Download Now - Imation
Download Now - Imation
Download Now - Imation
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
H200<br />
BIOMETRIC HDD<br />
KEY FEATURES:<br />
• FIPS 140-2 Level 3 Validated<br />
• AES 256-bit Hardware Encryption<br />
• Two-factor Authentication<br />
• Biometric (fingerprint) Identification<br />
• Tamper-resistant, Metal Enclosure<br />
• Capacities: 320GB, 500GB, 1TB<br />
OPTIONAL<br />
• Antivirus Software<br />
• Central Management Software/<br />
Access Enterprise<br />
ACCESS<br />
ENTERPRISE<br />
• IP Restriction<br />
• Online Usage<br />
• Centralized Device Provisioning<br />
and Management<br />
• Security Policies<br />
• Key Management (user rescue)<br />
• Report and Auditing<br />
MALWARE PROTECTION<br />
• Antivirus Scanning<br />
ALL IMATION FLASH DRIVES<br />
AND PORTABLE HARD DISKS COME<br />
WITH ACCESS STANDARD SOFTWARE.<br />
SECURITY CERTIFICATES<br />
The Federal Information Processing Standards (FIPS) are U.S. government standards<br />
for information technology and computer security. The FIPS program is run by the<br />
National Institute of Standards (NIST). NIST FIPS 140 is the cryptography standard<br />
program required by the US federal government for protection of sensitive data. All<br />
products using cryptography in use by civilian and military US federal agencies must<br />
comply with FIPS 140. The current FIPS version is 140-2.<br />
FIPS 140-2<br />
LEVEL 3<br />
VALIDATED<br />
Obtaining FIPS 140 validation requires a rigorous testing process by an accredited<br />
testing laboratory. The results are then reviewed by the National Institute of<br />
Standards and Technology (NIST) which issues a FIPS 140 validation certificate.<br />
<strong>Imation</strong> Basic, Personal and Enterprise devices were the first to achieve FIPS 140-2<br />
Level 3 certification for an encrypted USB storage device. <strong>Imation</strong> certifies not only<br />
the Cryptochip used to secure data and protect encryption keys but all electronic<br />
components within these devices. This provides customers the assurance that data<br />
stored on these devices will remain secure.