Ironkey Personal Instrukcja Użytkownika Strona 6

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 32
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 5
PAGE 5IRONKEY USER GUIDE
Device Diagrams
The IronKey has been designed from the ground up with security in mind.
A combination of advanced security technologies are used to ensure
maximum protection of your data. Additionally, the IronKey has been
designed to be physically secure, to prevent hardware-level attacks and
tampering, as well as to make the device rugged and long-lasting. You can
rest assured that your data is secured when you carry an IronKey.
This IronKey Cryptochip is hardened against physical attacks such as pow-
er attacks and bus snifng. It is physically impossible to tamper with its
protected data or reset the password counter. If the Cryptochip detects
a physical attack from a hacker, it will destroy the encryption keys, making
the stored encrypted les inaccessible.
Up to 8 gigabytes
of secure storage
INCLUDES
Flash-Trash technology
for complete data erasure
SMART
Stores data up to 10 times
longer than ordinary flash drives
RELIABLE
Waterproof & tamper-
proof metal casing
RUG GED
IronKey Cryptochip with
military-grade cryptography
SAFE
Transfers data up to 8 times
faster than ordinary flash drives
FAST
The Worlds Most Secure Flash Drive
TM
Stamped unique
serial number
Area to engrave
your name/code
Drilled hole for
keyring/lanyard
Multi-color LED
USB 2.0
Connector
Metal Cap
Rugged metal case
lled solid with epoxy
Przeglądanie stron 5
1 2 3 4 5 6 7 8 9 10 11 ... 31 32

Komentarze do niniejszej Instrukcji

Brak uwag