What Systems Can I Use It On; How Secure Is It - Imation IronKey Enterprise S250 Guia Del Usuario

Tabla de contenido

Publicidad

What systems can I use it on?

»
Windows
8.1
®
»
Windows
8
®
»
Windows
7
®
»
Windows
Vista
®
»
Windows
XP (SP2+)
®
»
Mac OS
X (10.9+)
®
»
Linux (2.6+)
The computer must have a USB 2.0 port for high-speed data transfer. A USB 1.1 port or
powered hub will also work, but will be slower.
Some applications are available only for specific systems:
»
Windows Only
Onboard Firefox
Secure Backup
Virtual Keyboard
IronKey Identity Manager
RSA SecurID
Secure Sessions
Device updates
CRYPTOCard
»
Mac Only—Auto-Launch Assistant

How secure is it?

IronKey Enterprise 250 Series has been designed from the ground up with security in mind. A
combination of advanced security technologies are used to ensure that only you can access your
data. Additionally, it has been designed to be physically secure, to prevent hardware-level attacks
and tampering, as well as to make the device rugged and long-lasting.
The IronKey Cryptochip is hardened against physical attacks such as power attacks and bus
sniffing. It is physically impossible to tamper with its protected data or reset the password
counter. If the Cryptochip detects a physical attack from a hacker, it destroys the Cryptochip
making the stored encrypted files inaccessible.
We strive to be very open about the security architecture and technology that we use in
designing and building this product. We use established cryptographic algorithms, we develop
threat models, and we perform security analyses (internal and third party) of our systems all the
way through design, development and deployment.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
PAGE 10

Publicidad

Tabla de contenido
loading

Productos relacionados para Imation IronKey Enterprise S250

Este manual también es adecuado para:

Ironkey enterprise d250

Tabla de contenido