Click here to close now.

Welcome!

iPhone Authors: Pat Romanski, Brett Hofer, Liz McMillan, Dana Gardner, Carmen Gonzalez

News Feed Item

Apricorn Announces Aegis Secure Key FIPS 140-2 Level 3 Validation

USB Flash Drive Receives Data Security Approval for use in Government

POWAY, Calif., Feb. 27, 2013 /PRNewswire/ -- Apricorn (www.apricorn.com), a leading manufacturer of secure encrypted USB drives for government, healthcare and business today announced its FIPS 140-2 Level 3 validation for the Aegis Secure Key. The encrypted flash drive incorporates secure PIN authentication via an embedded keypad and 256-bit AES hardware encryption, providing 100% hardware based security solution.

(Photo: http://photos.prnewswire.com/prnh/20130227/NE67348)

Required for all devices procured by the US government that utilize cryptography, the Aegis Secure Key's FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. The Aegis Secure Key's FIPS 140-2 Level 3 certification encompasses all areas including the Aegis Secure Key's physical tamper-resistant features as well as its identity-based authentication.

The Aegis Secure Key FIPS validation covers multiple layers of data protection:

  • Military grade AES CBC 256-bit hardware encryption – protects 100% data in real time
  • Alphanumeric keypad – Onboard keypad prevents hardware and software key logging
  • 7-15 digit PIN code access – Up to 15 digit memorable number or word
  • Software Free Design – Cross platform compatible, and no Administrator Rights required
  • Tamper resistant – Epoxy resin destroys circuit board components if tampered with
  • Tough, water resistant design – Sealed extruded aluminum casing protects from dust and water
  • Auto-lock on loss of power or ejection to prevent unauthorized access
  • Brute Force Attack Defense Mechanism – Crypto erase after 10 consecutive failed entries
  • Encryption keys are randomly generated
  • OS/Host independent – Compatible with Windows, Mac, Linux, Chrome, Android and Symbian
  • Available in 4, 8, 16 and 32GB capacity (32GB validation pending)

The Aegis Secure Key does not employ software, either for its authentication or encryption, and uses an onboard keypad to unlock the drive before connecting to a USB port. This hardware based authentication ensures that key loggers are unable to capture the password via a keyboard. This is coupled with the Aegis Secure Key's Brute Force Attack Defense Mechanism, a security measure that performs a crypto erase that destroys the encryption key when the PIN is incorrectly entered 10 consecutive times.

"Already deployed by many businesses as part of their data loss prevention (DLP) strategy, the Aegis Secure Key's FIPS validation offers confirmation for corporate America, and also for those in the government and the military, that our design and encryption implementation are secure," said Mike McCandless, VP of Sales and Marketing. "With thousands of unencrypted USB drives going missing every year and security threats from key loggers and malware, it is imperative that companies look to hardware based authentication and encryption to protect their data. The Aegis Secure Key provides that."

Securing FIPS 140-2 Level 3 validation means that Apricorn's Aegis Secure Key has passed rigorous testing conforming to CAVP (Cryptographic Algorithm Validation Program) and the CMVP (Cryptographic Module Validation Program) by a certified third-party laboratory. The Aegis Secure Key's FIPS 140-2 validation has been listed by the US National Institute of Standards and Technology (NIST) under certification 1876.

Availability
Apricorn's Aegis Secure Key is available from online retailers and Apricorn's website at http://www.apricorn.com/securekey

Pricing
4 GB: $65
8 GB: $95
16 GB: $125
32 GB: $179** (validation pending)

Warranty
3 year limited

High Resolution Image
Photo: http://www.apricorn.com/media/high_res/AegisSecureKey.jpg

System Requirements
Works with virtually any powered USB port, and fully compatible with Microsoft Windows, Apple Mac computers and Linux, as well as Symbian and Android powered tablets and smartphones. 

About Apricorn

Apricorn, a leader in personal storage, has provided secure storage solutions for some of the most prominent names in the industries of finance, healthcare and government. Apricorn's products have become the standard for many mobile security strategies. Apricorn was founded in 1983 and has developed numerous award winning products under the Apricorn brand and has been an OEM supplier to a number of leading computer manufacturers. Apricorn is headquartered in Poway, California, and distributes products throughout North America and Canada.  For additional information please visit http://www.apricorn.com.

Company Contact:

Media Contact:                        

Apricorn  

ProLine Communications

Michelle Fischer 

Bruce Freeman

(858) 513-4480  

(973) 716-9457

[email protected]

[email protected]

Further information on FIPS 140-2 Level 3 certification can be found at http://www.nist.gov

Aegis Secure Key incorporates DataLock® Technology licensed from ClevX, LLC

One gigabyte (GB) = one billion bytes; accessible capacity will be less and actual capacity depends on the operating environment and formatting.

All trademarks are the property of their respective owners.

SOURCE Apricorn

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed expressly to run Docker. He will also discuss Rancher, an orchestration and service discovery platf...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
Every innovation or invention was originally a daydream. You like to imagine a “what-if” scenario. And with all the attention being paid to the so-called Internet of Things (IoT) you don’t have to stretch the imagination too much to see how this may impact commercial and homeowners insurance. We’re beyond the point of accepting this as a leap of faith. The groundwork is laid. Now it’s just a matter of time. We can thank the inventors of smart thermostats for developing a practical business application that everyone can relate to. Gone are the salad days of smart home apps, the early chalkb...
In the consumer IoT, everything is new, and the IT world of bits and bytes holds sway. But industrial and commercial realms encompass operational technology (OT) that has been around for 25 or 50 years. This grittier, pre-IP, more hands-on world has much to gain from Industrial IoT (IIoT) applications and principles. But adding sensors and wireless connectivity won’t work in environments that demand unwavering reliability and performance. In his session at @ThingsExpo, Ron Sege, CEO of Echelon, will discuss how as enterprise IT embraces other IoT-related technology trends, enterprises with i...
When it comes to the Internet of Things, hooking up will get you only so far. If you want customers to commit, you need to go beyond simply connecting products. You need to use the devices themselves to transform how you engage with every customer and how you manage the entire product lifecycle. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, will show how “product relationship management” can help you leverage your connected devices and the data they generate about customer usage and product performance to deliver extremely compelling and reliabl...
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to make sense of it all.
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics archive, in his session at @ThingsExpo, Jim Kaskade, Vice President and General Manager, Big Data & Ana...
One of the biggest impacts of the Internet of Things is and will continue to be on data; specifically data volume, management and usage. Companies are scrambling to adapt to this new and unpredictable data reality with legacy infrastructure that cannot handle the speed and volume of data. In his session at @ThingsExpo, Don DeLoach, CEO and president of Infobright, will discuss how companies need to rethink their data infrastructure to participate in the IoT, including: Data storage: Understanding the kinds of data: structured, unstructured, big/small? Analytics: What kinds and how responsiv...
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use cases.
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing demand and the rapidly changing workspace model.
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. He discussed opportunities and challenges ahead for the IoT from a market and technical point of vie...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS solutions that provide a Hadoop flavor either make choices for customers very flexible in the name of opti...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and expertise to guard against those threats. But will that be enough? In the foreseeable future attacks w...