SlideShare a Scribd company logo
1 of 12
Download to read offline
integralmemory.com
256-bit AES
hardware encrypted
product range
integralmemory.com
2
Integral Memory plc are one of the largest digital memory producers in Europe with more than 26 years of sales success.
Integral was founded in London, England during 1989 and quickly became one of Europe’s leading DRAM specialists.
Over the next two decades Integral expanded its product range as the solid-state flash memory market matured. Integral
has long-term partnerships with leading component suppliers including Toshiba, Samsung and Hynix. International sales
offices have been established in France, Spain and the Netherlands.
The Integral range includes a cutting-edge FIPS 140-2 validated Hardware Encrypted SSD and a selection of FIPS 140-2
validated, USB Flash Drives with AES 256-bit encryption; ensuring sensitive data stored on the USB cannot be compromised.
Hardware vs software encryption encryption
The major difference between hardware encryption and software encryption is that with hardware based encryption, the encryption and
decryption processes are carried out by a dedicated processor (part of the Integral Crypto hardware). In software encryption, the resources
of the device on which the software is installed are used for the encrypting and decrypting of data. This makes hardware encryption much
faster. Another significant advantage of hardware encryption is that the cryptographic key is stored in a separate inaccessible portion of
memory storage, making it more secure than software encryption.
What is the difference between FIPS 140-2 and FIPS 197 certification?
FIPS 197 certification looks at the hardware encryption algorithms used to protect the data. FIPS 140-2 is the next, more advanced level of
certification. FIPS 140-2 includes a rigorous analysis of the product’s physical properties. So, with a FIPS 140-2 certified SSD the tamper-proof
design of the circuit board has been approved, as well as the data encryption. FIPS certification proves that the product has been tested by an
independent government approved laboratory.
Hardware Encrypted USB Flash Drives
Portable data security is a challenge facing all IT departments and government bodies. All data that is off company premises is at risk.
Integral produce a range of AES 256-bit hardware encrypted USB Flash Drives that provide an easy to use, cost effective and highly
secure solution that is designed to work with your end-point security. Dual password versions are also available, making these more easy
to manage in I.T. departments.
Our encrypted USB Flash Drive range is FIPS 197/140-2 validated and all models are zero footprint, so no software installation is required.
All files transferred to the drive are automatically encrypted and are protected by a mandatory high-strength password. All Crypto products
will securely destroy data safely if the set password attempts are exceeded, protecting your data if lost or stolen.
Crypto SSD and
USB drives are
used and trusted
worldwide by
government
departments,
global corporations
and SMEs.
For detailed product information and technical support please visit our website.
IntegralMemoryTV
Our passion is to bring
you the latest memory
products built on quality,
reliability and great prices
Our Story
Watch our channel: youtube.com/IntegralMemoryTV
3
•	 USB 3.0 Superspeed data transfer - with PC/Mac compatible software
•	 Dual password / Master password override* in addition to a high-strength user password. If a user forgets their password the Crypto/Courier Dual
can be accessed with a master password by an IT administrator (optional)
•	 Rugged triple-layer waterproof design** - Protects the Drive against knocks, drops, break-in and submerging in water. The electronics are sealed
in epoxy resin and then shielded by a hardened inner case. The rubberised silicone outer casing provides a final layer of protection
•	 AES 256-bit hardware encryption
•	 FIPS 197 Validated
•	 Zero Footprint - No software installation required
•	 Secure Entry - Data cannot be accessed without the correct high strength alphanumeric 8-16 character password. A password hint option is
available. The password hint cannot match the password
•	 Brute-Force Password Attack Protection - Data is automatically erased after 6 failed access attempts. The data and encryption key are
securely destroyed and the Drive is reset
•	 Auto-lock - The Drive will automatically encrypt all data and lock when removed from a PC or when the screen saver or “computer lock” function
is activated on the host PC
•	 Password Entry Count - The Drive records the failed entry count. e.g. if the USB is removed after 2 failed attempts and reinserted, the drive will
resume with the 3rd attempt
•	 Personal ID Function - As an option, contact details can be added to the drive, that can be viewed without compromising encrypted data
•	 Multi-lingual interface and a simple user interface for “out of the box” use
•	 Unique code*** - The USB pin on each drive is etched with a unique and random 7-digit code. This allows a record to be kept of which drive
has been allocated to a specific user (Available on all flash drives as an option)
•	 Hardware Unique ID available for use with Endpoint software (see page 11)
•	 Warranty - 2 Years
* Where indicated “Dual password” ** Only on Crypto models *** Where indicated “Unique code”
CRYPTO DUAL FIPS 197 ENCRYPTED USB 3.0
CRYPTO DRIVE FIPS 197 ENCRYPTED USB 3.0
ENVOY DUAL FIPS 197 ENCRYPTED USB 3.0
COURIER DUAL FIPS 197 ENCRYPTED USB 3.0
COURIER FIPS 197 ENCRYPTED USB 3.0
Hardware Encrypted USB 3.0 Flash Drives
4GB INFD4GCRYDL3.0197
8GB INFD8GCRYDL3.0197
16GB INFD16GCRYDL3.0197
32GB INFD32GCRYDL3.0197
64GB INFD64GCRYDL3.0197
4GB INFD4GCRY3.0197
8GB INFD8GCRY3.0197
16GB INFD16GCRY3.0197
32GB INFD32GCRY3.0197
64GB INFD64GCRY3.0197
128GB INFD128GENVDL3.0-197
8GB INFD8GCOUDL3.0-197
16GB INFD16GCOUDL3.0-197
32GB INFD32GCOUDL3.0-197
64GB INFD64GCOUDL3.0-197
8GB INFD8GCOU3.0-197
16GB INFD16GCOL3.0-197
32GB INFD32GCOU3.0-197
64GB INFD64GCOU3.0-197
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
Rotates 360° USB 2.0 ClipGenuine Leather Key Chain Cap Storage Shockproof
Rotates 360° USB 2.0 ClipGenuine Leather Key Chain Cap Storage Shockproof
Rotates 360° USB 2.0 ClipGenuine Leather Key Chain Cap Storage Shockproof
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
CAPPED
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique codeUSB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
CAPPED
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
UNIQUE
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
4-Channel access
for faster read/write
PC/MACTRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
CAPPED
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
integralmemory.com
4
•	Dual password / Master password override* in addition to a high-strength user password. If a user forgets their password the
Crypto/Courier Dual can be accessed with a master password by an IT administrator (option
•	Rugged triple-layer waterproof design** - Protects the Drive against knocks, drops, break-in and submerging in water. The
electronics are sealed in epoxy resin and then shielded by a steel inner case. The rubberised silicone outer casing provides a final
layer of protection
•	 AES 256-bit hardware encryption
•	 FIPS 140-2 / FIPS 197 Validated
•	 Zero Footprint - No software installation required
•	 Secure Entry - Data cannot be accessed without the correct high strength alphanumeric 8-16 character password. A password
hint option is available. The password hint cannot match the password
•	 Brute-Force Password Attack Protection - Data is automatically erased after 6 failed access attempts. The data and
encryption key are securely destroyed and the Drive is reset
•	 Auto-lock - The Drive will automatically encrypt all data and lock when removed from a PC or when the screen saver or
“computer lock” function is activated on the host PC
•	 Password Entry Count - The Drive records the failed entry count. e.g. if the drive is removed after 2 failed attempts and
reinserted, the drive will resume with the 3rd attempt
•	 Personal ID Function - As an option, contact details can be added to the drive, that can be viewed without compromising
encrypted data
•	 Multi-lingual interface and a simple user interface for “out of the box” use
•	 Unique code*** - The USB pin on each drive is etched with a unique and random 7-digit code. This allows a record to be kept of
which drive has been allocated to a specific user (Available on all flash drives as an option)
•	 Hardware Unique ID available for use with Endpoint software (see page 11)
•	 Warranty - 2 Years
* Where indicated “Dual password” ** Only on Crypto models *** Where indicated “Unique code”
Hardware Encrypted USB 2.0 Flash Drives
CRYPTO DUAL PLUS FIPS 140-2 ENCRYPTED USB 2.0
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
CAPPED
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
CAPPED
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
CRYPTO DUAL PLUS FIPS 197 ENCRYPTED USB 2.0
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
CRYPTO DUAL FIPS 140-2 ENCRYPTED USB 2.0
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
4-Channel access
for faster read/write
PC/MACTRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
2GB INFD2GCRYPTODL140-2
4GB INFD4GCRYPTODL140-2
8GB INFD8GCRYPTODL140-2
16GB INFD16GCRYPTODL140-2
32GB INFD32GCRYPTODL140-2
64GB INFD64GCRYDLPL197
128GB INFD128GCRYDLPL197
64GB INFD64GCRYDLPL140-2
128GB INFD128GCRYDLPL140-2
USB 3.0
Cap Storage
ShockproofWaterproofTriple layer
PC and Mac
Unique code
USB 3.0
Cap Storage
ShockproofWaterproofTriple layer
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
Watch our channel: youtube.com/IntegralMemoryTV
5
COURIER FIPS 197 ENCRYPTED USB 2.0
Crypto
AES 256-bit
Military
Level
Encryption
PC  Mac
CRYPTO DUAL FIPS 197 ENCRYPTED USB 2.0
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
CAPPED
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
CAPPED
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
CRYPTO DRIVE FIPS 197 ENCRYPTED USB 2.0
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
CAPPED
UNIQUE
NUMBER
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
CRYPTO DRIVE FIPS 140-2 ENCRYPTED USB 2.0
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
CAPPED
UNIQUE
NUMBER
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC
PC/MAC
4-Channel access
for faster read/write
TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN
PC/MAC
SINGLE
USER
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
PC
Note: this product is
PC compatible only
2GB INFD2GCRYPTODL197
4GB INFD4GCRYPTODL197
8GB INFD8GCRYPTODL197
16GB INFD16GCRYPTODL197
32GB INFD32GCRYPTODL197
2GB INFD2GCRYPTO140-2
4GB INFD4GCRYPTO140-2
8GB INFD8GCRYPTO140-2
16GB INFD16GCRYPTO140-2
32GB INFD32GCRYPTO140-2
2GB INFD2GCRYPTO197
4GB INFD4GCRYPTO197
8GB INFD8GCRYPTO197
16GB INFD16GCRYPTO197
32GB INFD32GCRYPTO197
2GB INFD2GBCOUAT
4GB INFD4GBCOUAT
8GB INFD8GBCOUAT
16GB INFD16GBCOUAT
32GB INFD32GBCOUAT
Rotates 360° USB 2.0 ClipGenuine Leather Key Chain Cap Storage ShockproofUSB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
USB 3.0 Key Chain
Cap Storage
ShockproofWaterproofTriple layer PC and Mac
PC and Mac
Unique code
integralmemory.com
6
Crypto Dual
140-2 (USB 3.0 or 2.0)
Crypto Dual
197 (USB 3.0 or 2.0)
Envoy Dual
197
Courier Dual
197
Available Capacities
3.0: 4GB, 8GB, 16GB, 32GB, 64GB
2.0: 2GB, 4GB, 8GB, 16GB, 32GB
3.0: 4GB, 8GB, 16GB, 32GB, 64GB
2.0: 2GB, 4GB, 8GB, 16GB, 32GB
128GB
8GB,
16GB, 32GB, 64GB
AES 256-bit hardware encryption    
FIPS Validation FIPS 140-2 FIPS 197 FIPS 197 FIPS 197
Mandatory encryption of all files    
USB Speed 3.0 / 2.0 3.0 / 2.0 3.0 3.0
Zero Footprint - No software
required
   
Compatible with Endpoint
security systems
   
Works on Windows without
administrator privileges
   
Works on Mac OS X without
administrator privileges
   
Secure Entry - Password
Mandatory
   
High-Strength Password
Enforcement
   
Brute-Force Password Attack
Protection
   
Auto-Lock 1
1
1
1
Password Entry Count    
Personal ID Function    
Rugged triple-layer waterproof
design
  – –
User manual stored on drive    
Multi-lingual interface 26 Languages 26 Languages 26 Languages 26 Languages
Dual Password    
Dual OS - PC  Mac compatible    
4 Channel access
(faster read  write speeds)
– – – –
Unique code etched on
connector
  available on request available on request
Product range
Watch our channel: youtube.com/IntegralMemoryTV
7
Courier
197
Crypto Dual +
140-2
Crypto Dual +
197
Crypto
140-2
Crypto
197
Courier FIPS
197
8GB,
16GB, 32GB, 64GB
64GB, 128GB 64GB, 128GB
2GB, 4GB, 8GB,
16GB, 32GB
2GB, 4GB, 8GB,
16GB, 32GB
2GB, 4GB, 8GB,
16GB, 32GB
     
FIPS 197 FIPS 140-2 FIPS 197 FIPS 140-2 FIPS 197 FIPS 197
     
3.0 2.0 2.0 2.0 2.0 2.0
     
     
     
   -  
     
     
     
1
1
1
 1
1
     
     
–     –
     
26 Languages 26 Languages 26 Languages 24 Languages 24 Languages 24 Languages
–   – – -
   –  
–   – – –
available on request    available on request available on request
1
Locks if PC is idle for more than 10 mins
integralmemory.com
8
SSD - Hardware Encryption
Hardware Encrypted Solid State Drives
Hard Drive security is a challenge facing all IT departments and government bodies.
Integral produce a range of AES 256-bit hardware encrypted SSDs that provide an easy to use, cost effective and highly secure
solution that is designed to work with your end-point security.
If a PC/laptop/ultrabook/tablet protected with an Integral Crypto SSD is lost or stolen, sensitive data is securely encrypted and cannot be
accessed without the high-strength password. This includes the operating system as well as all other files that are stored on the drive.
An unauthorised user WILL NOT be able to boot the system or access any data by transferring the Crypto SSD to another system or
by cloning the drive.
Our Crypto range is FIPS 140-2 validated and all models are zero footprint, so no software installation is required. All files on the
drive are automatically encrypted and are protected by a mandatory high-strength password. All Crypto products will securely
destroy data safely if the set password attempts are exceeded, protecting your data if lost or stolen.
The Crypto SSD is the no-fuss and highly-secure solid state encryption solution for many industries including; finance, legal, health,
education and government.
Hardware encryption in
3 easy steps
1. Install the Crypto SSD in your host
device. A Windows operating system
is required. This can be cloned from an
existing drive or image (with OS and
data) before the Crypto SSD is fitted, or
a fresh installation can be completed
after the Crypto SSD is fitted in your
host device, by using the manufacturers
setup disks.
2. Run the “SSDLock” program once
(supplied on a USB) to set the
encryption and specify usernames and
passwords. Power down.
3. Your system is now protected with Full
Disk Encryption (FDE). On every boot
up, a valid username and password is
required to access the system.
Full Disc
Encryption
with no
licensing or
subscription
fees
Key features:
•	 FIPS 140-2 Validated
•	 Mandatory encryption
•	 Secure Entry - Encrypted data cannot be accessed without the correct
high-strength 8-16 character alphanumeric password. Before use a
high-strength password must be set
•	 Secure Design - The electronics are sealed in tamper-free epoxy resin
•	 High-speed Read/Write - up to 450MB/s*
•	 Quick Boot - Using a solid state disk in place of a traditional hard drive
can cut your desktop computer or laptop’s boot time in half
•	 Shockproof - no moving parts, so a greater resistance to shock and
vibration than HDD
•	 Silent operation - no spin or seek time
•	 Low heat - a more comfortable user experience
•	 Low power usage - laptop battery will last far longer with SSD than
HDD
•	 Endpoint security software compatible - The Integral Crypto SSD
operates comfortably with endpoint security solutions by using the
configurable hardware unique ID feature, which is part of the program
•	BIOS Independent - Crypto SSD security system runs independently of
your system BIOS, unlike other hardware encrypted SSDs
•	Seamless encryption unnoticeable to the user
•	ADMIN+USER - passwords configurable
•	 Warranty - 3 Years
* Based on internal testing
TIP!
Hardware Encrypted SSD Drives
Watch our channel: youtube.com/IntegralMemoryTV
9
CRYPTO SSD 2.5” SATA III (6Gbps)
Crypto SSD is the Full Disk Encryption solution for Windows desktops and laptops. Featuring AES 256-bit Hardware Encryption
so you can encrypt and protect your sensitive data and get the speed, reliability and power benefits of SSD. Once encryption is set, a
valid user name and password is required to access the Crypto SSD prior to system boot (before Windows loads).
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power UseRotates 360° USB 2.0Genuine Leather Key Chain Cap Storage Shockproof
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight
CRYPTO SSD MSATA III (6Gbps)
CRYPTO SSD M.2 SATA 22X60
CRYPTO SSD M.2 SATA 22X80
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power UseRotates 360° USB 2.0Genuine Leather Key Chain Cap Storage Shockproof
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power UseRotates 360° USB 2.0Genuine Leather Key Chain Cap Storage Shockproof
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power UseRotates 360° USB 2.0Genuine Leather Key Chain Cap Storage Shockproof
PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight
Ultra-slim form factor (7mm)
Ideal for the latest slimline laptops, 7mm 9mm adapter also included
Barnes Roffe have really benefited from making the switch from
a software-based PC encryption to Integral’s Crypto SSD hardware
encryption. We have eliminated the sluggish computing experience we
were having with software encryption and we now have a more productive
workforce thanks to the massively improved computer boot-up times
and faster applications, due to no computer resources being used by the
hardware encryption as its applied directly on the Crypto SSD
Barnes Roffe LLP - Chartered Accountants
64GB INSSD64GS625M7CR140
128GB INSSD128GS625M7CR140
256GB INSSD256GS625M7CR140
512GB INSSD512GS625M7CR140
1TB INSSD1TS625M7CR140
64GB INSSD64GMSA6MCR140
128GB INSSD128GMSA6MCR140
256GB INSSD256GMSA6MCR140
512GB INSSD512GMSA6MCR140
128GB INSSD128GM2M2260C140
256GB INSSD256GM2M2260C140
512GB INSSD512GM2M2260C140
128GB INSSD128GM2M2280C140
256GB INSSD256GM2M2280C140
512GB INSSD512GM2M2280C140
integralmemory.com
10
computing security www.computingsecurity.co.uk30 @CSMagAndAwards
I
t beggars belief that, even with all the
publicity surrounding data protection,
hardly a week goes by without us
hearing about yet another government
department or business losing sensitive or
personal data. Even the MoD had to own
up recently to having a laptop containing
confidential employee and banking
information stolen from a motorway
service station.
Data encryption is such an obvious
solution to this perennial problem and
there is no shortage of choices. Integral
Memory specialises in this area and
provides some of the most secure
solutions available.
It offers a wide range of products
providing hardware encryption and
claims its Crypto SSD is the most secure
solid state drive on the market. A big
advantage these have over software
products is all encryption/decryption is
carried out internally by their dedicated
processor and so have no host system
overheads.
The Crypto SSD is sealed in a tamper-
proof epoxy resin shell and protected
further by a metal outer case. With no
moving parts, it's resistant to shocks, is
completely silent and produces very
little heat.
The drive has standard SATA and power
interfaces, and supports speeds up to
6Gbits/sec. It employs military-grade AES-
256 encryption and is certified to the FIPS
140-2 standard - an absolute
requirement for sale into the US Federal
Government.
For the Crypto SSD to provide total
protection, it must have the OS installed
directly on it. You can use disk cloning
software, if it's replacing an existing disk,
but we had no problems fitting the SSD
in a desktop PC and installing a fresh
copy of Windows 7 Professional on it.
The next step is to run the supplied
SSDLock software with administrative
privileges. It's simple to use and offers a
dual mode, which allows you to create
Master and User accounts - so, if the
latter forgets their password, the former
can go in and reset it for them.
Strong passwords are mandatory and
we could set a failed login limit from 6 to
20 attempts. This circumvents brute force
password attacks, as once the retry count
has been exceeded, the SSD will lock
itself, requiring the Master to re-create
the user's account.
However, if the user name is persistently
entered incorrectly, the SSD will reset and
erase itself. In single user mode, it will
also erase itself if either the username or
password is incorrectly entered.
On completion, the PC was powered
down and, on the next power up, the
BIOS boot screen asked for a user name
and password. And that's all there is to it,
as from this point onwards we continued
to use the PC normally where we could
see no noticeable difference in
performance.
We tested the dual mode settings by
powering the PC off and on, and
incorrectly entering the user account
password. After six attempts, the boot
screen advised us to contact the
administrator to get our account reset
and all further attempts to use this
account name received the same warning.
We then tried to login with the wrong
user name and were warned that, if we
continued down this path, it would erase
the SSD. We persisted and, sure enough,
the SSD erased itself. When we rebooted
our PC, we found it was completely
devoid of the OS and all data.
During testing, we found the Crypto
SSD extremely easy to use and capable of
providing a completely transparent
encryption/decryption process. When
data security solutions are this easy to
deploy, businesses really have no excuses
for not using them to ensure their
sensitive data is totally secure, no matter
where it ends up.
Product: Crypto SSD
Supplier: Integral Memory
Web site: www.integralmemory.com
Available from all good IT resellers
Crypto SSD is also available in mSATA,
M.2 SSD formats.
INTEGRAL MEMORY CRYPTO SSD
product review
LQWHJUDO68%%('%:T[G3DJH
Computing
Security
Computing
SecuritySecure systems, secure data, secure people, secure business
Watch our channel: youtube.com/IntegralMemoryTV
11
Customisation Available
Your own serial number etching, Flash Drive
and GUI can be customised to suit your
brand (subject to minimum order quantities).
The Integral hardware encrypted Flash Drive range can be personalised
with a designated company identifying name or number. This will allow a
Network Administrator to block access to unrecognised USBs for security
purposes, whilst allowing the Integral encrypted Flash Drive to function as
the ‘official’ company drive.
During production a personalised tag (e.g. “LONDON UNIVERSITY”) can
be embedded into the Crypto that can be viewed on a PC. The tag gives
Endpoint software a convenient way to identify Integral drives.
Each drive can be personalized further (upon request) with an individual
user specific personal tag e.g “LONDON UNIVERSITY” – USER1234” if
required.
This personalisation can be offered on any Integral USB Flash Drive
(requested at time of order).
Customisation
Hardware Unique ID for Endpoint software
integralmemory.com
AllTrademarksAcknowledged.EOEProductspecificationssubjecttochangewithoutnotice.
France
Integral Europe SARL
38 Ter Rue de Verdun
92150 Suresnes
France
Tel: +33 1 41 44 73 00
Fax: +33 1 41 44 07 18
www.integralmemory.com
salesfr@integraleurope.com
Spain
Integral Memory España, S.A.
Calle Rodríguez San Pedro 2
Planta 7a - Oficina 712
28015 Madrid
Tel: +34 91 406 29 32
Fax: +34 91 764 7526
www.integralmemory.com
sales@integraleurope.com
Netherlands
Integral Memory plc
Burgemeester Brandtstraat 2
2841 XC Moordrecht
The Netherlands
Tel: +31 18 23 77240
Fax: +31 18 23 77241
www.integralmemory.com
netherlands@integraleurope.com
Representative Offices
Poland
M: +48 60 244 3002
piotr.chrzanowski@integralmemory.com
Portugal
Tel: +351 210819012
M: +351 912881144
Fax: +351 210819012
sobrinho.pires@integraleurope.com
Australia  New Zealand
Tel: +61 243 424 861
M: +61 406 061 437
duncan.way@integralmemory.com
Head Office
Integral Memory plc
Unit 6 Iron Bridge Close
Iron Bridge Business Park
London
NW10 0UF
England
Tel: +44 20 8451 8700
Fax: +44 20 8459 6301
sales@integralmemory.com
www.integralmemory.com
www.integralmemoryplc.com
INTUKENCR161

More Related Content

Viewers also liked

Web 2.0: towards collaborative intelligence in the enterprise di Lee Bryant
Web 2.0: towards collaborative intelligence in the enterprise di Lee BryantWeb 2.0: towards collaborative intelligence in the enterprise di Lee Bryant
Web 2.0: towards collaborative intelligence in the enterprise di Lee BryantGiuliano Prati
 
Weblogs Como Herramienta De AvalúO
Weblogs Como Herramienta De AvalúOWeblogs Como Herramienta De AvalúO
Weblogs Como Herramienta De AvalúOR B
 
Presentacion.tec.automatizacion industrial
Presentacion.tec.automatizacion industrialPresentacion.tec.automatizacion industrial
Presentacion.tec.automatizacion industrialNayibe Holguin Gonzales
 
20130117 dublin creative_commonseurope
20130117 dublin creative_commonseurope20130117 dublin creative_commonseurope
20130117 dublin creative_commonseuropeGwen Franck
 
La planificación lingüística y el cambio social
La planificación lingüística y el cambio socialLa planificación lingüística y el cambio social
La planificación lingüística y el cambio socialSilvana Montecinos
 
Trabajo de ciencias
Trabajo de cienciasTrabajo de ciencias
Trabajo de cienciasSofia Medina
 
Free copy of e-magazine Corporate professional Today
Free copy of e-magazine Corporate professional TodayFree copy of e-magazine Corporate professional Today
Free copy of e-magazine Corporate professional TodayTaxmann
 
Necesidades y respuesta socioeducativa en contextos de pobreza energética
Necesidades y respuesta socioeducativa en contextos de pobreza energéticaNecesidades y respuesta socioeducativa en contextos de pobreza energética
Necesidades y respuesta socioeducativa en contextos de pobreza energéticaDavid Barriada
 
1. challenges of regulatory liquidity risk
1. challenges of regulatory liquidity risk1. challenges of regulatory liquidity risk
1. challenges of regulatory liquidity riskcrmbasel
 
cloudpic_presentationPFE,chouichi yassine & Raissi nabil
cloudpic_presentationPFE,chouichi yassine & Raissi nabilcloudpic_presentationPFE,chouichi yassine & Raissi nabil
cloudpic_presentationPFE,chouichi yassine & Raissi nabilYaCine CH
 
Taller de ecommerce para emprendedores
Taller de ecommerce para emprendedores Taller de ecommerce para emprendedores
Taller de ecommerce para emprendedores Community Next
 
Email superstar of 2012
Email superstar  of 2012Email superstar  of 2012
Email superstar of 2012streamview
 

Viewers also liked (20)

Web 2.0: towards collaborative intelligence in the enterprise di Lee Bryant
Web 2.0: towards collaborative intelligence in the enterprise di Lee BryantWeb 2.0: towards collaborative intelligence in the enterprise di Lee Bryant
Web 2.0: towards collaborative intelligence in the enterprise di Lee Bryant
 
Weblogs Como Herramienta De AvalúO
Weblogs Como Herramienta De AvalúOWeblogs Como Herramienta De AvalúO
Weblogs Como Herramienta De AvalúO
 
CV-Pedro Nascimento
CV-Pedro NascimentoCV-Pedro Nascimento
CV-Pedro Nascimento
 
Turning green
Turning greenTurning green
Turning green
 
Presentacion.tec.automatizacion industrial
Presentacion.tec.automatizacion industrialPresentacion.tec.automatizacion industrial
Presentacion.tec.automatizacion industrial
 
20130117 dublin creative_commonseurope
20130117 dublin creative_commonseurope20130117 dublin creative_commonseurope
20130117 dublin creative_commonseurope
 
La planificación lingüística y el cambio social
La planificación lingüística y el cambio socialLa planificación lingüística y el cambio social
La planificación lingüística y el cambio social
 
Trabajo de ciencias
Trabajo de cienciasTrabajo de ciencias
Trabajo de ciencias
 
Free copy of e-magazine Corporate professional Today
Free copy of e-magazine Corporate professional TodayFree copy of e-magazine Corporate professional Today
Free copy of e-magazine Corporate professional Today
 
Accidentes_aracnidos
Accidentes_aracnidosAccidentes_aracnidos
Accidentes_aracnidos
 
WE ARE HIRING!! Apply Now
WE ARE HIRING!! Apply Now WE ARE HIRING!! Apply Now
WE ARE HIRING!! Apply Now
 
Necesidades y respuesta socioeducativa en contextos de pobreza energética
Necesidades y respuesta socioeducativa en contextos de pobreza energéticaNecesidades y respuesta socioeducativa en contextos de pobreza energética
Necesidades y respuesta socioeducativa en contextos de pobreza energética
 
Fue
FueFue
Fue
 
1. challenges of regulatory liquidity risk
1. challenges of regulatory liquidity risk1. challenges of regulatory liquidity risk
1. challenges of regulatory liquidity risk
 
Mundial "a medida"
Mundial "a medida"Mundial "a medida"
Mundial "a medida"
 
cloudpic_presentationPFE,chouichi yassine & Raissi nabil
cloudpic_presentationPFE,chouichi yassine & Raissi nabilcloudpic_presentationPFE,chouichi yassine & Raissi nabil
cloudpic_presentationPFE,chouichi yassine & Raissi nabil
 
Taller de ecommerce para emprendedores
Taller de ecommerce para emprendedores Taller de ecommerce para emprendedores
Taller de ecommerce para emprendedores
 
Caliente, caliente
Caliente, calienteCaliente, caliente
Caliente, caliente
 
Revista Umbra Nº 1
Revista Umbra Nº 1 Revista Umbra Nº 1
Revista Umbra Nº 1
 
Email superstar of 2012
Email superstar  of 2012Email superstar  of 2012
Email superstar of 2012
 

Similar to Integral Memory 256-bit AES Hardware Encrypted Products

Behind The Code // by Exness
Behind The Code // by ExnessBehind The Code // by Exness
Behind The Code // by ExnessMaxim Gaponov
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5Brent Muir
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Securityguest95226d
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheetMariusEnescu3
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalIdris Ahmed
 
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesPeerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesFred_C_Thomas
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSIguest9f2a14
 

Similar to Integral Memory 256-bit AES Hardware Encrypted Products (20)

Diskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive DatasheetDiskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive Datasheet
 
Diskashur Hard Disk Drives Datasheet
Diskashur Hard Disk Drives DatasheetDiskashur Hard Disk Drives Datasheet
Diskashur Hard Disk Drives Datasheet
 
Behind The Code // by Exness
Behind The Code // by ExnessBehind The Code // by Exness
Behind The Code // by Exness
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Mbs r33 b
Mbs r33 bMbs r33 b
Mbs r33 b
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5
 
Fred server
Fred serverFred server
Fred server
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Network Endpoint Security
Network Endpoint SecurityNetwork Endpoint Security
Network Endpoint Security
 
Manual 1
Manual 1Manual 1
Manual 1
 
Iron key h350-datasheet
Iron key h350-datasheetIron key h350-datasheet
Iron key h350-datasheet
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable Workplace
 
Total lock crypto pc 3.22 final
Total lock crypto pc 3.22 finalTotal lock crypto pc 3.22 final
Total lock crypto pc 3.22 final
 
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage CartridgesPeerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
Peerless DRM and Enterprise Security-Enabled Removable Data Storage Cartridges
 
Lenovo Consumer
Lenovo ConsumerLenovo Consumer
Lenovo Consumer
 
Lenovo Consumer MSI
Lenovo Consumer MSILenovo Consumer MSI
Lenovo Consumer MSI
 
Soyo syd6iba
Soyo syd6ibaSoyo syd6iba
Soyo syd6iba
 

Integral Memory 256-bit AES Hardware Encrypted Products

  • 2. integralmemory.com 2 Integral Memory plc are one of the largest digital memory producers in Europe with more than 26 years of sales success. Integral was founded in London, England during 1989 and quickly became one of Europe’s leading DRAM specialists. Over the next two decades Integral expanded its product range as the solid-state flash memory market matured. Integral has long-term partnerships with leading component suppliers including Toshiba, Samsung and Hynix. International sales offices have been established in France, Spain and the Netherlands. The Integral range includes a cutting-edge FIPS 140-2 validated Hardware Encrypted SSD and a selection of FIPS 140-2 validated, USB Flash Drives with AES 256-bit encryption; ensuring sensitive data stored on the USB cannot be compromised. Hardware vs software encryption encryption The major difference between hardware encryption and software encryption is that with hardware based encryption, the encryption and decryption processes are carried out by a dedicated processor (part of the Integral Crypto hardware). In software encryption, the resources of the device on which the software is installed are used for the encrypting and decrypting of data. This makes hardware encryption much faster. Another significant advantage of hardware encryption is that the cryptographic key is stored in a separate inaccessible portion of memory storage, making it more secure than software encryption. What is the difference between FIPS 140-2 and FIPS 197 certification? FIPS 197 certification looks at the hardware encryption algorithms used to protect the data. FIPS 140-2 is the next, more advanced level of certification. FIPS 140-2 includes a rigorous analysis of the product’s physical properties. So, with a FIPS 140-2 certified SSD the tamper-proof design of the circuit board has been approved, as well as the data encryption. FIPS certification proves that the product has been tested by an independent government approved laboratory. Hardware Encrypted USB Flash Drives Portable data security is a challenge facing all IT departments and government bodies. All data that is off company premises is at risk. Integral produce a range of AES 256-bit hardware encrypted USB Flash Drives that provide an easy to use, cost effective and highly secure solution that is designed to work with your end-point security. Dual password versions are also available, making these more easy to manage in I.T. departments. Our encrypted USB Flash Drive range is FIPS 197/140-2 validated and all models are zero footprint, so no software installation is required. All files transferred to the drive are automatically encrypted and are protected by a mandatory high-strength password. All Crypto products will securely destroy data safely if the set password attempts are exceeded, protecting your data if lost or stolen. Crypto SSD and USB drives are used and trusted worldwide by government departments, global corporations and SMEs. For detailed product information and technical support please visit our website. IntegralMemoryTV Our passion is to bring you the latest memory products built on quality, reliability and great prices Our Story
  • 3. Watch our channel: youtube.com/IntegralMemoryTV 3 • USB 3.0 Superspeed data transfer - with PC/Mac compatible software • Dual password / Master password override* in addition to a high-strength user password. If a user forgets their password the Crypto/Courier Dual can be accessed with a master password by an IT administrator (optional) • Rugged triple-layer waterproof design** - Protects the Drive against knocks, drops, break-in and submerging in water. The electronics are sealed in epoxy resin and then shielded by a hardened inner case. The rubberised silicone outer casing provides a final layer of protection • AES 256-bit hardware encryption • FIPS 197 Validated • Zero Footprint - No software installation required • Secure Entry - Data cannot be accessed without the correct high strength alphanumeric 8-16 character password. A password hint option is available. The password hint cannot match the password • Brute-Force Password Attack Protection - Data is automatically erased after 6 failed access attempts. The data and encryption key are securely destroyed and the Drive is reset • Auto-lock - The Drive will automatically encrypt all data and lock when removed from a PC or when the screen saver or “computer lock” function is activated on the host PC • Password Entry Count - The Drive records the failed entry count. e.g. if the USB is removed after 2 failed attempts and reinserted, the drive will resume with the 3rd attempt • Personal ID Function - As an option, contact details can be added to the drive, that can be viewed without compromising encrypted data • Multi-lingual interface and a simple user interface for “out of the box” use • Unique code*** - The USB pin on each drive is etched with a unique and random 7-digit code. This allows a record to be kept of which drive has been allocated to a specific user (Available on all flash drives as an option) • Hardware Unique ID available for use with Endpoint software (see page 11) • Warranty - 2 Years * Where indicated “Dual password” ** Only on Crypto models *** Where indicated “Unique code” CRYPTO DUAL FIPS 197 ENCRYPTED USB 3.0 CRYPTO DRIVE FIPS 197 ENCRYPTED USB 3.0 ENVOY DUAL FIPS 197 ENCRYPTED USB 3.0 COURIER DUAL FIPS 197 ENCRYPTED USB 3.0 COURIER FIPS 197 ENCRYPTED USB 3.0 Hardware Encrypted USB 3.0 Flash Drives 4GB INFD4GCRYDL3.0197 8GB INFD8GCRYDL3.0197 16GB INFD16GCRYDL3.0197 32GB INFD32GCRYDL3.0197 64GB INFD64GCRYDL3.0197 4GB INFD4GCRY3.0197 8GB INFD8GCRY3.0197 16GB INFD16GCRY3.0197 32GB INFD32GCRY3.0197 64GB INFD64GCRY3.0197 128GB INFD128GENVDL3.0-197 8GB INFD8GCOUDL3.0-197 16GB INFD16GCOUDL3.0-197 32GB INFD32GCOUDL3.0-197 64GB INFD64GCOUDL3.0-197 8GB INFD8GCOU3.0-197 16GB INFD16GCOL3.0-197 32GB INFD32GCOU3.0-197 64GB INFD64GCOU3.0-197 USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code Rotates 360° USB 2.0 ClipGenuine Leather Key Chain Cap Storage Shockproof Rotates 360° USB 2.0 ClipGenuine Leather Key Chain Cap Storage Shockproof Rotates 360° USB 2.0 ClipGenuine Leather Key Chain Cap Storage Shockproof USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC CAPPED UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique codeUSB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC CAPPED UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC UNIQUE 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC 4-Channel access for faster read/write PC/MACTRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC CAPPED UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER
  • 4. integralmemory.com 4 • Dual password / Master password override* in addition to a high-strength user password. If a user forgets their password the Crypto/Courier Dual can be accessed with a master password by an IT administrator (option • Rugged triple-layer waterproof design** - Protects the Drive against knocks, drops, break-in and submerging in water. The electronics are sealed in epoxy resin and then shielded by a steel inner case. The rubberised silicone outer casing provides a final layer of protection • AES 256-bit hardware encryption • FIPS 140-2 / FIPS 197 Validated • Zero Footprint - No software installation required • Secure Entry - Data cannot be accessed without the correct high strength alphanumeric 8-16 character password. A password hint option is available. The password hint cannot match the password • Brute-Force Password Attack Protection - Data is automatically erased after 6 failed access attempts. The data and encryption key are securely destroyed and the Drive is reset • Auto-lock - The Drive will automatically encrypt all data and lock when removed from a PC or when the screen saver or “computer lock” function is activated on the host PC • Password Entry Count - The Drive records the failed entry count. e.g. if the drive is removed after 2 failed attempts and reinserted, the drive will resume with the 3rd attempt • Personal ID Function - As an option, contact details can be added to the drive, that can be viewed without compromising encrypted data • Multi-lingual interface and a simple user interface for “out of the box” use • Unique code*** - The USB pin on each drive is etched with a unique and random 7-digit code. This allows a record to be kept of which drive has been allocated to a specific user (Available on all flash drives as an option) • Hardware Unique ID available for use with Endpoint software (see page 11) • Warranty - 2 Years * Where indicated “Dual password” ** Only on Crypto models *** Where indicated “Unique code” Hardware Encrypted USB 2.0 Flash Drives CRYPTO DUAL PLUS FIPS 140-2 ENCRYPTED USB 2.0 TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC CAPPED UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN CAPPED UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER CRYPTO DUAL PLUS FIPS 197 ENCRYPTED USB 2.0 TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN CRYPTO DUAL FIPS 140-2 ENCRYPTED USB 2.0 USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC 4-Channel access for faster read/write PC/MACTRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN 2GB INFD2GCRYPTODL140-2 4GB INFD4GCRYPTODL140-2 8GB INFD8GCRYPTODL140-2 16GB INFD16GCRYPTODL140-2 32GB INFD32GCRYPTODL140-2 64GB INFD64GCRYDLPL197 128GB INFD128GCRYDLPL197 64GB INFD64GCRYDLPL140-2 128GB INFD128GCRYDLPL140-2 USB 3.0 Cap Storage ShockproofWaterproofTriple layer PC and Mac Unique code USB 3.0 Cap Storage ShockproofWaterproofTriple layer PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code
  • 5. Watch our channel: youtube.com/IntegralMemoryTV 5 COURIER FIPS 197 ENCRYPTED USB 2.0 Crypto AES 256-bit Military Level Encryption PC Mac CRYPTO DUAL FIPS 197 ENCRYPTED USB 2.0 TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC CAPPED UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC CAPPED UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER CRYPTO DRIVE FIPS 197 ENCRYPTED USB 2.0 USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC CAPPED UNIQUE NUMBER 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code CRYPTO DRIVE FIPS 140-2 ENCRYPTED USB 2.0 USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code CAPPED UNIQUE NUMBER TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC PC/MAC 4-Channel access for faster read/write TRIPLE LAYER WATERPROOF SHOCKPROOF KEY CHAIN PC/MAC SINGLE USER USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code PC Note: this product is PC compatible only 2GB INFD2GCRYPTODL197 4GB INFD4GCRYPTODL197 8GB INFD8GCRYPTODL197 16GB INFD16GCRYPTODL197 32GB INFD32GCRYPTODL197 2GB INFD2GCRYPTO140-2 4GB INFD4GCRYPTO140-2 8GB INFD8GCRYPTO140-2 16GB INFD16GCRYPTO140-2 32GB INFD32GCRYPTO140-2 2GB INFD2GCRYPTO197 4GB INFD4GCRYPTO197 8GB INFD8GCRYPTO197 16GB INFD16GCRYPTO197 32GB INFD32GCRYPTO197 2GB INFD2GBCOUAT 4GB INFD4GBCOUAT 8GB INFD8GBCOUAT 16GB INFD16GBCOUAT 32GB INFD32GBCOUAT Rotates 360° USB 2.0 ClipGenuine Leather Key Chain Cap Storage ShockproofUSB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code USB 3.0 Key Chain Cap Storage ShockproofWaterproofTriple layer PC and Mac PC and Mac Unique code
  • 6. integralmemory.com 6 Crypto Dual 140-2 (USB 3.0 or 2.0) Crypto Dual 197 (USB 3.0 or 2.0) Envoy Dual 197 Courier Dual 197 Available Capacities 3.0: 4GB, 8GB, 16GB, 32GB, 64GB 2.0: 2GB, 4GB, 8GB, 16GB, 32GB 3.0: 4GB, 8GB, 16GB, 32GB, 64GB 2.0: 2GB, 4GB, 8GB, 16GB, 32GB 128GB 8GB, 16GB, 32GB, 64GB AES 256-bit hardware encryption     FIPS Validation FIPS 140-2 FIPS 197 FIPS 197 FIPS 197 Mandatory encryption of all files     USB Speed 3.0 / 2.0 3.0 / 2.0 3.0 3.0 Zero Footprint - No software required     Compatible with Endpoint security systems     Works on Windows without administrator privileges     Works on Mac OS X without administrator privileges     Secure Entry - Password Mandatory     High-Strength Password Enforcement     Brute-Force Password Attack Protection     Auto-Lock 1 1 1 1 Password Entry Count     Personal ID Function     Rugged triple-layer waterproof design   – – User manual stored on drive     Multi-lingual interface 26 Languages 26 Languages 26 Languages 26 Languages Dual Password     Dual OS - PC Mac compatible     4 Channel access (faster read write speeds) – – – – Unique code etched on connector   available on request available on request Product range
  • 7. Watch our channel: youtube.com/IntegralMemoryTV 7 Courier 197 Crypto Dual + 140-2 Crypto Dual + 197 Crypto 140-2 Crypto 197 Courier FIPS 197 8GB, 16GB, 32GB, 64GB 64GB, 128GB 64GB, 128GB 2GB, 4GB, 8GB, 16GB, 32GB 2GB, 4GB, 8GB, 16GB, 32GB 2GB, 4GB, 8GB, 16GB, 32GB       FIPS 197 FIPS 140-2 FIPS 197 FIPS 140-2 FIPS 197 FIPS 197       3.0 2.0 2.0 2.0 2.0 2.0                      -                     1 1 1  1 1             –     –       26 Languages 26 Languages 26 Languages 24 Languages 24 Languages 24 Languages –   – – -    –   –   – – – available on request    available on request available on request 1 Locks if PC is idle for more than 10 mins
  • 8. integralmemory.com 8 SSD - Hardware Encryption Hardware Encrypted Solid State Drives Hard Drive security is a challenge facing all IT departments and government bodies. Integral produce a range of AES 256-bit hardware encrypted SSDs that provide an easy to use, cost effective and highly secure solution that is designed to work with your end-point security. If a PC/laptop/ultrabook/tablet protected with an Integral Crypto SSD is lost or stolen, sensitive data is securely encrypted and cannot be accessed without the high-strength password. This includes the operating system as well as all other files that are stored on the drive. An unauthorised user WILL NOT be able to boot the system or access any data by transferring the Crypto SSD to another system or by cloning the drive. Our Crypto range is FIPS 140-2 validated and all models are zero footprint, so no software installation is required. All files on the drive are automatically encrypted and are protected by a mandatory high-strength password. All Crypto products will securely destroy data safely if the set password attempts are exceeded, protecting your data if lost or stolen. The Crypto SSD is the no-fuss and highly-secure solid state encryption solution for many industries including; finance, legal, health, education and government. Hardware encryption in 3 easy steps 1. Install the Crypto SSD in your host device. A Windows operating system is required. This can be cloned from an existing drive or image (with OS and data) before the Crypto SSD is fitted, or a fresh installation can be completed after the Crypto SSD is fitted in your host device, by using the manufacturers setup disks. 2. Run the “SSDLock” program once (supplied on a USB) to set the encryption and specify usernames and passwords. Power down. 3. Your system is now protected with Full Disk Encryption (FDE). On every boot up, a valid username and password is required to access the system. Full Disc Encryption with no licensing or subscription fees Key features: • FIPS 140-2 Validated • Mandatory encryption • Secure Entry - Encrypted data cannot be accessed without the correct high-strength 8-16 character alphanumeric password. Before use a high-strength password must be set • Secure Design - The electronics are sealed in tamper-free epoxy resin • High-speed Read/Write - up to 450MB/s* • Quick Boot - Using a solid state disk in place of a traditional hard drive can cut your desktop computer or laptop’s boot time in half • Shockproof - no moving parts, so a greater resistance to shock and vibration than HDD • Silent operation - no spin or seek time • Low heat - a more comfortable user experience • Low power usage - laptop battery will last far longer with SSD than HDD • Endpoint security software compatible - The Integral Crypto SSD operates comfortably with endpoint security solutions by using the configurable hardware unique ID feature, which is part of the program • BIOS Independent - Crypto SSD security system runs independently of your system BIOS, unlike other hardware encrypted SSDs • Seamless encryption unnoticeable to the user • ADMIN+USER - passwords configurable • Warranty - 3 Years * Based on internal testing TIP! Hardware Encrypted SSD Drives
  • 9. Watch our channel: youtube.com/IntegralMemoryTV 9 CRYPTO SSD 2.5” SATA III (6Gbps) Crypto SSD is the Full Disk Encryption solution for Windows desktops and laptops. Featuring AES 256-bit Hardware Encryption so you can encrypt and protect your sensitive data and get the speed, reliability and power benefits of SSD. Once encryption is set, a valid user name and password is required to access the Crypto SSD prior to system boot (before Windows loads). PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power UseRotates 360° USB 2.0Genuine Leather Key Chain Cap Storage Shockproof PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight CRYPTO SSD MSATA III (6Gbps) CRYPTO SSD M.2 SATA 22X60 CRYPTO SSD M.2 SATA 22X80 PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power UseRotates 360° USB 2.0Genuine Leather Key Chain Cap Storage Shockproof PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power UseRotates 360° USB 2.0Genuine Leather Key Chain Cap Storage Shockproof PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power UseRotates 360° USB 2.0Genuine Leather Key Chain Cap Storage Shockproof PDA Mobile Phone Camera MP3 SatNav Camcorder Zero Noise Ultra Fast Low Power Use Lightweight Ultra-slim form factor (7mm) Ideal for the latest slimline laptops, 7mm 9mm adapter also included Barnes Roffe have really benefited from making the switch from a software-based PC encryption to Integral’s Crypto SSD hardware encryption. We have eliminated the sluggish computing experience we were having with software encryption and we now have a more productive workforce thanks to the massively improved computer boot-up times and faster applications, due to no computer resources being used by the hardware encryption as its applied directly on the Crypto SSD Barnes Roffe LLP - Chartered Accountants 64GB INSSD64GS625M7CR140 128GB INSSD128GS625M7CR140 256GB INSSD256GS625M7CR140 512GB INSSD512GS625M7CR140 1TB INSSD1TS625M7CR140 64GB INSSD64GMSA6MCR140 128GB INSSD128GMSA6MCR140 256GB INSSD256GMSA6MCR140 512GB INSSD512GMSA6MCR140 128GB INSSD128GM2M2260C140 256GB INSSD256GM2M2260C140 512GB INSSD512GM2M2260C140 128GB INSSD128GM2M2280C140 256GB INSSD256GM2M2280C140 512GB INSSD512GM2M2280C140
  • 10. integralmemory.com 10 computing security www.computingsecurity.co.uk30 @CSMagAndAwards I t beggars belief that, even with all the publicity surrounding data protection, hardly a week goes by without us hearing about yet another government department or business losing sensitive or personal data. Even the MoD had to own up recently to having a laptop containing confidential employee and banking information stolen from a motorway service station. Data encryption is such an obvious solution to this perennial problem and there is no shortage of choices. Integral Memory specialises in this area and provides some of the most secure solutions available. It offers a wide range of products providing hardware encryption and claims its Crypto SSD is the most secure solid state drive on the market. A big advantage these have over software products is all encryption/decryption is carried out internally by their dedicated processor and so have no host system overheads. The Crypto SSD is sealed in a tamper- proof epoxy resin shell and protected further by a metal outer case. With no moving parts, it's resistant to shocks, is completely silent and produces very little heat. The drive has standard SATA and power interfaces, and supports speeds up to 6Gbits/sec. It employs military-grade AES- 256 encryption and is certified to the FIPS 140-2 standard - an absolute requirement for sale into the US Federal Government. For the Crypto SSD to provide total protection, it must have the OS installed directly on it. You can use disk cloning software, if it's replacing an existing disk, but we had no problems fitting the SSD in a desktop PC and installing a fresh copy of Windows 7 Professional on it. The next step is to run the supplied SSDLock software with administrative privileges. It's simple to use and offers a dual mode, which allows you to create Master and User accounts - so, if the latter forgets their password, the former can go in and reset it for them. Strong passwords are mandatory and we could set a failed login limit from 6 to 20 attempts. This circumvents brute force password attacks, as once the retry count has been exceeded, the SSD will lock itself, requiring the Master to re-create the user's account. However, if the user name is persistently entered incorrectly, the SSD will reset and erase itself. In single user mode, it will also erase itself if either the username or password is incorrectly entered. On completion, the PC was powered down and, on the next power up, the BIOS boot screen asked for a user name and password. And that's all there is to it, as from this point onwards we continued to use the PC normally where we could see no noticeable difference in performance. We tested the dual mode settings by powering the PC off and on, and incorrectly entering the user account password. After six attempts, the boot screen advised us to contact the administrator to get our account reset and all further attempts to use this account name received the same warning. We then tried to login with the wrong user name and were warned that, if we continued down this path, it would erase the SSD. We persisted and, sure enough, the SSD erased itself. When we rebooted our PC, we found it was completely devoid of the OS and all data. During testing, we found the Crypto SSD extremely easy to use and capable of providing a completely transparent encryption/decryption process. When data security solutions are this easy to deploy, businesses really have no excuses for not using them to ensure their sensitive data is totally secure, no matter where it ends up. Product: Crypto SSD Supplier: Integral Memory Web site: www.integralmemory.com Available from all good IT resellers Crypto SSD is also available in mSATA, M.2 SSD formats. INTEGRAL MEMORY CRYPTO SSD product review LQWHJUDO68%%('%:T[G3DJH Computing Security Computing SecuritySecure systems, secure data, secure people, secure business
  • 11. Watch our channel: youtube.com/IntegralMemoryTV 11 Customisation Available Your own serial number etching, Flash Drive and GUI can be customised to suit your brand (subject to minimum order quantities). The Integral hardware encrypted Flash Drive range can be personalised with a designated company identifying name or number. This will allow a Network Administrator to block access to unrecognised USBs for security purposes, whilst allowing the Integral encrypted Flash Drive to function as the ‘official’ company drive. During production a personalised tag (e.g. “LONDON UNIVERSITY”) can be embedded into the Crypto that can be viewed on a PC. The tag gives Endpoint software a convenient way to identify Integral drives. Each drive can be personalized further (upon request) with an individual user specific personal tag e.g “LONDON UNIVERSITY” – USER1234” if required. This personalisation can be offered on any Integral USB Flash Drive (requested at time of order). Customisation Hardware Unique ID for Endpoint software
  • 12. integralmemory.com AllTrademarksAcknowledged.EOEProductspecificationssubjecttochangewithoutnotice. France Integral Europe SARL 38 Ter Rue de Verdun 92150 Suresnes France Tel: +33 1 41 44 73 00 Fax: +33 1 41 44 07 18 www.integralmemory.com salesfr@integraleurope.com Spain Integral Memory España, S.A. Calle Rodríguez San Pedro 2 Planta 7a - Oficina 712 28015 Madrid Tel: +34 91 406 29 32 Fax: +34 91 764 7526 www.integralmemory.com sales@integraleurope.com Netherlands Integral Memory plc Burgemeester Brandtstraat 2 2841 XC Moordrecht The Netherlands Tel: +31 18 23 77240 Fax: +31 18 23 77241 www.integralmemory.com netherlands@integraleurope.com Representative Offices Poland M: +48 60 244 3002 piotr.chrzanowski@integralmemory.com Portugal Tel: +351 210819012 M: +351 912881144 Fax: +351 210819012 sobrinho.pires@integraleurope.com Australia New Zealand Tel: +61 243 424 861 M: +61 406 061 437 duncan.way@integralmemory.com Head Office Integral Memory plc Unit 6 Iron Bridge Close Iron Bridge Business Park London NW10 0UF England Tel: +44 20 8451 8700 Fax: +44 20 8459 6301 sales@integralmemory.com www.integralmemory.com www.integralmemoryplc.com INTUKENCR161