IronKey launched its S200 device for government and enterprise customers, featuring hardened physical security, the latest Cryptochip technology, active anti-malware and enhanced management capabilities.
IronKey S200 is the first and only USB flash drive to meet the rigorous government security requirements of FIPS 140-2, Security Level 3. It comes with hardware-based AES 256-bit encryption in CBC mode and it features the secure management of encryption keys in an amper-resistant and tamper-evident rugged metal case.
Its anti-malware capabilities in hardware provide protection from malware and prevent its spread onto enterprise and government networks:
- AutoRun lock-down protects against worms.
- Read-only mode prevents malware on infected hosts from infecting IronKey devices.
- Trusted network restrictions prevent IronKey devices from unlocking on uncontrolled PCs.
- Optional anti-virus/anti-malware scanning cleans the devices in the background.
IronKey S200’s dual-channel architecture enables significant performance when writing large and small files to the drive. It includes extended-life flash memory capable of running high-bandwidth applications such as data backups, virtual machines, or bootable mobile desktops.
Customers can use the Enterprise Management Cloud Service over the Internet for the enforcement of security policies, security and anti-malware updates, and the tracking and auditing of hundreds or thousands of devices. For those that wisht to host a server by themselves there’s an optional Enterprise Management Server.
IronKey FIPS 140-2, Level 3 Validation
The IronKey S200 USB flash drive has been awarded FIPS certificate 1149. The device includes the ability to prevent intruders from gaining access to Critical Security Parameters (CSPs) held within the cryptographic module.
The physical security mechanisms required at Security Level 3 validate that IronKey thumb drives can detect and respond to attempts of physical access, use or modification of the cryptographic module. IronKey includes the physical security mechanisms required for the validation including the use of production-grade components, hard potting material to encapsulate the chip circuitry and a hard metallic enclosure.