Product code: usb_6100
Size: 6,0 x 1,8 x 0,9 cm
Capacity: 512 MB , 1 GB , 2 GB , 4 GB , 8 GB , 16 GB
Standard size, rectangular, wooden USB flash drive. Equipped with a removable cap and customisable on both sides with silkscreen printing or heat stamping.
Personalization Frontside: Silkscreen Printing ,Heat Stamping
Personalization Backside: Silkscreen Printing ,Heat Stamping
Packaging: Polybag , Window Box Standard , Custom Window box , Plastic Case Standard , Eco Box , Black Gift Box Standard , Tin Box Rectangle , Tin Box Round
Optional services: Erasable Data , Non-erasable data ,Icon , Renaming , Autorun , Eego , Flash To My Pc
- Why is strong authentication so important?
Encrypting data is not enough to ensure that your information is secure. If the authentication to access the data is weak then the strength of the encryption or the size of the encryption key is irrelevant. To ensure that your data stays encrypted and does not fall into the wrong hands, strong authentication is necessary to protect the encryption key and thus the overall data. By combining password, biometric, and/or smart card authentication with hardware that automatically locks down if too many authentications fail, significant levels of security are added to protect your encrypted information. Furthermore, with authentication performed in hardware, software attacks are ineffective.
- Why is a truly portable device so important?
True portability means the device can be used on any machine regardless of operating system, including unsecured public or shared systems. As long as USB mass storage is supported on the host machine, then the device will operate like any USB storage device. The hardware implementation of authentication and transparent encryption means that no locally installed software is needed and the device has the same mobility as a regular flash drive.
- Why is hardware-based encryption so important?
Hardware encryption offers more security and portability than software-based encryption. With software encryption, the data is processed on the host computer where it can be exposed to malicious software. By contrast, hardware encryption occurs within the trusted environment of the device. Because hardware-based encryption happens on the device transparently, no software needs to be installed and the flash drive is as fully portable as a regular, unencrypted USB device.
- Why is AES-256 encryption so important?
AES-256 encryption with 256-bit keys offers the strongest data protection available in a FIPS-approved symmetric encryption algorithm. The National Security Agency (NSA) considers the design of AES-256 and the strength of its key sizes sufficient for protecting its classified information. CNSS Policy No. 15 states that key sizes of 128, 192, and 256 bits are sufficient for SECRET classification, while only 192 and 256 bits are sufficient for TOP SECRET.