur BT Admin App to provision datAshur BT devices and enforce user policies.</p>
<p><strong>Main features:</strong></p>
<p>• *Enable Remote Management (RM Enforced) – this is switched on in the datAshur BT Admin App by default and must remain on to enable Remote Management provisioning. When switched off, a drive can be provisioned to work with the non-managed APP (datAshur BT Personal APP)</p>
<p>• Set user’s password – IT Administrators can change the datAshur BT flash drive default password prior to deployment. (Passwords must be 7-15 characters in length)</p>
<p>• *Set Inactivity Auto lock – protects against unauthorised access if the datAshur BT USB flash drive is unlocked and inactive for a pre-determined period of time (between 1–60 minutes)</p>
<p>• *Step away auto lock – locks the drive when the iOS/Android device is moved approximately 5m away from the drive for longer than 5 seconds</p>
<p>• *Set read only – If enabled, the datAshur BT flash drive will be set as Read only (write protect)</p>
<p>• *Remember password – Enables users to set their drives to unlock without entering their drive password</p>
<p>• *Biometric unlock – Enables users to Biometrically unlock their datAshur BT flash drive (Face ID/Facial recognition, Touch ID/Fingerprint and IRIS scanning)</p>
<p><em>*If the above features are enabled by the IT Administrator, users are prohibited from disabling.</em></p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<div class="vc_row wpb_row vc_row-fluid vc_custom_1593772864745">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper"></div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-flex">
<div class="wpb_column vc_column_container vc_col-sm-6">
<div class="vc_column-inner vc_custom_1593772687910">
<div class="wpb_wrapper">
<div class="vc_row wpb_row vc_inner vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex">
<div class="wpb_column vc_column_container vc_col-sm-9">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<h4 class="vc_custom_heading"></h4>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>&nbsp;</p>
<p>The iStorage datAshur BT Remote Management Web Console is compatible with the datAshur BT USB flash drive and requires a periodic subscription<sup>3</sup> which can be added at any time and deployed within minutes <em>(30-Day free trial available, contact iStorage for further details).</em> IT Administrators can track and manage unlimited number of datAshur BT drives.</p>
]]></content:encoded>
										</item>
		<item>
		<title>NYHET! &#8211; iStorage datAshur Pro 2</title>
		<link>https://insec.no/produkt/nyhet-istorage-datashur-pro-2/</link>
				<pubDate>Mon, 02 Sep 2019 17:25:14 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">https://insec.no/?post_type=product&#038;p=2176</guid>
				<description><![CDATA[USB 3.1 Encrypted USB Stick

USB 3.2 Gen 1 SuperSpeed USB

Capacities: 4/8/16/32/64/128/256/512GB
<h4>Performance</h4>
<strong>130MB/sec</strong>         <strong>116MB/sec</strong>
read speed.         write speed.
<ul>
 	<li>Capacities up to 512GB*</li>
 	<li>FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA &#38; NATO Restricted validations (pending Q3 2019)</li>
 	<li>XTS-AES 256-bit hardware encryption – no software required</li>
 	<li>OS &#38; Platform independent</li>
</ul>
&#160;]]></description>
								<content:encoded><![CDATA[<h4>FIPS 140-2 Level 3 compliant Tamper proof &amp; evident design</h4>
<p>All critical components are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components. If breached, the tamper evident design of the datAshur PRO² will provide visible evidence that tampering has occurred.</p>
<h4>Performance</h4>
<p><strong>130MB/sec</strong>         <strong>116MB/sec</strong><br />
read speed.         write speed.<img class="size-medium wp-image-2179 alignright" src="https://insec.no/wp-content/uploads/2019/09/datAshur-PRO2_front-150x300.png" alt="" width="150" height="300" /></p>
<p>&nbsp;</p>
<h2>Available Capacities*</h2>
<div class="cei-feature-capacities-gb-min">
<div class="cei-feature-capacities-gb-wrap">
<div class="cei-feature-capacities-block"></div>
<div class="cei-feature-capacities-block"><strong><span style="font-size: 14pt">4 &#8211; 8 &#8211; 16 -32 &#8211; 64 &#8211; 128 &#8211; 256 &#8211; 512 GB</span></strong></div>
<div></div>
<div class="cei-feature-capacities-block">
<h4>Independent user &amp; admin PIN</h4>
<p>Which makes it perfect for corporate and government deployment. If the user forgets their PIN, the drive can be unlocked by the admin PIN, the admin can then allow the user to set a new PIN.</p>
<h4>Bootable feature</h4>
<p>Install an OS on the datAshur PRO² and boot directly from it.</p>
<h4>OS &amp; platform independent</h4>
<p>No software required.<br />
Works on any device with a USB port!</p>
<p><i>compatible with: MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients, Embedded Systems, Citrix and VMware</i></p>
</div>
<div class="cei-feature-capacities-block">
<h4>On-device Crypto-chip</h4>
<p>Offering 100% real-time military grade AES-XTS 256-bit Hardware Encryption with FIPS PUB 197 validated encryption algorithm</p>
<h4>Uniquely incorporates Common Criteria EAL4+ ready secure microprocessor</h4>
<p>Which offers ultimate security against hackers, detecting and responding to tampering with features such as:</p>
<p>– Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks</p>
<p>– Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors</p>
<p>– Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection</p>
<p>– Secure Memory Management/Access Protection</p>
<div class="cei-brute-force-attempts">
<h4>BRUTE FORCE HACK DEFENCE MECHANISM</h4>
<h4>Intelligently programmed to protect against all forms of brute force attacks.</h4>
<p>If the User PIN is entered incorrectly 10 consecutive times, the User PIN will be deleted and the drive can only be accessed by entering the Admin PIN in order to reset the User PIN. (Admin can change this from the default 10 incorrect PIN entries, to 1-9, for the User only)</p>
<p>If the Admin PIN is entered incorrectly 10 consecutive times, all PINs and the encrypted encryption key will be lost forever.</p>
<p>&nbsp;</p>
</div>
</div>
</div>
<div class="cei-feature-capacities-block"><img class="size-medium wp-image-2178 alignleft" src="https://insec.no/wp-content/uploads/2019/09/datAshur-PRO2-components-1-1-300x275.png" alt="" width="300" height="275" /><strong>1. LED lights<br />
</strong><strong>Red</strong> – standby state<br />
<strong>Green</strong> – User mode<br />
<strong>Blue</strong> – Admin mode<br />
<strong>2. Polymer coated, wear resistant, alphanumeric keypad</strong><br />
<strong>3. Common Criteria EAL4+ ready secure microprocessor</strong><br />
<strong>4. Epoxy coating</strong><br />
<strong>5. Hard anodized and ruggedized extruded aluminium housing</strong><br />
<strong>6. Key button</strong><br />
<strong>7. SHIFT button</strong><br />
<strong>8. Zinc alloy (can be attached to keyring)</strong><br />
<strong>9. Rubber gasket</strong><br />
Making the module waterproof when sleeve is fitted</div>
</div>
<div></div>
<div></div>
<div>
<h4>User PIN enrolment</h4>
<p>The Admin can set a restriction policy for the user PIN. This includes setting the minimum length of the PIN, as well as requiring the input of one or more ‘Special Character’ if needed. The ‘Special Character’ functions as ‘SHIFT ( <img src="https://istorage-uk.com/wp-content/uploads/2019/06/Shift-key-svg-2.png" alt="" width="12" height="17" /> ) + digit’</p>
<h4>One-time User recovery PIN</h4>
<p>Admin configurable, extremely useful in situations where a User has forgotten their PIN, allowing the User to unlock the device and set a new User PIN.</p>
<p>&nbsp;</p>
<div class="col-xs-12 col-sm-12 col-md-6 col-lg-6">
<h4>Device reset feature</h4>
<p>Deletes the encrypted encryption key, all PINs and renders all data as lost forever. The device can then be redeployed which randomly generates a new encrypted encryption key, a process that can be repeated as many times as required.</p>
<h4>Whitelisting on networks</h4>
<p>Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements.</p>
<h4>Self-destruct feature</h4>
<p>Pre-program the datAshur PRO² with a self-destruct PIN, once entered, the encrypted encryption key and all PINs are deleted and all data is rendered as lost forever.</p>
</div>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>NYHET ! CloudAshur</title>
		<link>https://insec.no/produkt/cloudashur/</link>
				<pubDate>Thu, 18 Jul 2019 10:50:02 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">https://insec.no/?post_type=product&#038;p=2110</guid>
				<description><![CDATA[<strong>The future  of cloud data Security - CloudAshur</strong> is the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud. cloudAshur eliminates the security vulnerabilities

that exists with cloud platforms, such as lack of control and unauthorised access. Hackers and vulnerable users. Human error is also prevalent amongs data leakage incidents.

The consequences of a cloud account being  hacked can bring  about theft and leakage of confidential data, leading to potential job losses, adverse publicity, hefty fines and downfall of business.]]></description>
								<content:encoded><![CDATA[<p><strong>ENCRYPT</strong></p>
<p>to ensure the ultimate protection of your data stored in the cloud or on your local PC/MAC or any data storage device</p>
<p><strong>SHARE</strong></p>
<p>Your encrypted data security with authorised users in the cloud as well as email and file transfer services in real-time.</p>
<p><strong>MANAGE</strong></p>
<p>and monitor your cloudAshur device centrally</p>
<p><strong>On-device Crypto-chip</strong></p>
<div class="table-responsive">
<p>Offering 100% real-time military grade AES-XTS or AES-ECB 256-bit Hardware Encryption with FIPS PUB 197 certified USB 3.0 encryption controller.</p>
<p>Uniquely incorporates Common Criteria EAL4+ ready secure microprocessor</p>
<p>Which offers ultimate security against hackers, detecting and responding to tampering with features such as:</p>
<p>&#8211; Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks &#8211; Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors &#8211; Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection &#8211; Secure Memory Management/Access Protection</p>
</div>
<p><strong>Five Factor authentication</strong></p>
<h6><span style="font-size: 12pt">Something you have</span></h6>
<ul>
<li>The cloudAshur hardware security module</li>
</ul>
<h6><span style="font-size: 12pt">Something you know</span></h6>
<ul>
<li>7-15 digit Admin/User configurable PIN</li>
<li>Username and password for the iStorage cloudAshur Windows or macOS client app</li>
<li>Where the data is stored, which cloud provider</li>
<li>Username and password for the cloud account</li>
<li>Username and password for the cloud account.Intelligently programmed to protect against all forms of brute force attacks.If the Admin PIN is entered incorrectly 10 consecutive times, all PINs and the encrypted encryption key will be lost forever.</li>
</ul>
<div class="table-responsive"></div>
<div>
<table style="width: 100%;border-collapse: collapse">
<tbody>
<tr>
<td style="width: 50%"></td>
<td style="width: 50%"></td>
</tr>
<tr>
<td style="width: 50%"></td>
<td style="width: 50%"></td>
</tr>
</tbody>
</table>
</div>
<div></div>
<div></div>
<div><strong>LED lights</strong><br />
<strong>Red</strong> – standby state<br />
<strong>Green</strong> – User mode<img class="size-medium wp-image-2112 alignright" src="https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-300x265.png" alt="" width="300" height="265" srcset="https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-300x265.png 300w, https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-768x678.png 768w, https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-1024x904.png 1024w, https://insec.no/wp-content/uploads/2019/07/cloudAshur-components-600x530.png 600w, https://insec.no/wp-content/uploads/2019/07/cloudAshur-components.png 1403w" sizes="(max-width: 300px) 100vw, 300px" /><br />
<strong>Blue</strong> – Admin mode<br />
<strong>2. Polymer coated, wear resistant, alphanumeric keypad</strong><br />
<strong>3. Common Criteria EAL4+ ready secure microprocessor</strong><br />
<strong>4. Epoxy coating</strong><br />
<strong>5. Hard anodized and ruggedized extruded aluminium housing</strong><br />
<strong>6. Key button</strong><br />
<strong>7. SHIFT button<br />
8. Zinc alloy (can be attached to keyring)<br />
9. Rubber gasket</strong><br />
Making the module waterproof when sleeve is fitted</div>
<p>&nbsp;</p>
<p><strong>FIPS Level 3 compliant tamper proof &amp; evident design</strong></p>
<p>All critical components within the cloudAshur enclosure are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components.</p>
<p>If breached, the cloudAshur modules tamper evident design will provide visible evidence that tampering has occurred.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div class="table-responsive">
<p><strong>One-time User recovery PIN</strong></p>
<p>The Admin can program the cloudAshur with a one-time recovery PIN. This is extremely useful in situations where a User has forgotten the PIN to authenticate the cloudAshur.</p>
<p>This feature allows the User to enter the Recovery PIN and configure a new User PIN.</p>
<p><strong>User PIN enrolment</strong></p>
<p>The Admin can set a restriction policy for the user PIN. This includes setting the minimum length of the PIN, as well as requiring the input of one or more ‘Special Character’ if needed.</p>
<p>The ‘Special Character’ functions as ‘SHIFT</p>
<p>+ digit’</p>
<p><strong>Whitelisting on networks</strong></p>
<p>Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements.</p>
</div>
<p>&nbsp;</p>
]]></content:encoded>
										</item>
		<item>
		<title>iStorage diskAshur Pro 2 SSD</title>
		<link>https://insec.no/produkt/nyhet-istorage-diskashur-pro-2-ssd/</link>
				<pubDate>Thu, 27 Apr 2017 17:23:31 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">http://bedriftssystemer.no/?post_type=product&#038;p=1448</guid>
				<description><![CDATA[USB 3.1 Encrypted Portable SSD
<ul>
 	<li>Capacities: 128/256/512GB - 1/2/4/8TB</li>
 	<li>Designed to be certified to FIPS 140-2 Level 3, NCSC CPA, Common Criteria and NLNCSA</li>
 	<li>XTS-AES 256-bit hardware encryption – no software required</li>
 	<li>OS &#38; Platform independent</li>
 	<li>Employs EDGE* Technology</li>
</ul>
&#160;]]></description>
								<content:encoded><![CDATA[<p><b>What is diskAshur PRO</b><sup><span style="font-size: small"><b>2 </b></span></sup><b>SSD?</b></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
<tr>
<td>An easy to use ultra-secure, PIN authenticated, portable USB 3.1 hard drive with real-time AES 256-bit XTS hardware encryption, software free design, super-fast data transfer speeds and designed to be certified to FIPS 140-2 Level 3, NCSC CPA (Foundation Level), Common Criteria and NLNCSA government accreditations. The diskAshur PRO<sup><span style="font-size: small">2</span></sup>SSD has an easy-to-use keypad design enabling you to securely access the drive with your own unique 7-15 digit PIN and with software free setup and operation, the diskAshur PRO<sup><span style="font-size: small">2</span></sup>SSD is platform/device independent and works across all operating systems including all versions of MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems. In fact, it will work on any device with a USB port! One of the unique and underlying security features of the GDPR compliant diskAshur PRO<sup><span style="font-size: small">2</span></sup>SSD is the dedicated hardware-based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass attacks and more. Unlike other solutions, the diskAshur PRO<sup><span style="font-size: small">2</span></sup>SSD reacts to an automated attack by entering the deadlock frozen state, which renders all such attacks as useless. <b>In plain and simple terms, without the PIN there’s no way in!</b></td>
</tr>
</tbody>
</table>
</div>
<p><strong>**EDGE</strong><sup><span style="font-size: small">TM</span></sup><strong>  (Enhanced Dual Generating Encryption) Technology</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Offering advanced portable data security via built-in FIPS PUB 197 validated AES 256-bit XTS hardware encryption engine. The data encryption key is randomly generated by a Common Criteria EAL4+ ready Random Number Generator and protected by NCSC, FIPS and Common Criteria validated wrapping algorithms. Uniquely featuring a dedicated on-board Common Criteria EAL4+ ready secure microprocessor to enhance security through true random number generation and built-in cryptography. The security component employs physical protection mechanisms to protect itself from any external tamper, bypass laser attacks and fault injections and incorporates active-shield violation technology. More specifically, the secure microprocessor reacts to all forms of automated hacking attempts by entering the deadlock frozen state where the device can only restart through a ‘Power On’ reset procedure (i.e. power off/power on). The security lock feature protects the device against any unauthorised firmware modifications from the host side (fully protected against BadUSB). The diskAshur PRO<sup><span style="font-size: small">2</span></sup>SSD uniquely incorporates a secure microprocessor providing secure algorithms to encrypt both the data and the encryption key, giving you confidence that your data is protected to the highest standards at any given time.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>FIPS PUB 197 Validated Encryption Algorithm</strong></p>
<div class="table-responsive">
<p>Employing AES 256-bit XTS hardware encryption, the iStorage diskAshur PRO<sup><span style="font-size: small">2</span></sup>SSD seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.</p>
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
</tbody>
</table>
</div>
<p><strong>  Super fast USB 3.1 </strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>With super-fast USB 3.1 data transfer speeds of 294 MBps (Read) and 319 MBps (Write), you can now access your files faster than ever before. The iStorage diskAshur PRO<sup><span style="font-size: small">2 </span></sup>SSD is also backwards compatible with USB 2.0 and 1.1 ports.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Brute Force Hack Defence Mechanism</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD is intelligently programmed to protect against all forms of Brute Force attacks. After five consecutive incorrect PIN entries the drive will freeze, requiring the drive to be disconnected and reconnected to the USB port to get a further five PIN entry attempts. If a further five (10 in total) consecutive incorrect PIN attempts are entered again, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD will freeze again. To get a further and final five PIN attempts (15 in total), the “shift” button must be pressed whilst inserting the USB cable to the USB port and then an iStorage preset PIN will need to be entered. On the fifteenth consecutive incorrect PIN entry, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Self Destruct Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>You can pre-program the diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD with your own unique Self Destruct PIN which, once implemented, instantly deletes the encryption key, all PINs, data and then creates a new encryption key.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Unattended Auto-Lock Feature </strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Set the unattended diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD to automatically lock after a pre-determined amount of time where the drive has not been used.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Drive Reset Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur PRO<sup><span style="font-size: small">2 </span></sup> SSD also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Unattended Auto-Lock Feature</strong></p>
<div class="table-responsive">
<p>Set the unattended diskAshur PRO<sup><span style="font-size: small">2 </span></sup> SSD to automatically lock after a pre-determined amount of time.</p>
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
</tbody>
</table>
</div>
<p><strong>Tamper Proof and Tamper Evident Design</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>In addition to incorporating a secure microprocessor, encrypting the data and the encryption key, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD adds another barrier between your data and a hacker. All the components of the diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. This barrier prevents a potential hacker from accessing the critical components and launching a variety of futile attacks. Furthermore, the tamper evident design of the diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD if breached, will provide visible evidence that tampering has occurred.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Data at rest protection</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Wear Resistant Epoxy Coated Keypad</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Designed with protection in mind, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> SSD wear resistant epoxy coated keypad hides key usage to avoid tipping off a potential hacker to commonly used keys.</td>
</tr>
</tbody>
</table>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>iStorage diskAshur 2 SSD</title>
		<link>https://insec.no/produkt/nyhet-istorage-diskashur-2-ssd/</link>
				<pubDate>Thu, 27 Apr 2017 17:19:25 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">http://bedriftssystemer.no/?post_type=product&#038;p=1445</guid>
				<description><![CDATA[USB 3.1 Encrypted Portable SSD
<ul>
 	<li>Capacities: 128/256/512GB - 1/2/4/8TB</li>
 	<li>FIPS PUB 197 validated</li>
 	<li>AES 256-bit XTS hardware encryption – no software required</li>
 	<li>OS &#38; Platform independent</li>
 	<li>Employs EDGE* Technology</li>
 	<li>Available in 4 colours: Phantom Black, Ocean Blue, Fiery Red &#38; Racing Green</li>
</ul>
&#160;]]></description>
								<content:encoded><![CDATA[<p><b>What is diskAshur</b><sup><span style="font-size: small"><b>2 </b></span></sup><b>SSD</b><strong> </strong><strong>?</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
<tr>
<td></td>
</tr>
<tr>
<td>An easy to use ultra-secure, PIN authenticated, portable USB 3.1 Solid State Drive with real-time AES 256-bit XTS hardware encryption, software free design and super-fast data transfer speeds. The diskAshur<sup><span style="font-size: small">2</span></sup> SSD has an easy-to-use keypad design enabling you to securely access the drive with your own unique 7-15 digit PIN and with software free setup and operation, the diskAshur<sup><span style="font-size: small">2 </span></sup>SSD is platform/device independent and works across all operating systems including all versions of MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems. In fact, it will work on any device with a USB port! One of the unique and underlying security features of the GDPR compliant diskAshur<sup><span style="font-size: small">2 </span></sup>SSD is the dedicated hardware based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass attacks and more. Unlike other solutions, the diskAshur<sup><span style="font-size: small">2 </span></sup>SSD reacts to an automated attack by entering the deadlock frozen state, which renders all such attacks as useless. <b>In plain and simple terms, without the PIN there’s no way in!</b></td>
</tr>
</tbody>
</table>
</div>
<p><strong>*</strong> <strong>EDGE</strong><strong><sup><span style="font-size: small">TM</span></sup></strong><strong> (Enhanced Dual Generating Encryption) Technology</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Offering advanced portable data security via built-in FIPS PUB 197 validated AES 256-bit XTS hardware encryption engine. The data encryption key is randomly generated by a Common Criteria EAL4+ ready Random Number Generator and protected by NCSC, FIPS and Common Criteria validated wrapping algorithms. Uniquely featuring a dedicated on-board Common Criteria EAL4+ ready secure microprocessor to enhance security through true random number generation and built-in cryptography. The security component employs physical protection mechanisms to protect itself from any external tamper, bypass laser attacks and fault injections and incorporates active-shield violation technology. More specifically, the secure microprocessor reacts to all forms of automated hacking attempts by entering the deadlock frozen state where the device can only restart through a ‘Power On’ reset procedure (i.e. power off/power on). The security lock feature protects the device against any unauthorised firmware modifications from the host side (fully protected against BadUSB). The diskAshur<sup><span style="font-size: small">2 </span></sup>SSD uniquely incorporates a secure microprocessor providing secure algorithms to encrypt both the data and the encryption key, giving you confidence that your data is protected to the highest standards at any given time.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>FIPS PUB 197 Validated Encryption Algorithm</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Employing AES 256-bit XTS hardware encryption, the iStorage diskAshur<sup><span style="font-size: small">2 </span></sup>SSD seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the Solid State Drive is removed from its enclosure.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>  Super-fast USB 3.1</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>With super-fast USB 3.1 data transfer speeds of 294 MBps (Read) and 319 MBps (Write), you can now access your files faster than ever before. The iStorage diskAshur2 SSD is also backwards compatible with USB 2.0 and 1.1 ports.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Brute Force Hack Defence Mechanism</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur<sup><span style="font-size: small">2</span></sup> SSD is intelligently programmed to protect against all forms of Brute Force attacks. After five consecutive incorrect PIN entries the drive will freeze, requiring the drive to be disconnected and reconnected to the USB port to get a further five PIN entry attempts. If a further five (10 in total) consecutive incorrect PIN attempts are entered again, the diskAshur<sup><span style="font-size: small">2</span></sup> SSD will freeze again. To get a further and final five PIN attempts (15 in total), the “shift” button must be pressed whilst inserting the USB cable to the USB port and then an iStorage preset PIN will need to be entered. On the fifteenth consecutive incorrect PIN entry, the diskAshur<sup><span style="font-size: small">2</span></sup> SSD assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Self Destruct Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>You can pre-program the diskAshur<sup><span style="font-size: small">2</span></sup> SSD with your own unique Self Destruct PIN which, once implemented, instantly deletes the encryption key, all PINs, data and then creates a new encryption key.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Drive Reset Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur<sup><span style="font-size: small">2</span></sup> SSD also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Tamper Proof Design</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>In addition to incorporating a secure microprocessor, encrypting the data and the encryption key, the diskAshur<sup><span style="font-size: small">2</span></sup> SSD adds another barrier between your data and a hacker. All the components of the diskAshur<sup><span style="font-size: small">2</span></sup> SSD are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. This barrier prevents a potential hacker from accessing the critical components and launching a variety of futile attacks.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Data at rest protection</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>All data, PINs, and encryption keys are always encrypted while at rest.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Wear Resistant Epoxy Coated Keypad</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Designed with protection in mind, the diskAshur<sup><span style="font-size: small">2</span></sup> SSD wear resistant epoxy coated keypad hides key usage to avoid tipping off a potential hacker to commonly used keys.</td>
</tr>
</tbody>
</table>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>iStorage diskAshur DT 2</title>
		<link>https://insec.no/produkt/nyhet-istorage-diskashur-dt-2/</link>
				<pubDate>Wed, 26 Apr 2017 19:10:11 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">http://bedriftssystemer.no/?post_type=product&#038;p=1421</guid>
				<description><![CDATA[USB 3.1 Encrypted Desktop Hard Drive
<ul>
 	<li>Capacities: 1/2/3/4/6/8/10/12/14/16 TB</li>
 	<li>Designed to be certified to FIPS 140-2 Level 3, NCSC CPA, Common Criteria and NLNCSA</li>
 	<li>XTS-AES 256-bit hardware encryption – no software required</li>
 	<li>OS &#38; Platform independent</li>
 	<li>Employs EDGE* Technology</li>
</ul>
&#160;

&#160;]]></description>
								<content:encoded><![CDATA[<p><b>What is diskAshur DT</b><sup><span style="font-size: small"><b>2</b></span></sup><b>?</b></p>
<p>&nbsp;</p>
<p>Features:</p>
<p>Common Criteria EAL4+ ready on-board secure microprocessor</p>
<ul>
<li class="list-group-item">Real-time military grade AES 256-bit XTS Full-Disk Hardware Encryption</li>
<li class="list-group-item">FIPS PUB 197 Validated Encryption Algorithm (10X faster than USB 2.0)</li>
<li class="list-group-item">PINs and encryption keys are always encrypted while at rest</li>
<li class="list-group-item">Brute Force Hack Defence Mechanism</li>
<li class="list-group-item">Tamper Proof</li>
<li class="list-group-item">Immune to BadUSB</li>
<li class="list-group-item">Epoxy coated wear resistant keypad</li>
<li class="list-group-item">No speed degradation &#8211; as fast as any non-encrypted USB 3.1 HDD</li>
<li class="list-group-item">Desk Lock Slot</li>
<li class="list-group-item">All components covered with a layer of super tough epoxy resin</li>
<li class="list-group-item">FIPS 140-2 Level 2, NCSC CPA (foundation level), Common Criteria &amp; NLNCSA &#8211; Certifications all pending</li>
<li class="list-group-item">No software or drivers required &#8211; 100% Hardware Encryption</li>
<li class="list-group-item">Read-Only (Write Protect) &amp; Read/Write modes</li>
<li class="list-group-item">PIN authenticated &#8211; Supports Admin and User Independent PINs 7-15 digits in length</li>
<li class="list-group-item">Self Destruct Feature</li>
<li class="list-group-item">Drive Reset Feature for easy redeployment</li>
<li class="list-group-item">Super Speed USB 3.1</li>
<li class="list-group-item">Unattended Auto-Lock feature</li>
<li class="list-group-item">No admin rights needed</li>
<li class="list-group-item">OS &amp; Platform Independent &#8211; Works on any device with a USB port</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
<tr>
<td></td>
</tr>
<tr>
<td>An easy to use ultra-secure, PIN authenticated, USB 3.1 desktop hard drive with capacities of up to 8TB and real-time AES 256-bit XTS hardware encryption, software free design and super-fast data transfer speeds. The diskAshur DT<sup><span style="font-size: small">2</span></sup> is designed to be certified to FIPS 140-2 Level 3, NCSC CPA (Foundation Level), Common Criteria and NLNCSA government accreditations. The diskAshur DT<sup><span style="font-size: small">2</span></sup> has an easy-to-use keypad design enabling you to securely access the drive with your own unique 7-15 digit PIN and with software free setup and operation, the diskAshur DT<sup><span style="font-size: small">2</span></sup> is platform/device independent and works across all operating systems including all versions of MS Windows, MacOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems. In fact, it will work on any device with a USB port! One of the unique and underlying security features of the GDPR compliant diskAshur DT<sup><span style="font-size: small">2</span></sup> is the dedicated hardware-based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass attacks and more. Unlike other solutions, the diskAshur DT<sup><span style="font-size: small">2</span></sup> reacts to an automated attack by entering the deadlock frozen state, which renders all such attacks as useless. <b>In plain and simple terms, without the PIN there’s no way in!</b></td>
</tr>
</tbody>
</table>
</div>
<p><strong>EDGE</strong><strong><sup><span style="font-size: small">TM</span></sup></strong><strong>*  (Enhanced Dual Generating Encryption) Technology </strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Offering advanced portable data security via built-in FIPS PUB 197 validated AES 256-bit XTS hardware encryption engine. The data encryption key is randomly generated by a Common Criteria EAL4+ ready Random Number Generator and protected by NCSC, FIPS and Common Criteria validated wrapping algorithms.   Uniquely featuring a dedicated onboard Common Criteria EAL4+ ready secure microprocessor to enhance security through true random number generation and built-in cryptography. The security component employs physical protection mechanisms to protect itself from any external tamper, bypass laser attacks and fault injections and incorporates active-shield violation technology. More specifically, the secure microprocessor reacts to all forms of automated hacking attempts by entering the deadlock frozen state where the device can only restart through a ‘Power On’ Reset procedure (i.e. power off/power on). The security lock feature protects the device against any unauthorised firmware modifications from the host side (fully protected against BadUSB). The diskAshur DT<sup><span style="font-size: small">2</span></sup> uniquely incorporates a secure microprocessor providing secure algorithms to encrypt both the data and the encryption key, giving you confidence that your data is protected to the highest standards at any given time.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>FIPS PUB 197 Validated Encryption Algorithm</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Employing AES-XTS 256-bit hardware encryption, the iStorage diskAshur DT<sup><span style="font-size: small">2</span></sup> seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>  Super-fast USB 3.1 </strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>With super-fast USB 3.1 data transfer speeds of 225 MBps (Read) and 223 MBps (Write), you can now access your files faster than ever before. The iStorage diskAshur DT<sup><span style="font-size: small">2</span></sup> is also backwards compatible with USB 2.0 and 1.1 ports.</td>
</tr>
</tbody>
</table>
</div>
<p><strong> </strong> <strong>Brute Force Hack Defence Mechanism</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur DT<sup><span style="font-size: small">2</span></sup> is intelligently programmed to protect against all forms of Brute Force attacks.  After five consecutive incorrect PIN entries, the drive will freeze, requiring the drive to be powered off and powered back on again in order to get a further five PIN entry attempts.  If a further five (10 in total) consecutive incorrect PIN attempts are entered again, the diskAshur DT<sup><span style="font-size: small">2</span></sup>  will freeze again. To get a further and final five PIN attempts (15 in total), the “shift” button must be pressed whilst powering the diskAshur DT<sup><span style="font-size: small">2</span></sup> off and then powering back on before entering the iStorage preset PIN.   On the fifteenth consecutive incorrect PIN entry, the diskAshur DT<sup><span style="font-size: small">2</span></sup> assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever.  At this point, the drive can be reset to factory default settings and redeployed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Drive Reset Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur DT<sup><span style="font-size: small">2</span></sup> also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong> </strong> <strong>Self Destruct Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>You can pre-program the diskAshur DT<sup><span style="font-size: small">2</span></sup> with your own unique Self Destruct PIN which, once implemented, instantly deletes the encryption key, all PINs, data and then creates a new encryption key.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Unattended Auto-Lock Feature</strong></p>
<div class="table-responsive">
<p>Set the unattended diskAshur DT<sup><span style="font-size: small">2</span></sup> to automatically lock after a pre-determined amount of time.</p>
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
</tbody>
</table>
</div>
<p><strong>Tamper Proof </strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>In addition to incorporating a secure microprocessor, encrypting the data and the encryption key, the diskAshur DT<sup><span style="font-size: small">2</span></sup> adds another barrier between your data and a hacker. All the components of the diskAshur DT<sup><span style="font-size: small">2</span></sup> are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. This barrier prevents a potential hacker from accessing the critical components and launching a variety of futile attacks.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Data at rest protection</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur DT<sup><span style="font-size: small">2</span></sup> also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Wear Resistant Epoxy Coated Keypad</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Designed with protection in mind, the diskAshur DT<sup><span style="font-size: small">2</span></sup> wear resistant epoxy coated keypad hides key usage to avoid tipping off a potential hacker to commonly used keyshides key usage to avoid tipping off a potential hacker to commonly used keys</td>
</tr>
</tbody>
</table>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>iStorage diskAshur 2</title>
		<link>https://insec.no/produkt/nyhet-istorage-diskashur-2/</link>
				<pubDate>Wed, 26 Apr 2017 16:57:39 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">http://bedriftssystemer.no/?post_type=product&#038;p=1405</guid>
				<description><![CDATA[USB 3.1 Portable Encrypted Hard Drive
<ul>
 	<li>Capacities: 500GB - 1/2/3/4/5TB</li>
 	<li>FIPS PUB 197 validated</li>
 	<li>AES 256-bit XTS hardware encryption – no software required</li>
 	<li>OS &#38; Platform independent</li>
 	<li>Employs EDGE* Technology</li>
 	<li>Available in 4 colours-Phantom Black, Ocean Blue, Fiery Red &#38; Racing Green</li>
</ul>
&#160;]]></description>
								<content:encoded><![CDATA[<p><b>What is diskAshur</b><sup><b><span style="font-size: small">2</span></b></sup><strong> </strong><strong>?</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
<tr>
<td></td>
</tr>
<tr>
<td>An easy to use ultra-secure, PIN authenticated, portable USB 3.1 hard drive with real-time AES 256-bit XTS hardware encryption, software free design and super-fast data transfer speeds. The diskAshur<sup><span style="font-size: small">2</span></sup> has an easy-to-use keypad design enabling you to securely access the drive with your own unique 7-15 digit PIN and with software free setup and operation, the diskAshur<sup><span style="font-size: small">2</span></sup> is platform/device independent and works across all operating systems including all versions of MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems. In fact, it will work on any device with a USB port! One of the unique and underlying security features of the GDPR compliant diskAshur<sup><span style="font-size: small">2</span></sup> is the dedicated hardware based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass attacks and more. Unlike other solutions, the diskAshur<sup><span style="font-size: small">2</span></sup> reacts to an automated attack by entering the deadlock frozen state, which renders all such attacks as useless. <b> In plain and simple terms, without the PIN there’s no way in!</b></td>
</tr>
</tbody>
</table>
</div>
<p><strong>*</strong> <strong>EDGE</strong><strong><sup><span style="font-size: small">TM</span></sup></strong><strong> (Enhanced Dual Generating Encryption) Technology</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Offering advanced portable data security via built-in FIPS PUB 197 validated AES 256-bit XTS hardware encryption engine. The data encryption key is randomly generated by a Common Criteria EAL4+ ready Random Number Generator and protected by NCSC, FIPS and Common Criteria validated wrapping algorithms.   Uniquely featuring a dedicated on-board Common Criteria EAL4+ ready secure microprocessor to enhance security through true random number generation and built-in cryptography. The security component employs physical protection mechanisms to protect itself from any external tamper, bypass laser attacks and fault injections and incorporates active-shield violation technology. More specifically, the secure microprocessor reacts to all forms of automated hacking attempts by entering the deadlock frozen state where the device can only restart through a ‘Power On’ reset procedure (i.e. power off/power on). The security lock feature protects the device against any unauthorised firmware modifications from the host side (fully protected against BadUSB). The diskAshur<sup><span style="font-size: small">2</span></sup> uniquely incorporates a secure microprocessor providing secure algorithms to encrypt both the data and the encryption key, giving you confidence that your data is protected to the highest standards at any given time.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>FIPS PUB 197 Validated Encryption Algorithm</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Employing AES 256-bit XTS hardware encryption, the iStorage diskAshur<sup><span style="font-size: small">2</span></sup> seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>  Super-fast USB 3.1</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>With super-fast USB 3.1 data transfer speeds of 148 MBps (Read) and 140 MBps (Write), you can now access your files faster than ever before. The iStorage diskAshur<sup><span style="font-size: small">2</span></sup> is also backwards compatible with USB 2.0 and 1.1 ports.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Brute Force Hack Defence Mechanism</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur<sup><span style="font-size: small">2</span></sup> is intelligently programmed to protect against all forms of Brute Force attacks. After five consecutive incorrect PIN entries the drive will freeze, requiring the drive to be disconnected and reconnected to the USB port to get a further five PIN entry attempts. If a further five (10 in total) consecutive incorrect PIN attempts are entered again, the diskAshur<sup><span style="font-size: small">2</span></sup> will freeze again. To get a further and final five PIN attempts (15 in total), the “shift” button must be pressed whilst inserting the USB cable to the USB port and then an iStorage preset PIN will need to be entered. On the fifteenth consecutive incorrect PIN entry, the diskAshur<sup><span style="font-size: small">2</span></sup> assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Self Destruct Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>You can pre-program the diskAshur<sup><span style="font-size: small">2</span></sup> with your own unique Self Destruct PIN which, once implemented, instantly deletes the encryption key, all PINs, data and then creates a new encryption key.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Drive Reset Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur<sup><span style="font-size: small">2</span></sup> also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Unattended Auto-Lock Feature</strong></p>
<div class="table-responsive">
<p>Set the unattended diskAshur<sup><span style="font-size: small">2</span></sup> to automatically lock after a pre-determined amount of time.</p>
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
</tbody>
</table>
</div>
<p><strong>Tamper Proof Design</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>In addition to incorporating a secure microprocessor, encrypting the data and the encryption key, the diskAshur<sup><span style="font-size: small">2</span></sup> adds another barrier between your data and a hacker. All the components of the diskAshur<sup><span style="font-size: small">2</span></sup> are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. This barrier prevents a potential hacker from accessing the critical components and launching a variety of futile attacks.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Data at rest protection</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>All data, PINs, and encryption keys are always encrypted while at rest.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Wear Resistant Epoxy Coated Keypad</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Designed with protection in mind, the diskAshur<sup><span style="font-size: small">2</span></sup> wear resistant epoxy coated keypad hides key usage to avoid tipping off a potential hacker to commonly used keys.</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<h2 class="resp-accordion"></h2>
<div id="tab-custom3" class="resp-tab-content"></div>
<h2 class="resp-accordion"></h2>
<div></div>
]]></content:encoded>
										</item>
		<item>
		<title>iStorage diskAshur Pro 2</title>
		<link>https://insec.no/produkt/istorage-diskashur-pro-2/</link>
				<pubDate>Wed, 26 Apr 2017 09:44:10 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">http://bedriftssystemer.no/produkt/istorage-diskashur-pro-2/</guid>
				<description><![CDATA[USB 3.1 Encrypted Portable Hard Drive
<ul>
 	<li>Capacities : 500GB - 1/2/3/4/5TB</li>
 	<li>Designed to be certified to FIPS 140-2 Level 3, NCSC CPA, Common Criteria and NLNCSA</li>
 	<li>XTS-AES 256-bit hardware encryption – no software required</li>
 	<li>OS &#38; Platform independent</li>
 	<li>Employs EDGE* Technology</li>
</ul>
&#160;]]></description>
								<content:encoded><![CDATA[<p><b>What is diskAshur PRO</b><sup><span style="font-size: small"><b>2</b></span></sup><b>?</b></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
<tr>
<td>An easy to use ultra-secure, PIN authenticated, portable USB 3.1 hard drive with real-time AES 256-bit XTS hardware encryption, software free design, super-fast data transfer speeds and designed to be certified to FIPS 140-2 Level 3, NCSC CPA (Foundation Level), Common Criteria and NLNCSA government accreditations. The diskAshur PRO<sup><span style="font-size: small">2</span></sup> has an easy-to-use keypad design enabling you to securely access the drive with your own unique 7-15 digit PIN and with software free setup and operation, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> is platform/device independent and works across all operating systems including all versions of MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems. In fact, it will work on any device with a USB port! One of the unique and underlying security features of the GDPR compliant diskAshur PRO<sup><span style="font-size: small">2</span></sup> is the dedicated hardware based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass attacks and more. Unlike other solutions, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> reacts to an automated attack by entering the deadlock frozen state, which renders all such attacks as useless. <b>In plain and simple terms, without the PIN there’s no way in!</b></td>
</tr>
</tbody>
</table>
</div>
<p><strong>**EDGE</strong><sup><span style="font-size: small">TM</span></sup><strong>  (Enhanced Dual Generating Encryption) Technology</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Offering advanced portable data security via built-in FIPS PUB 197 validated AES 256-bit XTS hardware encryption engine. The data encryption key is randomly generated by a Common Criteria EAL4+ ready Random Number Generator and protected by NCSC, FIPS and Common Criteria validated wrapping algorithms. Uniquely featuring a dedicated on-board Common Criteria EAL4+ ready secure microprocessor to enhance security through true random number generation and built-in cryptography. The security component employs physical protection mechanisms to protect itself from any external tamper, bypass laser attacks and fault injections and incorporates active-shield violation technology. More specifically, the secure microprocessor reacts to all forms of automated hacking attempts by entering the deadlock frozen state where the device can only restart through a ‘Power On’ reset procedure (i.e. power off/power on). The security lock feature protects the device against any unauthorised firmware modifications from the host side (fully protected against BadUSB). The diskAshur PRO<sup><span style="font-size: small">2</span></sup> uniquely incorporates a secure microprocessor providing secure algorithms to encrypt both the data and the encryption key, giving you confidence that your data is protected to the highest standards at any given time.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>FIPS PUB 197 Validated Encryption Algorithm</strong></p>
<div class="table-responsive">
<p>Employing AES 256-bit XTS hardware encryption, the iStorage diskAshur PRO<sup><span style="font-size: small">2</span></sup> seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.</p>
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td></td>
</tr>
</tbody>
</table>
</div>
<p><strong>  Super fast USB 3.1 </strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>With super-fast USB 3.1 data transfer speeds of 148 MBps (Read) and 140 MBps (Write), you can now access your files faster than ever before. The iStorage diskAshur PRO<sup><span style="font-size: small">2</span></sup> is also backwards compatible with USB 2.0 and 1.1 ports.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Brute Force Hack Defence Mechanism</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur PRO<sup><span style="font-size: small">2</span></sup> is intelligently programmed to protect against all forms of Brute Force attacks. After five consecutive incorrect PIN entries the drive will freeze, requiring the drive to be disconnected and reconnected to the USB port to get a further five PIN entry attempts. If a further five (10 in total) consecutive incorrect PIN attempts are entered again, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> will freeze again. To get a further and final five PIN attempts (15 in total), the “shift” button must be pressed whilst inserting the USB cable to the USB port and then an iStorage preset PIN will need to be entered. On the fifteenth consecutive incorrect PIN entry, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Self Destruct Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>You can pre-program the diskAshur PRO<sup><span style="font-size: small">2</span></sup> with your own unique Self Destruct PIN which, once implemented, instantly deletes the encryption key, all PINs, data and then creates a new encryption key.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Unattended Auto-Lock Feature </strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Set the unattended diskAshur PRO<sup><span style="font-size: small">2</span></sup> to automatically lock after a pre-determined amount of time where the drive has not been used.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Drive Reset Feature</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur PRO<sup><span style="font-size: small">2</span></sup> also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Tamper Proof and Tamper Evident Design</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>In addition to incorporating a secure microprocessor, encrypting the data and the encryption key, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> adds another barrier between your data and a hacker. All the components of the diskAshur PRO<sup><span style="font-size: small">2</span></sup> are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. This barrier prevents a potential hacker from accessing the critical components and launching a variety of futile attacks. Furthermore, the tamper evident design of the diskAshur PRO<sup><span style="font-size: small">2</span></sup> if breached, will provide visible evidence that tampering has occurred.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Data at rest protection</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>The iStorage diskAshur PRO<sup><span style="font-size: small">2</span></sup> also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Wear Resistant Epoxy Coated Keypad</strong></p>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Designed with protection in mind, the diskAshur PRO<sup><span style="font-size: small">2</span></sup> wear resistant epoxy coated keypad hides key usage to avoid tipping off a potential hacker to commonly used keys.</td>
</tr>
</tbody>
</table>
</div>
]]></content:encoded>
										</item>
		<item>
		<title>datAshur Personal2</title>
		<link>https://insec.no/produkt/datashur-personal2/</link>
				<pubDate>Mon, 21 Nov 2016 17:51:42 +0000</pubDate>
		<dc:creator><![CDATA[Roger Valderhaug]]></dc:creator>
		
		<guid isPermaLink="false">https://www.insec.no/?post_type=product&#038;p=1206</guid>
				<description><![CDATA[<h4>Capacities: 8/16/32/64GB</h4>
<h4>All data transferred to the datAshur Personal2 is encrypted in real-time with the built in hardware encryption engine</h4>
<div class="table-responsive"></div>]]></description>
								<content:encoded><![CDATA[<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>&nbsp;</p>
<p>All data transferred to the datAshur Personal2 is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access even if your datAshur Personal2 is lost or stolen. The datAshur Personal2 automatically locks when unplugged from the host computer or power to the USB port is turned off and can be set to timeout (lock) after a predetermined amount of time.</td>
</tr>
<tr>
<td>The datAshur Personal2 operates straight out of the box, does not require any software or drivers to be installed and is compatible with Windows, Mac, Linux, Chrome, Android, Thin Clients and embedded systems. The datAshur Personal2 delivers drag and drop encryption, plug and play simplicity and can be used with any software.</td>
</tr>
<tr>
<td>The datAshur Personal2 can be configured with independent User and Admin PINs, making it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN. The datAshur Personal2 also incorporates a drive reset feature which clears both User and Admin PINs, deletes all data, creates a new randomly generated encryption key and allows the drive to be reused. The datAshur Personal2 is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required.</td>
</tr>
<tr>
<td>As the iStorage datAshur Personal2 is unlocked via the on-board keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. The datAshur Personal2 protects your data with a “Brute Force Hack Defence Mechanism”. If both Admin and User PINs have been created and a User enters an incorrect User PIN 10 (ten) consecutive times, the datAshur Personal2&#8217;s brute force mechanism will trigger and the User PIN will be deleted. All data will remain on the datAshur Personal2 and can only be accessed by the Admin entering the correct Admin PIN. If Admin enters an incorrect Admin PIN 10 (ten) consecutive times, then both the User and Admin PINs, the encryption key and all data will be deleted and lost forever The datAshur Personal2 will then revert back to factory default settings and will need to be formatted before it can be reused.</td>
</tr>
<tr>
<td>The datAshur Personal2 is an investment that will last for years.</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h4>Why choose datAshur Personal2?</h4>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td>Did you know that millions of flash drives are lost or stolen every year and this figure is rising? Have you ever considered the impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it.</td>
</tr>
<tr>
<td>Information Commissioner&#8217;s Office (ICO)</td>
</tr>
<tr>
<td>The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB flash drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.</td>
</tr>
<tr>
<td>General Data Protection Regulation (GDPR)</td>
</tr>
<tr>
<td>The European Union will soon have the power to fine companies €20 million or 4% of their annual turnover if they are found to be in breach of the new General Data Protection Regulation (GDPR). The forthcoming legislation compels anyone who holds data on EU Citizens to implement adequate security measures to protect data from loss or theft.</td>
</tr>
<tr>
<td>Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage datAshur Personal2 can protect you against all of this.</td>
</tr>
</tbody>
</table>
</div>
<h4>What is the difference between software and hardware encryption?</h4>
<div class="table-responsive">
<table class="table ease_use" width="100%">
<tbody>
<tr>
<td><strong class="product-details-paddingleft">Software encryption:</strong></p>
<ul>
<li>Complex passwords can be cracked easily and quickly with a Brute Force Attack</li>
<li>Simple password cracking software is readily available on the internet, often free of charge</li>
<li>Software encryption is vulnerable to key loggers – where every key pressed is logged in either a software or hardware key logger</li>
<li>Software encryption can be corrupted by viruses</li>
<li>Software encryption is much slower when compared to hardware encryption</li>
<li>Software encryption needs to be installed on each computer that the external storage device is used on</li>
<li>Software encryption shares computers resources to encrypt data with other programs on the computer, making it only as safe as your computer.</li>
</ul>
<p><strong class="product-details-paddingleft">Hardware encryption:</strong></p>
<ul>
<li>The datAshur Personal2 cannot be brute force attacked</li>
<li>The datAshur Personal2 is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard</li>
<li>The datAshur Personal2 does not require any software and can be used on any Windows, Mac, Linux, Chrome, Android, Thin Clients and Embedded Systems.</li>
<li>Encryption is performed in real-time thus there is no speed degradation</li>
<li>No software or drivers are required</li>
</ul>
</td>
</tr>
</tbody>
</table>
</div>
]]></content:encoded>
										</item>
	                                          </channel>
</rss>
