Securely stash away your sensitive data with the Aegis Secure Key 3NX Encrypted USB 3.1/3.0 Flash Drive (16GB) from Apricorn. Utilizing a USB Type-A connector, these drives feature full-disk 256-bit AES-XTS hardware encryption and are operated by a polymer-coated wear-resistant keypad built into the device. This keypad is designed to resist all key logging attempts.
AES-XTS 256-Bit Hardware Encryption
All data is encrypted on-the-fly with full-disk, military-grade AES-XTS 256-bit hardware encryption.
USB 3.0/3.1 Gen 1 Interface
Transfer files to and from the Aegis Secure Key NX via its USB 3.0/3.1 Gen 1 interface. USB 3.1 Gen 1 and USB 3.0 are synonymous.
Unlock the drive with a unique 7- to 16-digit number. All PIN entries and controls are performed on the keypad of the Aegis Secure Key. No critical security parameters are ever shared with the host computer. Until the secure USB drive device is unlocked via its keypad, it remains invisible to the host. The embedded keypad circumvents hardware and software key-logging attempts to capture passwords by excluding the host system from the authentication process. The wear-resistant, polymer-coated buttons are designed to not reveal commonly used keys.
Programmable Minimum PIN length
For added PIN length and enhanced security, minimum PIN length requirement can be increased from 7 characters up to a maximum of 16.
With no default factory preset PINs, the administrator is required to create a unique PIN upon first use. Forced enrollment can also be extended to first user PIN at setup.
The Aegis Secure Key doesn't require software, drivers, or updates, and it can be used without a keyboard. The Aegis Secure Key is compatible with Windows, Mac, and Linux systems, as well as most devices with a powered USB port.
Aegis Configurator Compatible
Configure multiple Configurator-compatible devices at the same time with pre-set device profiles using the Windows-based app.
Rugged, IP67-Certified Design
The Aegis Secure Key's rugged, extruded aluminum casing and polymer-coated keypad is resistant to dust and water. Inside, another layer of protection is added by encasing the inner componentry with a hardened epoxy compound to prevent physical access to the encryption circuitry.
Independent User and Admin PINs
The Aegis Secure Key can be configured with independent user and administrator PINs, making it an ideal device for corporate and government deployment. Should the user forget his or her PIN, the drive can still be unlocked with the administrator PIN, after which a new user PIN can be created.
One-Time Recovery PINs
If a user PIN is forgotten, up to 4 one-time use recovery PINs can be programmed to permit access to the drive's data.
Locks automatically whenever it's unplugged from its powered USB port, and is further programmable to lock after a predetermined period of inactivity.
Allows the drive to be cleared and redeployed. Capable of generating an infinite number of randomly generated encryption keys, the Aegis Secure Key NX can be reset as many times as desired.
After a predetermined number (programmable; up to 20) of incorrect PIN entry attempts, the Aegis Secure Key will conclude that it is under brute-force attack and will respond by performing a crypto-erase, deleting the encryption key and rendering all of the key's data useless.
Designated for specific cases in which the key needs to remain unlocked, such as during reboot, passing the key through a virtual machine, or similar situations that would normally prompt the key to automatically lock, Lock-Override Mode allows the key to remain unlocked through USB port re-enumeration and will not re-lock until USB power is interrupted.
Two Read-Only Modes
Suitable for accessing data on the key in a public setting to protect against USB viruses. Particularly important in forensics, read-only mode is ideal for applications that require data to be preserved in its original, unaltered state and can't be overwritten or modified. The Secure Key NX has two read-only modes. One is set by the administrator can't be modified or disabled by anyone else. The second read-only mode can be set and disabled by a user but can also be overridden by the administrator.
The last line of defense for data security, the Secure Key's Self-Destruct PIN defends against physically compromising situations by erasing the key's contents, leaving it in normal working order and appearing as if it has yet to be deployed.
Allows enrollment of one independent user and one administrator for setting parameters for PIN management, Read-Only, Auto-Lock, Self-Destruct, Lock-Override, and Brute Force modes. The user mode is limited to basic external drive functions such as read/write, unlock/lock, etc. The data on the drive can be accessed with the admin PIN in the user mode.