Kingston Technology, a world leader in memory products and technology solutions, has added new features to its recent Cyber Defense 2018 Global Awards winning IronKey™ D300 encrypted USB flash drive to improve device management and security. A modern serialized version (D300S) with two new features will further enhance the drive’s already advanced level of security to safeguard sensitive data.

 

IronKey D300S will have a unique serial number and bar code on the drive itself, allowing network administrators to simply read or scan the code instead of plugging in the drive. When a drive is deployed or returned during any physical auditing or asset management of hardware, this feature will make the process more efficient and streamlined. The second feature, a virtual keyboard, enables users to enter a password with mouse clicks instead of using a physical keyboard, thereby providing a greater level of protection against any possible keylogging.

 

The new serialized drives will also be available as a Managed model1 (D300SM) that requires IronKey EMS or SafeConsole® by DataLocker³ allowing central management of drive access and usage across thousands of drives. This will be the first IronKey drive that will now be supported on SafeConsole, allowing it to be used by customers who have already installed it. IronKey D300SM will be available in Q1 2019.

 

“We’re not content on standing pat with any of our products, no matter how good they are,” said a Kingston representative. “The data protection provided by IronKey D300 is already topnotch, and we’ve listened to the requests from our customers. These two enhancements in the D300 series add to its industry-leading data-protection capabilities. With Kingston’s 30-plus years of expertise in quality technology solutions behind it, along with the latest NAND flash memory and controller technology, users of any D300 drive are rest assured that their confidential data and information are well-protected from the risks and threats associated with loss, theft, or stolen digital devices.”

 

For more information visit kingston.com.

Compatibility Table

Operating System

D300/D300S

D300 Managed

D300S Managed

File Transfer

IronKey EMS

File Transfer

SafeConsole/

IronKey EMS

Windows® 10, 8.1. 8, 7 (SP1)

Yes

Yes

Yes

Yes

Yes

Mac OS X v.10.9.x – 10.12.x

Yes

Yes

Yes

Yes

Yes

Linux v.2.6.x+6

Yes4

No

No

Yes5

No

 

  • Password requirements set by Administrator during set up using IronKey EMS for IronKey D300 Managed drives.

 

  • Product must be clean and dry before use.

 

  • IronKey EMS/SafeConsole by DataLocker, purchased separately.

 

  • D300S supports limited Linux commands, such as login, logout, initialize, about and forgot password.

 

  • D300SM supports limited Linux commands, such as login, logout and password change.

 

  • Certain distributions of Linux will require super-user (root) privileges in order to execute the DataTraveler commands properly in the terminal application window.

 

  • Some of the listed capacity on a flash storage device is used for formatting and other functions and thus is not available for data storage. As such, the actual available capacity for data storage is less than what is listed on the products. For more information, go to Kingston’s Flash Memory Guide at kingston.com/flashguide.

 

  • Speed may vary due to host hardware, software and usage.

 

 

Kingston IronKey D300 Serialized Features and Specifications:

 

  • Encrypted: With encryption, no one can access data that you have stored on the drive without knowing the password.

 

  • Meet frequently requested IT requirements: IronKey D300 is FIPS 140-2 Level 3 certified and TAA compliant so you are rest assured it meets the most frequently requested corporate and government IT requirements.

 

  • Easily manage thousands of drives: With IronKey EMS or SafeConsole, you can centrally administer access and usage policies and easily manage thousands of drives.

 

  • Unique Serial Number and Scannable Barcode: Time saver, simply read or scan the barcode, when deploying, when it is returned as well as during any physical auditing.

 

  • Interface: USB 3.1 Gen 1

 

  • Capacity: 4GB, 8GB, 16GB, 32GB, 64GB, 128GB

 

  • Speed: USB 3.1 Gen 1: 4GB: 80MB/s read, 12MB/s write
    8GB & 16GB: 165MB/s read, 22MB/s write
    32GB: 250MB/s read, 40MB/s write
    64GB: 250MB/s read, 85MB/s write
    128GB: 250MB/s read, 85MB/s write
    USB 2.0: 4GB: 30MB/s read, 12MB/s write
    8GB–128GB: 30MB/s read, 20MB/s write

 

  • Dimensions: (77.9 x 22.2 x 12.05mm)

 

  • Waterproof: Up to 4ft.; conforms to IEC 60529 IPX8.

 

  • Operating Temperature: 32°F to 140°F (0°C to 60°C)

 

  • Storage Temperature: -4°F to 185°F (-20°C to 85°C)

 

  • Compatibility: USB 3.0 compliant and 2.0 compatible

 

  • Minimum System Requirements:
    ◦ USB 3.0 compliant and 2.0 compatible
    ◦ Two (2) free drive letters required for use

 

  • Compatible with: Windows® 10, Windows 8.1, Windows 8, Windows 7 (SP1), Mac OS (v. 10.11.x – 10.14.x)

 

  • Standard Drive Compatible with: Windows® 10, Windows 8.1, Windows 8, Windows 7 (SP1), Mac OS (v. 10.11.x – 10.14.x), Linux v.2.6x+ 6

 

  • Managed Drive Compatible with: Windows® 10, Windows 8.1, Windows 8, Windows 7 (SP1), Mac OS (v. 10.11.x – 10.14.x)

 

Kingston can be found on:
Facebook: http://www.facebook.com/KingstonBlogFansClub.en
YouTube: http://www.youtube.com/user/KingstonAPAC

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
ASUS Republic of Gamers Announces Rapture GT-AC5300
Techworld Date Posted: 29 August 2017 4:41 PM | 283 Views
Modern online games require close teamwork and precise control from players; even a second of unwanted network latency can lose a game. To date, most routers labeled as ‘gaming routers' are largely defined by.... See More
 
ASUS Republic of Gamers Announces Rapture GT-AC5300
Techworld Date Posted: 4:41 PM | 283 Views
Modern online games require close teamwork and precise control from players; even a second of unwanted network latency can lose a game. To date, most routers labeled as ‘gaming routers' are largely defined by...See More

 
Phantom 4 Advanced vs Phantom 4 Pro: 4 Differences You Need to Know
Techworld Date Posted: 24 August 2017 9:41 AM | 233 Views
DJI's most recent release, the Phantom 4 Advanced, is a slightly altered version of the Phantom 4 Pro unit which came out late last year. Its titanium and magnesium alloy makes the aircraft more durable.... See More
 
Phantom 4 Advanced vs Phantom 4 Pro: 4 Differences You Need to Know
Techworld Date Posted: 9:41 AM | 233 Views
DJI's most recent release, the Phantom 4 Advanced, is a slightly altered version of the Phantom 4 Pro unit which came out late last year. Its titanium and magnesium alloy makes the aircraft more durable...See More

 
Kaspersky Lab Unravels the Truth on Cyber Espionage at its 3rd APAC Cyber Security Conference
Techworld Date Posted: 17 October 2017 1:26 PM | 308 Views
Kaspersky Lab unriddled the mysterious threat of cyberespionage against countries, critical infrastructure, and companies in the region on its 3rd Asia Pacific (APAC) Cyber Security Weekend in Phuket, Thailand last week.. See More
 
Kaspersky Lab Unravels the Truth on Cyber Espionage at its 3rd APAC Cyber Security Conference
Techworld Date Posted: 1:26 PM | 308 Views
Kaspersky Lab unriddled the mysterious threat of cyberespionage against countries, critical infrastructure, and companies in the region on its 3rd Asia Pacific (APAC) Cyber Security Weekend in Phuket, Thailand last week.See More

 
ADATA Sets New Overclocking Record with XPG SPECTRIX D80 RGB Memory Module at 5584MT/s
Techworld Date Posted: 9 January 2019 12:40 PM | 65 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules, and NAND Flash products has announced that it has overclocked its XPG SPECTRIX D80 RGB DDR4 memory module. See More
 
ADATA Sets New Overclocking Record with XPG SPECTRIX D80 RGB Memory Module at 5584MT/s
Techworld Date Posted: 12:40 PM | 65 Views
ADATA Technology, a leading manufacturer of high-performance DRAM modules, and NAND Flash products has announced that it has overclocked its XPG SPECTRIX D80 RGB DDR4 memory moduleSee More

 
Epson Works with Youth Groups to Drive Environmental Initiatives
Techworld Date Posted: 11 February 2019 2:08 PM | 62 Views
Epson has partnered with two youth-led organizations to help raise awareness on environmental issues as part of its 2018 to 2019 environmental initiatives, in line with its vision to contribute to the development of.... See More
 
Epson Works with Youth Groups to Drive Environmental Initiatives
Techworld Date Posted: 2:08 PM | 62 Views
Epson has partnered with two youth-led organizations to help raise awareness on environmental issues as part of its 2018 to 2019 environmental initiatives, in line with its vision to contribute to the development of...See More

 
Concerns on the Rise about Mobile Apps Watching and Tracking Users, Finds Kaspersky Lab
Techworld Date Posted: 16 July 2018 4:28 PM | 404 Views
The monitoring capabilities of mobile apps are becoming a concern for users, many of whom are worried that the apps on their connected devices might be able track them down, watch what they’re doing,.... See More
 
Concerns on the Rise about Mobile Apps Watching and Tracking Users, Finds Kaspersky Lab
Techworld Date Posted: 4:28 PM | 404 Views
The monitoring capabilities of mobile apps are becoming a concern for users, many of whom are worried that the apps on their connected devices might be able track them down, watch what they’re doing,...See More

 
Cyberthreats to Financial Institutions in 2019: Overview and Predictions
Techworld Date Posted: 22 December 2018 3:10 PM | 92 Views
The past year has been extremely eventful in terms of the digital threats faced by financial institutions --- cybercrime groups have used new infiltration techniques and the geography of attacks has become more extensive.. See More
 
Cyberthreats to Financial Institutions in 2019: Overview and Predictions
Techworld Date Posted: 3:10 PM | 92 Views
The past year has been extremely eventful in terms of the digital threats faced by financial institutions --- cybercrime groups have used new infiltration techniques and the geography of attacks has become more extensive.See More

 
AOC Takes the Lead in the Philippine Market Share throughout 2017
Techworld Date Posted: 31 July 2018 3:45 PM | 583 Views
The most recent report from the International Data Corporation (IDC), the world’s premiere global market intelligence firm, has confirmed that AOC under the Multi Media Display (MMD) group has retained its spot in Philippine.... See More
 
AOC Takes the Lead in the Philippine Market Share throughout 2017
Techworld Date Posted: 3:45 PM | 583 Views
The most recent report from the International Data Corporation (IDC), the world’s premiere global market intelligence firm, has confirmed that AOC under the Multi Media Display (MMD) group has retained its spot in Philippine...See More

 
Transcend Reveals UASP-Ready SSD Enclosure Kit for Enhanced Transfer Efficiency and Data Mobility
Techworld Date Posted: 30 October 2018 1:32 PM | 101 Views
Transcend Information Inc., a leading manufacturer of storage and multimedia products, is proud to introduce SSD Enclosure Kit options in different form factors to cover all possibilities and enhance data mobility.. See More
 
Transcend Reveals UASP-Ready SSD Enclosure Kit for Enhanced Transfer Efficiency and Data Mobility
Techworld Date Posted: 1:32 PM | 101 Views
Transcend Information Inc., a leading manufacturer of storage and multimedia products, is proud to introduce SSD Enclosure Kit options in different form factors to cover all possibilities and enhance data mobility.See More

 
Q2 2017 Akamai state of the Internet Security Report Analyzes Re-emergence of PBOT Malware Domain Generation Algorithms Relationship Between Mirai Command and Control and Attack Targets
Techworld Date Posted: 29 August 2017 3:41 PM | 325 Views
Newly released data shows that distributed denial of service (DDoS) and web application attacks are on the rise once again, according to the Second Quarter, 2017 State of the Internet / Security Report released.... See More
 
Q2 2017 Akamai state of the Internet Security Report Analyzes Re-emergence of PBOT Malware Domain Generation Algorithms Relationship Between Mirai Command and Control and Attack Targets
Techworld Date Posted: 3:41 PM | 325 Views
Newly released data shows that distributed denial of service (DDoS) and web application attacks are on the rise once again, according to the Second Quarter, 2017 State of the Internet / Security Report released...See More


Power by

Download Free AZ | Free Wordpress Themes