DataLocker products secure sensitive data using military-grade 256-bit encryption. With a wide range of products, DataLocker offers both hardware based external storage and software based cloud storage encryption options. Hardware based products do not require software or drivers to manage, encrypt or decrypt data.
DataLocker technology makes it simple to ensure compliance with some of the strictest governmental regulations. Most DataLocker products are FIPS 140-2 validated, issued by the National Institute of Standards and Technology (NIST). FIPS validated DataLocker products are a cost-effective way to comply with HIPAA, SOX, DHS Initiatives, NRC, GLB and any other directive that requires data encryption.
DATALOCKER DL3 -Hardware encrypted USB 3.0 external hard drive, Up to 2TB in capacity, Requires no software or driver, Centrally Manageable, Optional two factor authentication - requires two modes of authentication (password plus a physical RFID tag)
DATALOCKER DL3 FE - Same exact features as the DL3, Dual Crypto, FIPS validated, hardware encrypted, USB 3.0 external hard drive
H200 BIO -FIPS 140-2 Level 3 validated, hardware encrypted, USB 2.0 external hard drive, Up to 1TB in capacity, Centrally manageable with ACCESS Enterprise, Fingerprint two factor authentication.
H300 -USB 3.0 encrypted external hard drive, Two versions: Basic and Enterprise (Enterprise version requires IronKey EMS), Up to 2TB in capacity, Centrally manageable with IronKey Enterprise Management Service or Server.
H350 -FIPS 140-2 Level 3 validated, USB 3.0 encrypted external hard drive, Two versions: Basic and Enterprise (Enterprise version requires IronKey EMS), FIPS 140-2 Level 3 validation, Up to 2TB in capacity, Centrally manageable with IronKey Enterprise Management Service or Server.
Sentry 3 FIPS -256 bit AES encryption, Ruggedized design, Fast USB 3.0 interface, Up to 64GB capacity, Centrally manageable with SafeConsole
Protecting your data, your mobile workforce, and your organization is easy with the IronKey EMS.
Efficiently manage device inventory, lifecycle and maintenance—even for users in the field.
Easily modify and update policies to permit and revoke user or administrative authorization.
Accurately manage users, groups, devices and service licenses— adding or subtracting as needed when your requirements and users change.
In conjunction with third-party device control solutions, establish whitelists to ensure that only secure IronKey devices can connect to an enterprise’s computer.
SafeConsole enables your organization to inventory, audit, manage and kill your SafeConsole enabled encrypted endpoints.
Integrate With Active Directory for Easy Provisioning.
Identify When and Where Your Managed Device is Used.
Manage Device Inventory, Lifecycle and Maintenance.
Configure With and Advanced Management Feature Set.