Take Control Of Your Data Security
USB flash drives get stolen. Or they are simply lost. When the device contains confidential information or personal data, the consequences are often disastrous. This has been illustrated by a string of well publicised cases in the recent years, ranging from confidential national security information falling in the wrong hands, to the breach of sensitive personal data belonging to thousands of medical patients. The data protection regulation (GDPR) imposes high standards for data governance and any organisation has a duty to apply a very high level of care and control to the way personal data is handled.
Integral’s hardware encrypted data storage solutions will give you peace of mind, knowing that whatever happens to your device, your data will remain secure.
Our USB drives come with different features (such as single or dual passwords), and different levels of encryption certification (including FIPS validated 140-2 Level 3, the highest level).
Why choose hardware encryption over software encryption?
With hardware based encryption, the encryption and decryption processes are carried out by a dedicated processor (part of the Integral Crypto hardware). In software encryption, the resources of the device on which the software is installed are used for the encrypting and decrypting of data. This makes hardware encryption much faster. Another significant advantage of hardware encryption is that the cryptographic key is stored in a separate inaccessible portion of memory storage, making it more secure than software encryption.
Integral Encrypted USB Drives
Courier 197 View Range |
Crypto 197 View Range |
Crypto Dual 197 View Range |
Crypto 140-2 View Range |
Crypto Dual 140-2 View Range |
|
---|---|---|---|---|---|
FIPS Validation & Certificate Number |
197 | 197 | 197 | 140-2 Level 3 | 140-2 Level 3 |
Brute-Force Password Attack Protection |
Yes - 6 attempts | Yes - 6 attempts | Yes - 6 attempts | Yes - 6 attempts | Yes - 6 attempts |
Rugged Waterproof Design |
- | Yes - Double-Layer | Yes - Triple-Layer | Yes - Double-Layer | Yes - Triple-Layer |
Tamper-Proof Casing | - | - | - | ✓ | ✓ |
Dual Password (One Admin, One User) |
- | - | ✓ | - | ✓ |
Auto-Lock | ✓ | ✓ | ✓ | ✓ | ✓ |
Secure Entry (8-16 Character High-Strength Password Required) |
✓ | ✓ | ✓ | ✓ | ✓ |
AES 256-bit Encryption |
Yes - Hardware | Yes - Hardware | Yes - Hardware | Yes - Hardware | Yes - Hardware |
Mandatory Encryption Of All Files |
✓ | ✓ | ✓ | ✓ | ✓ |
USB 3.0 | ✓ | ✓ | ✓ | ✓ | ✓ |
Dual OS - PC & Mac Compatible |
✓ | ✓ | ✓ | Windows Only | ✓ |
Zero Footprint (No Software Installation Required) |
✓ | ✓ | ✓ | ✓ | ✓ |
No Licence Fee | ✓ | ✓ | ✓ | ✓ | ✓ |
Personal ID Function | ✓ | ✓ | ✓ | ✓ | ✓ |
Warranty | 2 Year | 2 Year | 2 Year | 2 Year | 2 Year |
Multi-Lingual Interface | 24 Languages | 24 Languages | 26 Languages | 24 Languages | 26 Languages |
What is FIPS certification?
FIPS 197 | FIPS 197 is a high-level information security standard approved by the US Government that tests and checks the strength of the encryption algorithms within the device | |
140-2 Level 1 |
FIPS 140-2 (Level 1) is a higher grade of security standard that tests the strength of the encryption algorithms, plus the physical components to ensure that they are all production grade and thus capable of frequency and intensive use | |
140-2 Level 2 |
FIPS 140-2 (Level 2) tests everything in FIPS 140-2 (Level 1) plus the physical security to ensure that there are mechanisms to show evidence of tampering with the drive's components | |
140-2 Level 3 |
FIPS 140-2 (Level 3), which is the level our Crypto 140-2 drives, test everything in FIPS 140-2 (Level 1 and 2), plus ensures that there are mechanisms to destroy in the event that there is tampering |
Customisation
The Integral hardware encrypted Flash Drive range can be personalised with a designated company identifying name or number. This will allow a Network Administrator to block access to unrecognised USBs for security purposes, whilst allowing the Integral encrypted Flash Drive to function as the ‘official’ company drive.
During production a personalised tag (e.g. “LONDON UNIVERSITY”) can be embedded into the Crypto that can be viewed on a PC. The tag gives Endpoint software a convenient way to identify Integral drives.
Each drive can be personalized further (upon request) with an individual user specific personal tag e.g “LONDON UNIVERSITY” – USER1234” if required.
This personalisation can be offered on any Integral USB Flash Drive (requested at time of order).