Rugged, Portable Data Security with FIPS 140-2 level 2 Validated Encryption Module: Aegis Fortress
Tough on the outside, FIPS validated HDD encryption on the inside, and pocket-sized portability to safely carry your data anywhere you go. Available in a wide variety of storage capacities in both HDD and high speed SSD models. The Aegis Fortress is Software-Free, 100% hardware-based 256-bit AES XTS encrypted, onboard keypad PIN authenticated, with ultra-fast USB 3.1 (3.0) data transfer speeds. All Data is encrypted on the fly and all PINs and Data remain encrypted while the drive is at rest. Completely cross-platform compatible and OS agnostic; the Aegis Fortress thrives with Windows, Linux, Mac, Android, and Chrome. It also thrives where software-authenticated encrypted devices can’t function, such as embedded systems and equipment in possession of a powered USB port and storage file system but no keyboard. All internal componentry is protected from physical tampering with a layer of hardened epoxy, and the firmware is locked down to prevent any modifications making it impervious to malware attacks such as BadUSB.
|500GB HDD||1TB HDD||2TB HDD||128GB SSD||256GB SSD||512GB SSD||1TB SSD||2TB SSD||4TB SSD||8TB SSD|
- FIPS 140-2 Level 2 Inside
Meets the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. The Aegis Fortress’s FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. The Aegis Fortress’s FIPS 140-2 Level 2 HDD encryption validation encompasses both the Fortress’s physical tamper-resistant features as well as its identity-based authentication. Tested and validated by the National Institute of Standards and Technology (NIST) for use by the Federal governments of the USA, Canada and others, the Aegis Fortress Drive is based on Apricorn’s FIPS 140-2 Level 2 validated encryption module as indicated by certificate #2835. The Fortress’s security policy is located on the NIST site at the following link. The epoxy coated boundary includes all encryption functions and all Critical Security Parameters (CSPs) such as PIN storage, encryption key generation and storage, random number and seed generators, and all firmware storage. The FIPS module is a complete encryption system, and all CSPs never leave the boundary and are never shared with a host system. By design, the HDD/SSD that stores the encrypted data is excluded from this boundary to both maximize affordability and product line flexibility in capacity and form factor offerings.
- Aegis Configurator Compatible
Windows-Based App that Quickly Sets Up Multiple Devices Simultaneously. Create custom profiles and mass configure multiple devices in a matter of seconds using the Aegis Configurator. To configure an expanded number of devices, use the Powered Aegis Configurator Hub bundle.
- Separate Admin and User Mode
Admin (Device Configuration) Mode and User Access Mode. The Aegis Secure Key supports independent Admin and User PINs. The Admin mode controls the universal programmable settings of the device and can only be accessed with the Admin PIN. The User mode is limited to basic external drive functions like read /write, unlock / lock, etc. The data on the drive can also be accessed with the admin PIN in the User mode.
- Polymer-Coated Wear-Resistant Onboard Keypad
Drive is Unlocked by Entering a PIN on Keypad and not the Host Computer’s Keyboard. Until the device is unlocked via its keypad, it remains invisible to the host. The embedded keypad circumvents all hardware and software key logging attempts to capture passwords by excluding the host system from the authentication process. Polymer-coated buttons are wear-resistant and designed to not reveal most commonly used buttons.
- Admin Forced Enrollment
Unique PIN Must be Established at Time of Setup. Eliminates Factory Default PIN Vulnerability. Out of the box, there are no factory pre-set default PINs. In order to set up and use the drive, a unique PIN must first be established by the Admin, from within the Admin mode.
- User Forced Enrollment
Admin Can Program Device at Setup Requiring User to Establish a Unique PIN. Once a device is configured by the Admin, it can then be deployed in a state of USER FORCED ENROLLMENT in which the User must first establish his or her own User PIN before the drive can be accessed or used.
- Data Recovery PINs
Creates State of User Forced Enrollment that Restores Access to Drive. In the event that a User PIN is forgotten, Recovery PINs can be programmed into the device to permit access to the drive’s data by creating a new state of User Forced Enrollment while the Admin PIN and the drive’s data remain intact. Once a replacement User PIN is generated, access to the drive is restored for the user.
- Two Read-Only Modes
Global, All Access Settings Controlled by Admin, and User Mode Controlling Individual Settings. Employed in situations that require the drive’s contents to be kept intact and unaltered for later examination. The two Read-Only modes are as follows: Universal Read Only is set by the admin from within the admin mode and can’t be modified or disabled by anyone but the admin. The second read-only mode can be set and disabled by a user but can also be enabled or disabled by the admin as well.
- Self-Destruct PIN
When Programmed and Activated, Performs a Crypto-Erase and Becomes New Access PIN. The last line of defense for data security when the device’s physical security is at risk. The Self-Destruct PIN defends against these physically compromising situations by erasing the key’s contents, leaving it in normal working order appearing yet to be deployed.
- LED Key Press Indicator
Visually Confirms Successful Button Presses via the Device’s LEDs.
- Programmable PIN Lengths
Admin Designates Minimum and Maximum PIN Lengths (between 7 and 16 Characters). The longer the PIN, the more secure the data on the device becomes. For example, the odds of brute force success go from 1/10,000,000 with a 7-digit PIN to 1/100,000,000 with an 8 digit PIN. In cases where the User sets up his or her own PIN from User Forced Enrollment, the Admin can set an enhanced User password length requirement as part of the overall security policy.
- Brute-Force Defense
Select the Number of Consecutive Invalid PIN Attempts Permitted (4-20) Before Crypto-Erase. All Aegis Secure Drives are unlocked (authenticated) by entering a PIN on their own onboard keypad. Since the PIN is not entered using the host computer’s keyboard, they are not vulnerable to software or hardware-based key-loggers or software-based brute force attacks. However, if the device comes under a physical brute force attack, your data is protected with a programmable “Brute Force Hack Defense Mechanism” which, if the programmed number (between 4 and 20) of consecutive incorrect password entries has been attempted, the device will delete its own encryption key and destroy the ability to decrypt its stored data.
- Unattended Auto Lock
Programmable Period of Inactivity Permitted Before Drive Locks Itself. All Aegis Secure Drives will automatically lock once disconnected from a computer’s USB port or the power to that USB port is interrupted, or after a pre-programmed period of inactivity.
- Lock Override
Allows Drive to Remain Unlocked During USB Port Re Enumeration (Virtual Machine, Remote Boot). Designated for specific cases in which the key needs to remain unlocked through USB port re-enumeration such as during reboot, or passing through a virtual machine.
- Drive Reset Feature
All Apricorn Devices can be Reset and Redeployed Over and Over. Drive reset clears both the User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused repeatedly, with an infinite number of randomly generated encryption keys, allowing the admin and or user to reset the drive as often as is needed.
- IP66 Certification
Dust and Water Resistant Durable ABS Housing and Membrane Keypad Protecting data goes well beyond encryption. Tough enough to go anywhere, the Aegis Fortress’s resilient design makes it perfect for travel and field applications. The Aegis Fortress is tamper-evident and well protected against physical damage.
|Data Transfer Rate||USB 3.0 – up to 5 Gbps|
|Power Supply||100% Bus Powered|
|Interface||Super Speed USB 3.0 (Backwards compatible with USB 2.0 and 1.1)|
|Average seek time||12 ms|
|Shock – non operating||1000G 1ms|
|Shock – operating||300G 2ms|
|Dimensions||19mm X 84.5mm X 120mm (0.75” X 3.3” X 4.7”) Weight: 6.2oz.|
|Warranty||3 year limited|
|Approvals||FC CE | FIPS 140-2 Level 2 Validated (NIST certification #2835)|
|Certification Policies||Click here for Security Policies|
|ECCN / HTS / Cage Code||5A992.c / 8473.50.3000 / 3VYK8|
|System Requirements||Compatible with all Operating Systems, including Windows, Mac and Linux Requires USB port|
|Comments||One gigabyte (GB) = one billion bytes; accessible capacity will be less and actual capacity depends on the operating environment and formatting.|
Are you interested in this product?
or Please contact CDFS for more information
1300 55 33 24 | E-mail: firstname.lastname@example.org