Skip to main content

Feel Secure with IronKey’s S200 USB Flash Drive

Feel Secure with IronKey

Although USB thumb drives have become the floppy disks of the 21st century, many of them suffer from pretty fatal flaws: most of the time, anybody with a USB port can tap into any data you’ve stored on a flash drive. So government, military, and even some enterprise and corporate users—not to mention superspies—angle for something better. IronKey aims to deliver with its new S200 USB flash drive, which the company claims is the first and only USB drive to meet U.S. government FIPS 140-2, Security Level 3 standards. That means that not only does the drive over hardware-based 256-bit AES encryption, but the cryptographic module itself is designed to be tamper resistant and can respond to attempts to physically access or modify the module.

“As one of the world’s leading information security companies, IronKey is continually innovating to push the boundaries of security and ease of use,” said IronKey CEO David Jevans, in a statement. “Our new IronKey S200 family of secure USB flash drives puts a whole new level of security into the hands of government, military, and enterprise customers, at an affordable price.”

The S200 also includes anti-malware capabilities (including AutoRun lockdown and a read-only mode), plus trusted network capabilities that enable the drive to only be accessed from trusted PCs—the drive can also lock itself up after a specified idle period. The drive also features remove management and monitoring capabilities, so administrators can tell where and when the drive is being used; there’s even a remote wipe facility in case a drive is lost or stolen.

IronKey isn’t saying what the “affordable price” on the S200 might be, but the drive will be available in capacities up to 16 GB and supports Windows 2000/XP/Vista, as well as Mac OS X and Linux.

Editors' Recommendations

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
Here’s why WWDC could be a ‘critical event’ for Apple
Apple CEO Tim Cook looks at a display of brand new redesigned MacBook Air laptop during the WWDC22

Apple is planning a packed line-up for its Worldwide Developers Conference (WWDC) on June 5, which could become “one of the most critical events in the company’s history.” Aside from the company’s upcoming Reality Pro headset, there will be major updates to Apple’s software systems, including the biggest watchOS revamp since the Apple Watch launched in 2015.

That’s according to a new report from Bloomberg journalist Mark Gurman, who has a history of accurate predictions and leaks surrounding Apple products. It suggests that WWDC will be a chance for Apple to set out its future ambitions for a “post-iPhone era.”

Read more
A key question for the Mac Pro has been answered — and it’s not good news
Apple's new Mac Pro sits on display in the showroom during Apple's Worldwide Developer Conference (WWDC).

We’ve heard a lot of potentially bad news about the upcoming Apple silicon Mac Pro in recent weeks, but there has always been one looming, unanswered question. Now, that question might have an answer.

Writing on Twitter, Bloomberg journalist Mark Gurman has reported that the next Mac Pro might lack a user-upgradable graphics option. In some ways that’s unsurprising, but it has major implications for the already-precarious state of modularity in the device.

Read more
Apple Security Research website launches to protect your Mac
Apple Seurity Research website has resources for bug bounty hunters.

Apple just launched a new website that's dedicated to macOS and iOS security and there are already two blog posts that provide examples of what to expect, one providing a deep dive into memory allocation within the XNU kernel at the heart of all Apple devices, and another discussing the improved security bounty process.

The new website will undoubtedly become a critical resource for Apple security researchers, both providing information and serving as a hub for submitting bounties. The Apple Security Research website is also where you can apply for an official Apple Security Research Device (SRD) to help with identifying vulnerabilities by providing special access to what are normally protected areas of iOS.

Read more