Introducing the datAshur PRO2
The datAshur PRO² USB 3.2 Gen 1 flash drive is a PIN-authenticated, AES-XTS 256-bit hardware encrypted flash drive that securely
encrypts, stores and protects data to military standards.
The datAshur PRO² allows you to safeguard valuable and sensitive data to ensure compliance with str
ingent data protection and confidentiality regulations and directives, such as GDPR, HIPAA, SOX, CCPA and more.
Easy to use
Simply enter a 7-15 digit PIN to authenticate and use as a normal flash drive.
When the drive is disconnected, all data is encrypted (full disk encryption) using AES-XTS 256-bit hardware encryption (no software required).
validated, tamper proof & evident design
All data stored on the datAshur PRO² is encrypted using FIPS PUB 197 validated, AES-XTS 256-bit hardware encryption. All components incorporated within the datAshur PRO2 are completely covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the components. The drive is also designed to be tamper evident making it obvious if it has been pried open and tampered with.
Wear resistant keypad
The onboard keypad is covered by a layer of polymer coating that protects the keys and hides key usage to avoid tipping off a potential hacker to commonly used keys.
Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor.
The datAshur PRO² is the world’s only USB flash drive to incorporate a secure microprocessor that is Common Criteria EAL5+ certified, which enhances security through true random number generation and built-in cryptography. The data encryption key is protected by FIPS and Common Criteria validated wrapping algorithms.
The microprocessor offers ultimate security against hackers, detecting and responding to tampering with features such as:
⋅ Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks
· Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors
· Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection
· Secure Memory Management/Access Protection
No need to worry about spills.
The drive’s IP68 accreditation means it will survive being submerged under 1.5m of water for 30 minutes and deemed fit enough to withstand dust, dirt and sand.
Independent User & Admin PINs
Which makes it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN. The Administrator can then allow the User to set a new User PIN.
Read only (write protect) – Dual Mode
Both the Admin and User can configure the datAshur PRO² as a read only (write protect) drive. If configured by the Admin, the feature cannot be modified or disabled by the User, allowing the Admin to pre-provision a drive with pre-loaded content as read-only for the User.
OS & Host independent – works across any host and embedded systems
No software required; the drive will work on any device with a USB port.
Compatible with: MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients, Embedded Systems, Citrix and VMware
Brute force hack defence mechanism
Intelligently programmed to protect against all forms of brute force attacks.
If the User PIN is entered incorrectly 10 consecutive times, the User PIN will be deleted and the drive can only be accessed by entering the Admin PIN or One-time User recovery PIN. (Admin can change this from the default 10 incorrect PIN entries, to 1-9, for the User only)
If the Admin PIN is entered incorrectly 10 consecutive times, all data, PINs and the encrypted encryption key will be lost forever.
→ USB flash drive with Aluminium sleeve
→ Quick Start Guide
→ 3 Year Warranty
Automatically locks when unplugged from the host computer or when power to the USB port is turned off. It can also be set to automatically lock after a predetermined amount of time.
Pre-program the datAshur PRO² with a self-destruct PIN, once entered, the data, encrypted encryption key and all PINs are deleted and rendered as lost forever.
Deletes the encrypted encryption key, all PINs and renders all data as lost forever. The drive can then be redeployed which randomly generates a new encrypted encryption key, a process that can be repeated as many times as required.
Whitelisting on networks
Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate