More From Contributor

£148.82
The disk G is a secure, compact & affordable USB (Universal Serial Bus) 2.0 hard drive, employing PIN code access Key Features Secure access with personalised 6-16 digit PIN Encrypts all data on the fly, as fast as any USB (Universal Serial Bus) 2.0/3.0 hard drive Admin feature Â- set 1 Admin & up to 10 user PIN codes Utilises FIPS PUB 197 Validated Encryption Algorithm Guaranteed with 3 year warranty Portable Encrypted Hard Drive with Secure PIN code access The disk G is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G? Did you know that tens of millions of external data storage devices are lost every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB (Universal Serial Bus) flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on You Tube, your business data sent to a competitor, your personal & financial information used for fraudulent purposes. The Information CommissionerÂ’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This

Includes::
the loss of an unencrypted portable hard drive or USB (Universal Serial Bus) flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media focus. The disk G can protect you against all of this. Once access to the disk G is granted by entering the correct 6-16 digit PIN, data can be copied to the disk G using any off the shelf backup software, or simply drag & drop files & directories using Windows Explorer. Once the disk G is disconnected, all data is encrypted & cannot be accessed unless the correct PIN is entered. Military strength Hardware encryption The encryption chipset incorporated within the disk G encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The disk G is the only USB (Universal Serial Bus) hard drive to be awarded the CESG CCTM government accreditation. The disk G also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “ The design & strength of all key lengths of the AES algorithm (i.e. 128, 192 & 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.” Brute Force Hack Defence Mechanism The disk G uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected & then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the disk G assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset & reformat to redeploy the disk G. VTC Technology The disk G also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating disk G*Â’s electronics. What is the difference between software & hardware encryption? Software encryption: Complex passwords can be cracked easily & quickly with a Brute Force Attack Simple password cracking software is readily available on the internet, often free of charge Software encryption is vulnerable to key loggers Â- where every key pressed is logged in either a software or hardware key logger Software encryption can be corrupted by viruses Software encryption is much slower when compared to hardware encryption Software encryption needs to be installed on each computer that the external storage device is used on Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required

...
Available
£182.99
The disk G is a secure, compact & affordable USB (Universal Serial Bus) 2.0 hard drive, employing PIN code access Key Features Secure access with personalised 6-16 digit PIN Encrypts all data on the fly, as fast as any USB (Universal Serial Bus) 2.0/3.0 hard drive Admin feature Â- set 1 Admin & up to 10 user PIN codes Utilises FIPS PUB 197 Validated Encryption Algorithm Guaranteed with 3 year warranty Portable Encrypted Hard Drive with Secure PIN code access The disk G is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G? Did you know that tens of millions of external data storage devices are lost every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB (Universal Serial Bus) flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on You Tube, your business data sent to a competitor, your personal & financial information used for fraudulent purposes. The Information CommissionerÂ’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This

Includes::
the loss of an unencrypted portable hard drive or USB (Universal Serial Bus) flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media focus. The disk G can protect you against all of this. Once access to the disk G is granted by entering the correct 6-16 digit PIN, data can be copied to the disk G using any off the shelf backup software, or simply drag & drop files & directories using Windows Explorer. Once the disk G is disconnected, all data is encrypted & cannot be accessed unless the correct PIN is entered. Military strength Hardware encryption The encryption chipset incorporated within the disk G encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The disk G is the only USB (Universal Serial Bus) hard drive to be awarded the CESG CCTM government accreditation. The disk G also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “ The design & strength of all key lengths of the AES algorithm (i.e. 128, 192 & 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.” Brute Force Hack Defence Mechanism The disk G uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected & then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the disk G assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset & reformat to redeploy the disk G. VTC Technology The disk G also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating disk G*Â’s electronics. What is the difference between software & hardware encryption? Software encryption: Complex passwords can be cracked easily & quickly with a Brute Force Attack Simple password cracking software is readily available on the internet, often free of charge Software encryption is vulnerable to key loggers Â- where every key pressed is logged in either a software or hardware key logger Software encryption can be corrupted by viruses Software encryption is much slower when compared to hardware encryption Software encryption needs to be installed on each computer that the external storage device is used on Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required

...
Available
£208.49
The disk G is a secure, compact & affordable USB (Universal Serial Bus) 2.0 hard drive, employing PIN code access Key Features Secure access with personalised 6-16 digit PIN Encrypts all data on the fly, as fast as any USB (Universal Serial Bus) 2.0/3.0 hard drive Admin feature Â- set 1 Admin & up to 10 user PIN codes Utilises FIPS PUB 197 Validated Encryption Algorithm Guaranteed with 3 year warranty Portable Encrypted Hard Drive with Secure PIN code access The disk G is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G? Did you know that tens of millions of external data storage devices are lost every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB (Universal Serial Bus) flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on You Tube, your business data sent to a competitor, your personal & financial information used for fraudulent purposes. The Information CommissionerÂ’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This

Includes::
the loss of an unencrypted portable hard drive or USB (Universal Serial Bus) flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media focus. The disk G can protect you against all of this. Once access to the disk G is granted by entering the correct 6-16 digit PIN, data can be copied to the disk G using any off the shelf backup software, or simply drag & drop files & directories using Windows Explorer. Once the disk G is disconnected, all data is encrypted & cannot be accessed unless the correct PIN is entered. Military strength Hardware encryption The encryption chipset incorporated within the disk G encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The disk G is the only USB (Universal Serial Bus) hard drive to be awarded the CESG CCTM government accreditation. The disk G also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “ The design & strength of all key lengths of the AES algorithm (i.e. 128, 192 & 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.” Brute Force Hack Defence Mechanism The disk G uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected & then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the disk G assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset & reformat to redeploy the disk G. VTC Technology The disk G also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating disk G*Â’s electronics. What is the difference between software & hardware encryption? Software encryption: Complex passwords can be cracked easily & quickly with a Brute Force Attack Simple password cracking software is readily available on the internet, often free of charge Software encryption is vulnerable to key loggers Â- where every key pressed is logged in either a software or hardware key logger Software encryption can be corrupted by viruses Software encryption is much slower when compared to hardware encryption Software encryption needs to be installed on each computer that the external storage device is used on Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required

...
Available
£128.99
The disk G is a secure, compact & affordable USB (Universal Serial Bus) 2.0 hard drive, employing PIN code access Key Features Secure access with personalised 6-16 digit PIN Encrypts all data on the fly, as fast as any USB (Universal Serial Bus) 2.0/3.0 hard drive Admin feature Â- set 1 Admin & up to 10 user PIN codes Utilises FIPS PUB 197 Validated Encryption Algorithm Guaranteed with 3 year warranty Portable Encrypted Hard Drive with Secure PIN code access The disk G is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G? Did you know that tens of millions of external data storage devices are lost every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB (Universal Serial Bus) flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on You Tube, your business data sent to a competitor, your personal & financial information used for fraudulent purposes. The Information CommissionerÂ’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This

Includes::
the loss of an unencrypted portable hard drive or USB (Universal Serial Bus) flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media focus. The disk G can protect you against all of this. Once access to the disk G is granted by entering the correct 6-16 digit PIN, data can be copied to the disk G using any off the shelf backup software, or simply drag & drop files & directories using Windows Explorer. Once the disk G is disconnected, all data is encrypted & cannot be accessed unless the correct PIN is entered. Military strength Hardware encryption The encryption chipset incorporated within the disk G encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The disk G is the only USB (Universal Serial Bus) hard drive to be awarded the CESG CCTM government accreditation. The disk G also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “ The design & strength of all key lengths of the AES algorithm (i.e. 128, 192 & 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.” Brute Force Hack Defence Mechanism The disk G uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected & then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the disk G assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset & reformat to redeploy the disk G. VTC Technology The disk G also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating disk G*Â’s electronics. What is the difference between software & hardware encryption? Software encryption: Complex passwords can be cracked easily & quickly with a Brute Force Attack Simple password cracking software is readily available on the internet, often free of charge Software encryption is vulnerable to key loggers Â- where every key pressed is logged in either a software or hardware key logger Software encryption can be corrupted by viruses Software encryption is much slower when compared to hardware encryption Software encryption needs to be installed on each computer that the external storage device is used on Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required

...
Available
£137.99
The disk G is a secure, compact & affordable USB (Universal Serial Bus) 2.0 hard drive, employing PIN code access Key Features Secure access with personalised 6-16 digit PIN Encrypts all data on the fly, as fast as any USB (Universal Serial Bus) 2.0/3.0 hard drive Admin feature Â- set 1 Admin & up to 10 user PIN codes Utilises FIPS PUB 197 Validated Encryption Algorithm Guaranteed with 3 year warranty Portable Encrypted Hard Drive with Secure PIN code access The disk G is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G? Did you know that tens of millions of external data storage devices are lost every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB (Universal Serial Bus) flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on You Tube, your business data sent to a competitor, your personal & financial information used for fraudulent purposes. The Information CommissionerÂ’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This

Includes::
the loss of an unencrypted portable hard drive or USB (Universal Serial Bus) flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media focus. The disk G can protect you against all of this. Once access to the disk G is granted by entering the correct 6-16 digit PIN, data can be copied to the disk G using any off the shelf backup software, or simply drag & drop files & directories using Windows Explorer. Once the disk G is disconnected, all data is encrypted & cannot be accessed unless the correct PIN is entered. Military strength Hardware encryption The encryption chipset incorporated within the disk G encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The disk G is the only USB (Universal Serial Bus) hard drive to be awarded the CESG CCTM government accreditation. The disk G also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “ The design & strength of all key lengths of the AES algorithm (i.e. 128, 192 & 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.” Brute Force Hack Defence Mechanism The disk G uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected & then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the disk G assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset & reformat to redeploy the disk G. VTC Technology The disk G also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating disk G*Â’s electronics. What is the difference between software & hardware encryption? Software encryption: Complex passwords can be cracked easily & quickly with a Brute Force Attack Simple password cracking software is readily available on the internet, often free of charge Software encryption is vulnerable to key loggers Â- where every key pressed is logged in either a software or hardware key logger Software encryption can be corrupted by viruses Software encryption is much slower when compared to hardware encryption Software encryption needs to be installed on each computer that the external storage device is used on Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required

...
Available
£188.00
The disk G is a secure, compact & affordable USB (Universal Serial Bus) 2.0 hard drive, employing PIN code access Key Features Secure access with personalised 6-16 digit PIN Encrypts all data on the fly, as fast as any USB (Universal Serial Bus) 2.0/3.0 hard drive Admin feature Â- set 1 Admin & up to 10 user PIN codes Utilises FIPS PUB 197 Validated Encryption Algorithm Guaranteed with 3 year warranty Portable Encrypted Hard Drive with Secure PIN code access The disk G is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G? Did you know that tens of millions of external data storage devices are lost every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB (Universal Serial Bus) flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on You Tube, your business data sent to a competitor, your personal & financial information used for fraudulent purposes. The Information CommissionerÂ’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This

Includes::
the loss of an unencrypted portable hard drive or USB (Universal Serial Bus) flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media focus. The disk G can protect you against all of this. Once access to the disk G is granted by entering the correct 6-16 digit PIN, data can be copied to the disk G using any off the shelf backup software, or simply drag & drop files & directories using Windows Explorer. Once the disk G is disconnected, all data is encrypted & cannot be accessed unless the correct PIN is entered. Military strength Hardware encryption The encryption chipset incorporated within the disk G encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The disk G is the only USB (Universal Serial Bus) hard drive to be awarded the CESG CCTM government accreditation. The disk G also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “ The design & strength of all key lengths of the AES algorithm (i.e. 128, 192 & 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.” Brute Force Hack Defence Mechanism The disk G uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected & then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the disk G assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset & reformat to redeploy the disk G. VTC Technology The disk G also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating disk G*Â’s electronics. What is the difference between software & hardware encryption? Software encryption: Complex passwords can be cracked easily & quickly with a Brute Force Attack Simple password cracking software is readily available on the internet, often free of charge Software encryption is vulnerable to key loggers Â- where every key pressed is logged in either a software or hardware key logger Software encryption can be corrupted by viruses Software encryption is much slower when compared to hardware encryption Software encryption needs to be installed on each computer that the external storage device is used on Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required

...
Available
£335.00
The disk G SSD is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access Key Features Super Resiliant & Robust
- portable encrypted Solid State Drive Your choice of Real-time 128-bit or 256-bit AES Hardware Encryption Administrator Feature
- set 1 Admin PIN & up to 10 user PIN passkeys Secure PIN Access via alphanumeric keypad (6-16 digits) 3 Year Warranty The disk G SSD is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G SSD? Based around a super resilient Solid State Drive & with no software to install, easy setup & Real-time 128-bit or 256-bit AES Hardware Encryption, the i Storage disk G SSD is the toughest data storage solution on the market. Do you only access your data when youÂ’re at home or at the office? We know that not all job assignments or business travel takes place in ideal environments. The cold, the heat as well as humid conditions are common work environments for many. Knocks, drops, bumps & vibration are also a concern, as are sandy & dusty environments. ItÂ’s in these cases that the robustness of a Solid State Portable Drive is paramount. A drive cannot fail & data cannot afford to be lost. Your drive must not only be rugged but also secure & this is where the i Storage disk G Solid State Drive is unparalleled. Why use the i Storage disk G Solid State Drive? 5x greater life expectancy than premium rotational hard drives Works in extreme temperatures
- 0° C to 70° C Works in 95% humidity at temps under 131° F (55°C) Virtually shock & vibration resistant
- Rated to: Shock 1500G/0.5ms, Vibration 20G/20-2000 Hz With no moving parts, the disk G* SSD is completely silent Easy to use keypad, software free design & ability to work on ANY operating system makes corporate deployment a breeze. With an easy to use keypad design & software free setup, the i Storage disk G SSD enables you to access the drive with your own unique 6-16 digit PIN. Featuring either AES 128-bit or 256-bit hardware encryption, the i Storage disk G SSD provides seamless real-time encryption, keeping your data safe even if the solid state drive is removed from its enclosure. With no software installation required for setup or operation, the i Storage disk G SSD provides stress free deployment in a multitude of environments. Its Administrator feature allows enrolment of up to ten unique user IDÂ’s & one administrator, making it a useful business collaboration tool. The i Storage disk G SSD low powered design & virtually indestructible construction is perfect for using with notebooks & taking your data on the road. Extremely portable, the i Storage disk G SSD compact, robust design features a convenient integrated USB (Universal Serial Bus) cable; eliminating the need to carry around cords & means that you can be connected at the flick of a fingertip. With storage capacities up to 256GB ItÂ’s perfect for storing that priceless data, whether it be your back-up, documents, photos, music or video files; the i Storage disk G SSD is the ideal storage device to safely transport your data between home & office, or wherever life takes you. With the i Storage disk G SSD, you know that your data is secure. Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required



...
Available
£619.00
The disk G SSD is the worldÂ’s most secure, compact & affordable USB2 portable hard drive, employing PIN code access Key Features Super Resilient & Robust
- portable encrypted Solid State Drive Your choice of Real-time 128-bit or 256-bit AES Hardware Encryption Administrator Feature
- set 1 Admin PIN & up to 10 user PIN passkeys Secure PIN Access via alphanumeric keypad (6-16 digits) 3 Year Warranty The disk G SSD is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G SSD? Based around a super resilient Solid State Drive & with no software to install, easy setup & Real-time 128-bit or 256-bit AES Hardware Encryption, the i Storage disk G SSD is the toughest data storage solution on the market. Do you only access your data when youÂ’re at home or at the office? We know that not all job assignments or business travel takes place in ideal environments. The cold, the heat as well as humid conditions are common work environments for many. Knocks, drops, bumps & vibration are also a concern, as are sandy & dusty environments. ItÂ’s in these cases that the robustness of a Solid State Portable Drive is paramount. A drive cannot fail & data cannot afford to be lost. Your drive must not only be rugged but also secure & this is where the i Storage disk G Solid State Drive is unparalleled. Why use the i Storage disk G Solid State Drive? 5x greater life expectancy than premium rotational hard drives Works in extreme temperatures
- 0° C to 70° C Works in 95% humidity at temps under 131° F (55°C) Virtually shock & vibration resistant
- Rated to: Shock 1500G/0.5ms, Vibration 20G/20-2000 Hz With no moving parts, the disk G* SSD is completely silent Easy to use keypad, software free design & ability to work on ANY operating system makes corporate deployment a breeze. With an easy to use keypad design & software free setup, the i Storage disk G SSD enables you to access the drive with your own unique 6-16 digit PIN. Featuring either AES 128-bit or 256-bit hardware encryption, the i Storage disk G SSD provides seamless real-time encryption, keeping your data safe even if the solid state drive is removed from its enclosure. With no software installation required for setup or operation, the i Storage disk G SSD provides stress free deployment in a multitude of environments. Its Administrator feature allows enrolment of up to ten unique user IDÂ’s & one administrator, making it a useful business collaboration tool. The i Storage disk G SSD low powered design & virtually indestructible construction is perfect for using with notebooks & taking your data on the road. Extremely portable, the i Storage disk G SSD compact, robust design features a convenient integrated USB (Universal Serial Bus) cable; eliminating the need to carry around cords & means that you can be connected at the flick of a fingertip. With storage capacities up to 256GB ItÂ’s perfect for storing that priceless data, whether it be your back-up, documents, photos, music or video files; the i Storage disk G SSD is the ideal storage device to safely transport your data between home & office, or wherever life takes you. With the i Storage disk G SSD, you know that your data is secure. Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required



...
Available
£269.72
i Storage disk Ashur Portable Encrypted USB (Universal Serial Bus) 3.0 Hard Drive with ultra-secure PIN Access Key Features Secure access with personalised 6-16 digit PIN Integrated USB (Universal Serial Bus) 3.0 cable
- Data transfer speeds up to 5 Gbps Encrypts all data on the fly, as fast as any USB3 hard drive Administration feature allows 1 Admin & up to 10 user PIN codes Guaranteed with 3 year warranty Looking for an effortless way to secure your data while taking advantage of lightning fast USB (Universal Serial Bus) 3.0 speeds? Look no further than the i Storage disk Ashur® 3.0, the latest addition to the i Storage family of ultra-secure, easy to use & affordable product range. With the same easy-to-use keypad design & software free setup, the i Storage disk Ashur 3.0 enables you to access the drive with your own unique pin but now at data transfer speeds of up to 10X faster than USB (Universal Serial Bus) 2. Utilises Military Grade FIPS PUB 197 Validated Encryption Algorithm Featuring your choice of AES-XTS 128 or 256-bit hardware encryption, the IStorage disk Ashur 3.0 seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure. Super-fast USB (Universal Serial Bus) 3.0 Connection Â- Data transfer speeds up to 10X faster than USB (Universal Serial Bus) 2.0 With a super speed USB (Universal Serial Bus) 3.0 interface, you can now access your files faster than ever before. The IStorage disk Ashur 3.0 is also backwards compatible with USB (Universal Serial Bus) 2.0 & 1.1 ports. Software Free Design Â- With no admin rights to contend with the IStorage disk Ashur is a breeze to implement With no software installation required for setup or operation & the ability to run on any platform, the IStorage disk Ashur 3.0 provides stress free deployment in corporate environments. The IStorage disk Ashur can be configured with independent Admin & User PINs. The Administrator Feature allows enrolment of up to five unique User IDÂ’s & one Administrator. If the User forgets their PIN, the drive can be unlocked using the Admin PIN. Self-Destruct Password The disk Ashur has the ability to set a password that will reset the encryption key if needed. By resetting the encryption key all data on the drive will be lost & cannot be recovered. Drive Reset Feature The IStorage disk Ashur 3.0 also employs a useful drive reset feature, which can be implemented with a unique comm&. This clears all PINs & data, & creates a new randomly generated encryption key, enabling the drive to be reset & redeployed as many times as needed. Auto-lock Feature The unattended IStorage disk Ashur 3.0 can be configured to lock after a pre-determined amount of time of your choosing. Ideal for protecting your data when youÂ’re away from your desk. Data at Rest Protection All data, PINs, & encryption keys are always encrypted while at rest. Brute Force Self Destruct Feature The IStorage disk Ashur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After several incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the Disk Ashur assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset to redeploy the Disk Ashur. Wear Resistant Key Pad Designed with protection in mind, the entire IStorage disk Ashur family incorporates ‘wear resistantÂ’ keypads to hide key usage & avoid tipping off a potential hacker to the commonly used keys. VTC Technology Protection against hacker attempts doesnÂ’t stop with Brute Force. Incorporated into the IStorage disk AshurÂ’s electronics is ApricornÂ’s Variable Time Circuit (VTC) technology, working to thwart “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating the Disk AshurÂ’s electronics. Compact, Rugged Design Â- Perfect for taking your data on the road The IStorage disk AshurÂ’s low powered design is perfect for using with notebooks & taking your data on the road. Perfectly pocket-able, the IStorage disk AshurÂ’s compact, robust design features a 16-point Omni-directional shock mounting system & rubberized paint, protecting the drive from drops & knocks. The convenient integrated USB (Universal Serial Bus) 3.0 cable eliminates the need to carry around cords with you & means that you can be connected at the flick of a fingertip. Features at a glance: Military Grade FIPS PUB 197 Validated Encryption PIN activated 6-16 digits
- Alphanumeric keypad use a memorable number or word for your PIN Hardware Encrypted Drive
- Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from itÂ’s casing Super Speed USB (Universal Serial Bus) 3.0 Connection Administrator Password Feature
- Ideal for IT departments looking to secure their mobile users, by allowing setup of administrator access to the drive before being distributed to their user (s) Brute Force Self Destruct Feature Auto Lock Feature Drive Reset Feature Variable Time Circuit Technology OS & Platform Independent Â- Compatible with Windows, Mac, Linux & embedded systems No software or drivers required Wear Resistant Key Pad Brute Force Hack Defence Mechanism Customization service available Â- Contact i Storage for further information 1-Year warranty Why choose disk Ashur? Did you know that millions of external data storage devices are lost or stolen every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted USB (Universal Serial Bus) hard drive? Your data would be at the mercy of anyone who stumbles across it. The Information CommissionerÂ’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This

Includes::
the loss of an unencrypted USB (Universal Serial Bus) hard drive that contains client data. The ICO has been very clear in advising businesses & government bodies to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media attention. The i Storage disk Ashur can protect you against all of this.





...
Available
£117.50
i Storage disk Ashur Portable Encrypted USB (Universal Serial Bus) 3.0 Hard Drive with ultra-secure PIN Access Key Features Secure access with personalised 6-16 digit PIN Integrated USB (Universal Serial Bus) 3.0 cable
- Data transfer speeds up to 5 Gbps Encrypts all data on the fly, as fast as any USB3 hard drive Administration feature allows 1 Admin & up to 10 user PIN codes Guaranteed with 3 year warranty Looking for an effortless way to secure your data while taking advantage of lightning fast USB (Universal Serial Bus) 3.0 speeds? Look no further than the i Storage disk Ashur® 3.0, the latest addition to the i Storage family of ultra-secure, easy to use & affordable product range. With the same easy-to-use keypad design & software free setup, the i Storage disk Ashur 3.0 enables you to access the drive with your own unique pin but now at data transfer speeds of up to 10X faster than USB (Universal Serial Bus) 2. Utilises Military Grade FIPS PUB 197 Validated Encryption Algorithm Featuring your choice of AES-XTS 128 or 256-bit hardware encryption, the IStorage disk Ashur 3.0 seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure. Super-fast USB (Universal Serial Bus) 3.0 Connection Â- Data transfer speeds up to 10X faster than USB (Universal Serial Bus) 2.0 With a super speed USB (Universal Serial Bus) 3.0 interface, you can now access your files faster than ever before. The IStorage disk Ashur 3.0 is also backwards compatible with USB (Universal Serial Bus) 2.0 & 1.1 ports. Software Free Design Â- With no admin rights to contend with the IStorage disk Ashur is a breeze to implement With no software installation required for setup or operation & the ability to run on any platform, the IStorage disk Ashur 3.0 provides stress free deployment in corporate environments. The IStorage disk Ashur can be configured with independent Admin & User PINs. The Administrator Feature allows enrolment of up to five unique User IDÂ’s & one Administrator. If the User forgets their PIN, the drive can be unlocked using the Admin PIN. Self-Destruct Password The disk Ashur has the ability to set a password that will reset the encryption key if needed. By resetting the encryption key all data on the drive will be lost & cannot be recovered. Drive Reset Feature The IStorage disk Ashur 3.0 also employs a useful drive reset feature, which can be implemented with a unique comm&. This clears all PINs & data, & creates a new randomly generated encryption key, enabling the drive to be reset & redeployed as many times as needed. Auto-lock Feature The unattended IStorage disk Ashur 3.0 can be configured to lock after a pre-determined amount of time of your choosing. Ideal for protecting your data when youÂ’re away from your desk. Data at Rest Protection All data, PINs, & encryption keys are always encrypted while at rest. Brute Force Self Destruct Feature The IStorage disk Ashur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After several incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the Disk Ashur assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset to redeploy the Disk Ashur. Wear Resistant Key Pad Designed with protection in mind, the entire IStorage disk Ashur family incorporates ‘wear resistantÂ’ keypads to hide key usage & avoid tipping off a potential hacker to the commonly used keys. VTC Technology Protection against hacker attempts doesnÂ’t stop with Brute Force. Incorporated into the IStorage disk AshurÂ’s electronics is ApricornÂ’s Variable Time Circuit (VTC) technology, working to thwart “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating the Disk AshurÂ’s electronics. Compact, Rugged Design Â- Perfect for taking your data on the road The IStorage disk AshurÂ’s low powered design is perfect for using with notebooks & taking your data on the road. Perfectly pocket-able, the IStorage disk AshurÂ’s compact, robust design features a 16-point Omni-directional shock mounting system & rubberized paint, protecting the drive from drops & knocks. The convenient integrated USB (Universal Serial Bus) 3.0 cable eliminates the need to carry around cords with you & means that you can be connected at the flick of a fingertip.
...
Available

IStorage IS-DG-256-500 500GB DiskG USB 2.0 256-Bit 2.5 Inch Portable
Hard Drive

The diskG is a secure, compact & affordable USB 2.0 hard drive, employing PIN code access Key Features Secure access with personalised 6-16 digit PIN Encrypts all data on the fly, as fast as any USB 2.0/3.0 hard drive Admin feature – set 1 Admin and up to 10 user PIN codes Utilises FIPS PUB 197 Validated Encryption Algorithm Guaranteed with 3 year warranty Portable Encrypted Hard Drive with Secure PIN code access The diskG is the world’s most secure, compact and affordable USB 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The diskG can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast and
in many cases faster than any non-encrypted USB 2.0/3.0 hard drive. Should the diskG be lost or stolen, the user can rest assured that the data stored on the drive is safe and cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose diskG? Did you know that tens of millions of external data storage devices are lost every year and this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on YouTube, your business data sent to a competitor, your personal and financial information used for fraudulent purposes. The Information CommissionerÂ’s Office (ICO) now
has the power to fine businesses and government bodies up to £500, 000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted portable hard drive or USB flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media focus. The diskG can protect you against all of this. Once access to the diskG is granted by entering the correct 6-16 digit PIN, data can be copied to the diskG using
any off the shelf backup software, or simply drag and drop files and directories using Windows Explorer. Once the diskG is disconnected, all data is encrypted and cannot be accessed unless the correct PIN is entered. Military strength Hardware encryption The encryption chipset incorporated within the diskG encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The diskG is the only USB hard drive to be awarded the CESG CCTM government accreditation. The diskG also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “The
design and strength of all key lengths of the AES algorithm (i.e. 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.” Brute Force Hack Defence Mechanism The diskG uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected and then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the diskG assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and
requiring a total reset and reformat to redeploy the diskG. VTC Technology The diskG also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour and infiltrating diskG*’s electronics. What is the difference between software and hardware encryption? Software encryption: Complex passwords can be cracked easily and quickly with a Brute Force Attack Simple password cracking software is readily available on the internet, often free of charge Software encryption is vulnerable to key loggers – where every key pressed is logged in either a software or hardware key logger Software encryption can be corrupted by viruses Software encryption is much slower when compared to hardware encryption
Software encryption needs to be installed on each computer that the external storage device is used on Hardware encryption: The diskG cannot be brute force attacked The diskG is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The diskG is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required
Availability: In Stock
£146.99

Product Description

The disk G is a secure, compact & affordable USB (Universal Serial Bus) 2.0 hard drive, employing PIN code access Key Features Secure access with personalised 6-16 digit PIN Encrypts all data on the fly, as fast as any USB (Universal Serial Bus) 2.0/3.0 hard drive Admin feature Â- set 1 Admin & up to 10 user PIN codes Utilises FIPS PUB 197 Validated Encryption Algorithm Guaranteed with 3 year warranty Portable Encrypted Hard Drive with Secure PIN code access The disk G is the worldÂ’s most secure, compact & affordable USB (Universal Serial Bus) 2.0/3.0 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The disk G can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. ALL data stored on the drive is encrypted in Real-Time, making it as fast & in many cases faster than any non-encrypted USB (Universal Serial Bus) 2.0/3.0 hard drive. Should the disk G be lost or stolen, the user can rest assured that the data stored on the drive is safe & cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure. Why choose disk G? Did you know that tens of millions of external data storage devices are lost every year & this figure is rising. Have you ever considered the impact of losing your non-encrypted hard drive or USB (Universal Serial Bus) flash memory key? Your data would be at the mercy of anyone who stumbles across it. Your personal videos may appear on You Tube, your business data sent to a competitor, your personal & financial information used for fraudulent purposes. The Information CommissionerÂ’s Office (ICO) now has the power to fine businesses & government bodies up to £500, 000 for serious breaches of the Data Protection Act. This

Includes::
the loss of an unencrypted portable hard drive or USB (Universal Serial Bus) flash memory key that contains customer data. The ICO has been very clear in advising businesses to encrypt all data that workers access, they also recognise that data which is encrypted & lost or stolen is not vulnerable to compromise. Loss of confidential data can have a devastating effect on both businesses & consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses & adverse media focus. The disk G can protect you against all of this. Once access to the disk G is granted by entering the correct 6-16 digit PIN, data can be copied to the disk G using any off the shelf backup software, or simply drag & drop files & directories using Windows Explorer. Once the disk G is disconnected, all data is encrypted & cannot be accessed unless the correct PIN is entered. Military strength Hardware encryption The encryption chipset incorporated within the disk G encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The disk G is the only USB (Universal Serial Bus) hard drive to be awarded the CESG CCTM government accreditation. The disk G also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “ The design & strength of all key lengths of the AES algorithm (i.e. 128, 192 & 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.” Brute Force Hack Defence Mechanism The disk G uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected & then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the disk G assumes it is being attacked & will destroy the encryption key & lock itself, rendering the data useless & requiring a total reset & reformat to redeploy the disk G. VTC Technology The disk G also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour & infiltrating disk G*Â’s electronics. What is the difference between software & hardware encryption? Software encryption: Complex passwords can be cracked easily & quickly with a Brute Force Attack Simple password cracking software is readily available on the internet, often free of charge Software encryption is vulnerable to key loggers Â- where every key pressed is logged in either a software or hardware key logger Software encryption can be corrupted by viruses Software encryption is much slower when compared to hardware encryption Software encryption needs to be installed on each computer that the external storage device is used on Hardware encryption: The disk G cannot be brute force attacked The disk G is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard The disk G is not vulnerable to malware or viruses Encryption is performed in real-time thus there is no speed degradation No software or drivers are required

Reviews/Comments

Add New

Price History

Vouchers

No voucher codes found.
Do you know a voucher code for this product or supplier? Add it to Insights for others to use.

Facebook

Jargon Buster

USB - Universal Serial Bus
Inch - Equivalent to approximately 2.5cm
Computer - A programmable electronic machine which stores and manipulates data.
Warranty - A service provided by the retailer or manufacturer to ensure a device works for a period from new
compact - Carefuly designed to ensure an item has a minimal physical size
Key - A physical or virtual device or code used for opening something
Keyboard - A device with keys, letters, numbers and function keys used for interacting with a device
Keyboard - A musical instrument similar to a piano
World - A physical grouping, commonly used to describe earth and everything associated with ti
Office - A room where people work
speed - A measurement of how fast an object travels between two points
Year - The time it takes the planet earth to orbit the sun. This takes around 365.25 days.
Set - a group of items usually related to one another. Some objects cannot function without the complete set of items.
USB - Universal Serial Bus. A method of connecting a device to a computer
Compact - something that has a lot combined within a small space.
Personalised - Something that has been made unique towards an individual, commonly through graving.
Warranty - A purchasers guarantee from the manufacturer for replacement/fix of goods when faulty.
Affordable - Something that is within a set price range that can be afforded due to its reasonable price.
Simple - Basic, easy no difficulty in understanding.
Personal - Something that belongs more to an individual due to it affecting them more by relating to them.
Year - 365 days (366 days in a leap year), the time taken for planet earth to make one full revolution around the sun.
Design - A drawing or styles that shows the look and functionality of something before its made.
Feature - An attribute that makes something stand out.
Memory - A way to describe the way in which the brain can remember things.

Supplier Information

Ebuyer Business
Get ready to power up your tech game with Ebuyer (https://www.ebuyer.com/)! Explore a vast selection of the latest gadgets, electronics, and computing essentials at unbeatable prices. From cutting-edge laptops and gaming PCs to home appliances and office supplies, we've got everything you need to stay connected and productive. With fast delivery and top-notch customer service, Ebuyer is your go-to destination for all things tech. Don't settle for less – shop now and take your tech game to the next level with Ebuyer!
Page Updated: 2024-02-28 09:26:27

Community Generated Product Tags

Oh No! The productWIKI community hasn't generated any tags for this product yet!
Menu