Provided by Apricorn
Aegis Secure Key
Is the information in this section helpful?Yes/No
{"ipiCompatible":false,"tourViews":[{"hotspots":[{"hotspotY":0.4785714285714286,"captionFromAttr":"Secure PIN Access","direction":"left","media":{"assetWrapper":"tour","sources":[{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-fdbda6bd-893a-4f17-aebb-7b1876b8d73e.jpg.w960.jpg","profile":"W960"},{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-fdbda6bd-893a-4f17-aebb-7b1876b8d73e.jpg.w480.jpg","profile":"W480"},{"width":240,"height":240,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-fdbda6bd-893a-4f17-aebb-7b1876b8d73e.jpg.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-fdbda6bd-893a-4f17-aebb-7b1876b8d73e.jpg.web.v1.jpg"},"src":{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-fdbda6bd-893a-4f17-aebb-7b1876b8d73e.jpg"}},"description":"<p>The Aegis Secure Key&#160;USB flash drive&#160;uses an easy-to-use keypad design and software free setup,&#160;enabling you to access&#160;your data&#160;with your own unique pin.<\/p>\n<p>Using a rechargeable battery, the Aegis Secure Key enables the user to unlock the drive with a 7-15 digit PIN before connecting to a USB port.&#160;<\/p>","hotspotX":0.325},{"hotspotY":0.08571428571428572,"captionFromAttr":"Real-time 256-bit AES Hardware Encryption","direction":"left","media":{"assetWrapper":"tour","sources":[{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6b150b89-dfab-4878-9a46-e74d24e47ad0.png.w960.jpg","profile":"W960"},{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6b150b89-dfab-4878-9a46-e74d24e47ad0.png.w480.jpg","profile":"W480"},{"width":240,"height":240,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6b150b89-dfab-4878-9a46-e74d24e47ad0.png.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6b150b89-dfab-4878-9a46-e74d24e47ad0.png"},"src":{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6b150b89-dfab-4878-9a46-e74d24e47ad0.png"}},"description":"All data on the Aegis Secure Key is encrypted in real-time with the built in 256-bit AES CBC (Cipher-Block Chained) hardware encryption.","hotspotX":0.3821428571428571},{"hotspotY":0.26071428571428573,"captionFromAttr":"FIPS 140-2 Level 3 Validated","direction":"left","description":"Tested and validated by the Federal Information Processing Standards (FIPS) to meet the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data.<br/><br/>The Aegis Secure Key\u2019s FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. Available in four levels, the Aegis Secure Key\u2019s FIPS 140-2 Level 3 certification encompasses both the Aegis Secure Key\u2019s physical tamper-resistant features as well as its identity-based authentication.","hotspotX":0.75},{"hotspotY":0.8928571428571429,"captionFromAttr":"Software Free Design - Setup takes just minutes","direction":"right","media":{"assetWrapper":"tour","sources":[{"width":200,"height":155,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6bd2230d-51d3-41eb-bcc1-ec3ce3ebf4d0.jpg.w960.jpg","profile":"W960"},{"width":200,"height":155,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6bd2230d-51d3-41eb-bcc1-ec3ce3ebf4d0.jpg.w480.jpg","profile":"W480"},{"width":200,"height":155,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6bd2230d-51d3-41eb-bcc1-ec3ce3ebf4d0.jpg.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":200,"height":155,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6bd2230d-51d3-41eb-bcc1-ec3ce3ebf4d0.jpg.web.v1.jpg"},"src":{"width":200,"height":155,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-6bd2230d-51d3-41eb-bcc1-ec3ce3ebf4d0.jpg"}},"description":"The Aegis Secure Key is ready to go right out of the box. It does not require any software or drivers to be installed and is compatible with PCs, MACs, Linux and embedded systems. The Aegis Secure Key uses drag and drop encryption, is plug and play ready and can be used with any off the shelf backup software.","hotspotX":0.37857142857142856},{"hotspotY":0.33214285714285713,"captionFromAttr":"Independent User and Admin PINs","direction":"left","media":{"assetWrapper":"tour","sources":[{"width":453,"height":265,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-a1df8f4b-b3d5-4b65-a652-25b3b4e2a066.jpg.w960.jpg","profile":"W960"},{"width":453,"height":265,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-a1df8f4b-b3d5-4b65-a652-25b3b4e2a066.jpg.w480.jpg","profile":"W480"},{"width":240,"height":140,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-a1df8f4b-b3d5-4b65-a652-25b3b4e2a066.jpg.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":400,"height":233,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-a1df8f4b-b3d5-4b65-a652-25b3b4e2a066.jpg.web.v1.400.jpg"},"src":{"width":400,"height":233,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-a1df8f4b-b3d5-4b65-a652-25b3b4e2a066.jpg"}},"description":"The Aegis Secure Key can be configured with independent User and Admin PINs, making it ideal for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN.","hotspotX":0.30714285714285716},{"hotspotY":0.6964285714285714,"captionFromAttr":"Drive Reset Feature","direction":"right","description":"The Aegis Secure Key also includes a drive reset feature which clears both User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The Aegis Secure Key is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required.","hotspotX":0.45},{"hotspotY":0.21785714285714286,"captionFromAttr":"Auto Lock feature","direction":"right","media":{"assetWrapper":"tour","sources":[{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-44452a5f-a5ce-4335-b1e3-e813acc0e3c4.jpg.w960.jpg","profile":"W960"},{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-44452a5f-a5ce-4335-b1e3-e813acc0e3c4.jpg.w480.jpg","profile":"W480"},{"width":240,"height":240,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-44452a5f-a5ce-4335-b1e3-e813acc0e3c4.jpg.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-44452a5f-a5ce-4335-b1e3-e813acc0e3c4.jpg.web.v1.jpg"},"src":{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-44452a5f-a5ce-4335-b1e3-e813acc0e3c4.jpg"}},"description":"The Aegis Secure Key automatically locks when unplugged from the host computer or power to the USB port is turned off.","hotspotX":0.3107142857142857},{"hotspotY":0.7,"captionFromAttr":"Brute Force Self Destruct feature","direction":"left","description":"As the Aegis Secure Key is unlocked using its own keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. In addition the Aegis Secure Key further protects your data with a \u201cBrute Force Hack Defence Mechanism\u201d, which deletes the encryption key and destroys all stored data if the incorrect PIN is entered a total of 10 consecutive times.","hotspotX":0.29285714285714287},{"hotspotY":0.21785714285714286,"captionFromAttr":"Tough design - Perfect for travel","direction":"left","media":{"assetWrapper":"tour","sources":[{"width":470,"height":264,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-3cdb761f-7dfa-4a6d-a732-a52118245854.jpg.w960.jpg","profile":"W960"},{"width":470,"height":264,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-3cdb761f-7dfa-4a6d-a732-a52118245854.jpg.w480.jpg","profile":"W480"},{"width":240,"height":134,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-3cdb761f-7dfa-4a6d-a732-a52118245854.jpg.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":400,"height":224,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-3cdb761f-7dfa-4a6d-a732-a52118245854.jpg.web.v1.400.jpg"},"src":{"width":400,"height":224,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-3cdb761f-7dfa-4a6d-a732-a52118245854.jpg"}},"description":"<p>Protecting data often goes well beyond encryption. Tough enough to go anywhere the Aegis Secure Key resilient design makes it perfect for travel. The Secure Key's rugged, extruded aluminum, crush resistant casing is tamper evident and protects it against physical damage.<\/p>","hotspotX":0.4392857142857143},{"hotspotY":0.475,"captionFromAttr":"Dust and water resistant durable aluminium housing - IP57 Certified","direction":"left","media":{"assetWrapper":"tour","sources":[{"width":345,"height":499,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/68536bad-1576-4837-b48e-f8684e0d4a2d.jpg.w960.jpg","profile":"W960"},{"width":345,"height":499,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/68536bad-1576-4837-b48e-f8684e0d4a2d.jpg.w480.jpg","profile":"W480"},{"width":240,"height":347,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/68536bad-1576-4837-b48e-f8684e0d4a2d.jpg.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":276,"height":400,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/68536bad-1576-4837-b48e-f8684e0d4a2d.jpg.web.v1.276.jpg"},"src":{"width":276,"height":400,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/68536bad-1576-4837-b48e-f8684e0d4a2d.jpg"}},"description":"<p>The Aegis Secure Key is also certified for Water and Dust Resistance with the IP57 certification. The Ingress Protection (IP) rating is an international standard that tests electrical products against two main environmental factors, liquids and dust. The testing is done independently by a 3rd party and involves two separate tests. In order to receive the certification, the Aegis Secure Key was subjected to a dust chamber for 8 hours and submerged in a water tank at 1 meter for 30 minutes, after which the Secure Key was tested for functionality, and inspected for water and dust in its electronics.<\/p>","hotspotX":0.45},{"hotspotY":0.6035714285714285,"captionFromAttr":"Sealed from Physical Attacks by Tough Epoxy Coating","direction":"left","description":"The internal components are completely protected by a super tough epoxy compound, which is virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks.","hotspotX":0.43214285714285716},{"hotspotY":0.33214285714285713,"captionFromAttr":"Wear Resistant Keypad","direction":"right","media":{"assetWrapper":"tour","sources":[{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-994f9fdf-8fd6-4d51-9154-5673a30406f8.png.w960.jpg","profile":"W960"},{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-994f9fdf-8fd6-4d51-9154-5673a30406f8.png.w480.jpg","profile":"W480"},{"width":240,"height":240,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-994f9fdf-8fd6-4d51-9154-5673a30406f8.png.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-994f9fdf-8fd6-4d51-9154-5673a30406f8.png"},"src":{"width":300,"height":300,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-994f9fdf-8fd6-4d51-9154-5673a30406f8.png"}},"description":"Designed with protection in mind, the Aegis Secure Key incorporates a &apos;wear resistant&apos; keypad to hide key usage and avoid tipping off a potential hacker to the commonly used keys.","hotspotX":0.44642857142857145},{"hotspotY":0.7178571428571429,"captionFromAttr":"Awarded PC Magazine's Editor's Choice","direction":"left","media":{"assetWrapper":"tour","sources":[{"width":500,"height":188,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-c90a4505-2130-453f-bf45-be1f1fc9e57e.gif.w960.jpg","profile":"W960"},{"width":480,"height":180,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-c90a4505-2130-453f-bf45-be1f1fc9e57e.gif.w480.jpg","profile":"W480"},{"width":240,"height":90,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-c90a4505-2130-453f-bf45-be1f1fc9e57e.gif.w240.jpg","profile":"W240"}],"type":"IMAGE","isAdaCompliant":false,"runtimeSrc":{"width":400,"height":150,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-c90a4505-2130-453f-bf45-be1f1fc9e57e.gif.web.v1.400.gif"},"src":{"width":400,"height":150,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/resource-c90a4505-2130-453f-bf45-be1f1fc9e57e.gif"}},"description":"<p><b><i>Quote from the PC Mag Review<\/i><\/b><\/p>\n<p>\"Aegis Secure Key is an Editors' Choice winning secure USB key that's compatible with any USB-capable operating system. It exposes no software to possible attack, and its PIN pad keys, already tough, are further protected by an outer sleeve. It's definitely a good choice when you need to transport sensitive data securely, especially between PC and non-PC devices.\"<\/p>\n<p>Read Entire PC Mag review at the link<\/p>\n<p>http://www.pcmag.com/article2/0,2817,2397935,00.asp<\/p>\n<p><i>Reprinted from www.pcmag.com, December 21, 2011 with permission.&#160; <\/i><\/p>\n<p><i>&#169; 2011 Ziff Davis, Inc.&#160; All Rights Reserved.<\/i><\/p>","hotspotX":0.7607142857142857}],"viewImage":{"assetWrapper":"tour","sources":[{"width":960,"height":960,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/dab55e82-90a4-48a9-ab04-0c931d2cc3b8.jpg.w960.jpg","profile":"W960"},{"width":480,"height":480,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/dab55e82-90a4-48a9-ab04-0c931d2cc3b8.jpg.w480.jpg","profile":"W480"},{"width":240,"height":240,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/dab55e82-90a4-48a9-ab04-0c931d2cc3b8.jpg.w240.jpg","profile":"W240"}],"isAdaCompliant":false,"runtimeSrc":{"width":1000,"height":1000,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/dab55e82-90a4-48a9-ab04-0c931d2cc3b8.jpg.web.v1.jpg"},"src":{"width":1000,"height":1000,"src":"/_cp/products/1319571023630/tab-8314e989-6c44-40d6-9ffa-88161f6c4380/dab55e82-90a4-48a9-ab04-0c931d2cc3b8.jpg"}}}]}
Powered by Webcollage