iStorage diskAshur DT2 USB 3.1 Portable HDDs
- USB 3.1 Encrypted Desktop Hard Drive
- Capacities up to 16TB*
- Designed to be certified to FIPS 140-2 Level 3, NCSC CPA, Common Criteria and NLNCSA
- AES-XTS 256-bit hardware encryption – no software required
- OS & Platform independent
- Employs EDGE* Technology
What is diskAshur DT2?
The diskAshur DT2 is the world's first and only NCSC CPA and NLNCSA BSPA certified encrypted desktop hard drive.
An easy to use ultra-secure, PIN authenticated, USB 3.1 desktop hard drive with capacities of up to 12TB and real-time AES-XTS 256-bit hardware encryption, software free design and super-fast data transfer speeds. The diskAshur DT2 has an easy-to-use keypad design enabling you to securely access the drive with your own unique 7-15 digit PIN and with software free setup and operation, the diskAshur DT2 is platform/device independent and works across all operating systems including all versions of MS Windows, MacOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems. In fact, it will work on any device with a USB port! One of the unique and underlying security features of the GDPR compliant diskAshur DT2 is the dedicated hardware-based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass attacks and more. Unlike other solutions, the diskAshur DT2 reacts to an automated attack by entering the deadlock frozen state, which renders all such attacks as useless. In plain and simple terms, without the PIN there’s no way in!
**EDGETM (Enhanced Dual Generating Encryption) Technology Offering advanced portable data security via built-in FIPS PUB 197 validated AES-XTS 256-bit hardware encryption engine. The data encryption key is randomly generated by a Common Criteria EAL4+ ready Random Number Generator and protected by FIPS validated wrapping algorithms. uniquely featuring a dedicated on-board Common Criteria EAL4+ ready secure microprocessor to enhance security through true random number generation and built-in cryptography. The security component employs physical protection mechanisms to protect itself from any external tamper, bypass laser attacks and fault injections and incorporates active-shield violation technology. More specifically, the secure microprocessor reacts to all forms of automated hacking attempts by entering the deadlock frozen state where the device can only restart through a ‘Power On’ reset procedure (i.e. power off/power on). The