This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our site and services and assist with our promotional and marketing efforts. You can read more about this in our Privacy Policy.
Apricorn ASK3 USB flash drive 8 GB USB Type-A 3.2 Gen 1 (3.1 Gen 1) Black
In Stock
1 available
- 8GB
- 77 MB/s read
- 72 MB/s write
- USB type A
- Hardware encryption
SKU #: ASK3-NX-8GB
EAN #: 0708326914635
UNSPSC #: 43202010
Our fourth generation of Secure Keys brings next generation security features, up to 25% cooler operating temperatures, and an even lower cost. Software-Free, 100% hardware-based 256-bit AES XTS encrypted, onboard keypad PIN authenticated, and ultra-fast USB 3.2 (3.0) data transfer speeds. All Data is encrypted on the fly and the device’s PINs and Data remain encrypted while the drive is at rest. Completely cross-platform compatible and OS agnostic; thrives in Windows, Linux, Mac, Android, Chrome, embedded systems, and equipment possessing a powered USB port and storage file system. All internal componentry is protected from physical tampering with a layer of hardened epoxy, and locked-down firmware brings immunity to malware attacks such as BadUSB.
Meets the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data.
Windows-Based App that Quickly Sets Up Multiple Devices Simultaneously. Create custom profiles and mass configure multiple devices in a matter of seconds using the Aegis Configurator. To configure an expanded number of devices, use the Powered Aegis Configurator Hub bundle.
Admin (Device Configuration) Mode and User Access Mode. The Aegis Secure Key supports independent Admin and User PINs. The Admin mode controls the universal programmable settings of the device and can only be accessed with the Admin PIN. The User mode is limited to basic external drive functions like read /write, unlock / lock, etc. The data on the drive can also be accessed with the admin PIN in the User mode.
Drive is Unlocked by Entering a PIN on Keypad and not the Host Computer’s Keyboard. Until the device is unlocked via its keypad, it remains invisible to the host. The embedded keypad circumvents all hardware and software key logging attempts to capture passwords by excluding the host system from the authentication process. Polymer-coated buttons are wear-resistant and designed to not reveal most commonly used buttons.
Unique PIN Must be Established at Time of Setup. Eliminates Factory Default PIN Vulnerability. Out of the box, there are no factory pre-set default PINs. In order to set up and use the drive, a unique PIN must first be established by the Admin, from within the Admin mode.
Admin Can Program Device at Setup Requiring User to Establish a Unique PIN. Once a device is configured by the Admin, it can then be deployed in a state of USER FORCED ENROLLMENT in which the User must first establish his or her own User PIN before the drive can be accessed or used.
Creates State of User Forced Enrollment that Restores Access to Drive. In the event that a User PIN is forgotten, Recovery PINs can be programmed into the device to permit access to the drive’s data by creating a new state of User Forced Enrollment while the Admin PIN and the drive’s data remain intact. Once a replacement User PIN is generated, access to the drive is restored for the user.
Global, All Access Settings Controlled by Admin, and User Mode Controlling Individual Settings. Employed in situations that require the drive’s contents to be kept intact and unaltered for later examination. The two Read-Only modes are as follows: Universal Read Only is set by the admin from within the admin mode and can’t be modified or disabled by anyone but the admin. The second read-only mode can be set and disabled by a user but can also be enabled or disabled by the admin as well.
Admin Designates Minimum and Maximum PIN Lengths (between 7 and 16 Characters). The longer the PIN, the more secure the data on the device becomes. For example, the odds of brute force success go from 1/10,000,000 with a 7-digit PIN to 1/100,000,000 with an 8 digit PIN. In cases where the User sets up his or her own PIN from User Forced Enrollment, the Admin can set an enhanced User password length requirement as part of the overall security policy.
Can be Configured as Fixed Disk or Removable Media in Device Setup. Easily adapts to embedded equipment and OSs that will only recognize one or the other for removable storage. Windows, Mac, and Linux all deal with Mass Storage devices differently depending on whether they report themselves to the host as Removable Media or as Fixed Disks. Some applications or embedded systems may allow one type but not the other. Example: Windows 2 Go will work with devices that report as Fixed Disk but not as Removable Media. Alternately, there are USB boot drive creators and Windows imaging tools that will only work with Removable Media and not with Fixed Disk. It’s not uncommon for older equipment with built-in USB ports (such as those found in hospitals, manufacturing, and monitoring) to seek only Removable Media and ignore all Fixed Disk devices. U.S. Patent No. 10,338,840
Select the Number of Consecutive Invalid PIN Attempts Permitted (4-20) Before Crypto-Erase. All Aegis Secure Drives are unlocked (authenticated) by entering a PIN on their own onboard keypad. Since the PIN is not entered using the host computer’s keyboard, they are not vulnerable to software or hardware-based key-loggers or software-based brute force attacks. However, if the device comes under a physical brute force attack, your data is protected with a programmable “Brute Force Hack Defense Mechanism” which, if the programmed number (between 4 and 20) of consecutive incorrect password entries has been attempted, the device will delete its own encryption key and destroy the ability to decrypt its stored data.
Meets the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data.
Windows-Based App that Quickly Sets Up Multiple Devices Simultaneously. Create custom profiles and mass configure multiple devices in a matter of seconds using the Aegis Configurator. To configure an expanded number of devices, use the Powered Aegis Configurator Hub bundle.
Admin (Device Configuration) Mode and User Access Mode. The Aegis Secure Key supports independent Admin and User PINs. The Admin mode controls the universal programmable settings of the device and can only be accessed with the Admin PIN. The User mode is limited to basic external drive functions like read /write, unlock / lock, etc. The data on the drive can also be accessed with the admin PIN in the User mode.
Drive is Unlocked by Entering a PIN on Keypad and not the Host Computer’s Keyboard. Until the device is unlocked via its keypad, it remains invisible to the host. The embedded keypad circumvents all hardware and software key logging attempts to capture passwords by excluding the host system from the authentication process. Polymer-coated buttons are wear-resistant and designed to not reveal most commonly used buttons.
Unique PIN Must be Established at Time of Setup. Eliminates Factory Default PIN Vulnerability. Out of the box, there are no factory pre-set default PINs. In order to set up and use the drive, a unique PIN must first be established by the Admin, from within the Admin mode.
Admin Can Program Device at Setup Requiring User to Establish a Unique PIN. Once a device is configured by the Admin, it can then be deployed in a state of USER FORCED ENROLLMENT in which the User must first establish his or her own User PIN before the drive can be accessed or used.
Creates State of User Forced Enrollment that Restores Access to Drive. In the event that a User PIN is forgotten, Recovery PINs can be programmed into the device to permit access to the drive’s data by creating a new state of User Forced Enrollment while the Admin PIN and the drive’s data remain intact. Once a replacement User PIN is generated, access to the drive is restored for the user.
Global, All Access Settings Controlled by Admin, and User Mode Controlling Individual Settings. Employed in situations that require the drive’s contents to be kept intact and unaltered for later examination. The two Read-Only modes are as follows: Universal Read Only is set by the admin from within the admin mode and can’t be modified or disabled by anyone but the admin. The second read-only mode can be set and disabled by a user but can also be enabled or disabled by the admin as well.
Admin Designates Minimum and Maximum PIN Lengths (between 7 and 16 Characters). The longer the PIN, the more secure the data on the device becomes. For example, the odds of brute force success go from 1/10,000,000 with a 7-digit PIN to 1/100,000,000 with an 8 digit PIN. In cases where the User sets up his or her own PIN from User Forced Enrollment, the Admin can set an enhanced User password length requirement as part of the overall security policy.
Can be Configured as Fixed Disk or Removable Media in Device Setup. Easily adapts to embedded equipment and OSs that will only recognize one or the other for removable storage. Windows, Mac, and Linux all deal with Mass Storage devices differently depending on whether they report themselves to the host as Removable Media or as Fixed Disks. Some applications or embedded systems may allow one type but not the other. Example: Windows 2 Go will work with devices that report as Fixed Disk but not as Removable Media. Alternately, there are USB boot drive creators and Windows imaging tools that will only work with Removable Media and not with Fixed Disk. It’s not uncommon for older equipment with built-in USB ports (such as those found in hospitals, manufacturing, and monitoring) to seek only Removable Media and ignore all Fixed Disk devices. U.S. Patent No. 10,338,840
Select the Number of Consecutive Invalid PIN Attempts Permitted (4-20) Before Crypto-Erase. All Aegis Secure Drives are unlocked (authenticated) by entering a PIN on their own onboard keypad. Since the PIN is not entered using the host computer’s keyboard, they are not vulnerable to software or hardware-based key-loggers or software-based brute force attacks. However, if the device comes under a physical brute force attack, your data is protected with a programmable “Brute Force Hack Defense Mechanism” which, if the programmed number (between 4 and 20) of consecutive incorrect password entries has been attempted, the device will delete its own encryption key and destroy the ability to decrypt its stored data.
SKU | ASK3-NX-8GB |
---|---|
EAN | 0708326914635 |
Manufacturer | Apricorn |
In Stock | Y |
Memory | |
---|---|
Capacity | 8 GB |
Write speed | 72 MB/s |
Read speed | 77 MB/s |
Form factor | Cap |
Performance | |
Device interface | USB Type-A |
USB version | 3.2 Gen 1 (3.1 Gen 1) |
Capacity | 8 GB |
Write speed | 72 MB/s |
Read speed | 77 MB/s |
Rechargeable battery | Yes |
PIN-secured access | Yes |
Keypad integrated | Yes |
Password protection | Yes |
Fingerprint reader | No |
Hardware encryption | Yes |
Design | |
International Protection (IP) code | IP67 |
Product colour | Black |
Form factor | Cap |
Security | |
PIN-secured access | Yes |
Keypad integrated | Yes |
Password protection | Yes |
Fingerprint reader | No |
Hardware encryption | Yes |
Power | |
---|---|
Rechargeable battery | Yes |
Technical details | |
USB version | 3.2 Gen 1 (3.1 Gen 1) |
Product colour | Black |
Harmonized System (HS) code | 84717070 |
Weight & dimensions | |
Width | 81 mm |
Weight | 22 g |
Height | 9.5 mm |
Depth | 18.4 mm |
Packaging content | |
Quantity per pack | 1 pc(s) |
Logistics data | |
Harmonized System (HS) code | 84717070 |