Stealth MXP® G2 Bio Biometric USB Drive, Strong Authentication, Secure Portable Storage
|
|
|
Stealth MXP G2 Bio delivers unsurpassed user authentication and data protection. Stealth MXP G2 Bio is a multifunctional, portable, biometric USB drive with true zero footprint portability, hardware based AES 256 bit encryption, as well as advanced digital identity features. The Stealth MXP G2 Bio is perfect for organizations that require up to 3-factor authenication- biometric, password or both.
Features:
|
|
|
- Biometric Authentication
- Password Authentication
- Secure USB Mass Storage - 1GB to 32GB
- Hardware AES256-bit Encryption
- On board Bluefly Processor
- Malware protection
- Tamper Evident
- Waterproof
- Dustproof
- Simple Management - with addition of ACCESS Enterprise software.
- Digital Identities and Crypto Services
- Microsoft Windows 2000, XP, Vista; Macintosh OSX; Linux
- Optional ACCESS Antivirus Scanner.
|
FIPS 140-2 Level 3 Validated
|
|
|
|
|
|
|
|
Call or email for more information | BUY NOW
|
|
|
|
|
|
|
Stealth MXP® Bio Biometric USB Drive, Strong Authentication, Secure Portable Storage
|
|
|
Stealth MXP Bio delivers unsurpassed user authentication and data protection. Stealth MXP Bio is a multifunctional, portable, biometric USB drive with true zero footprint portability hardware based AES 256 encryption, as well as advanced digital identity features. The Stealth MXP Bio is perfect for organizations that require up to 3 factor authentication.
Features:
|
|
|
|
|
- Biometric Authentication
- Password Authentication
- Secure USB Storage - 1GB to 32GB
- Hardware Data Encryption
- Simple Management with ACCESS Software
- Digital Identities and Crypto Services
- Windows 2000, XP, Vista; Mac OSX; Linux
|
|
|
FIPS 140-2 Level 2 Validated
|
|
|
|
|
|
Call or email for more information | BUY NOW
|
|
|
|
|
|
Stealth MXP® Passport Secure USB Drive, Encryption, Password Authentication
|
|
|
- Password Authentication
- Secure USB Storage - 1GB to 32GB
- Hardware Data Encryption
- Simple Management with ACCESS Software
- Digital Identities and Crypto Services
- Windows, Mac, Linux
|
|
|
FIPS 140-2 Level 2 Validated
|
|
|
|
|
Call or email for more information | BUY NOW
|
|
|
|
|
|
|
|
|
|
|
Stealth M-Series® Secure USB Drive, Strong Authentication, Portable Storage
|
|
|
Stealth M200, Stealth M500, Stealth M550
All Stealth M-Series devices are powered by the Bluefly Processor. The Bluefly Processor provides unmatched protection against malware in any environment- foreign or familiar. Bluefly’s Safeshare technology allows Stealth M-Series users to collaborate using on-device data without compromising it’s safety. All Stealth M-Series devices are protected by a tamper evident enclosure which acts as an integral case making the device both dustproof and waterproof.
Features:
|
|
|
- Strong Password Authentication
- Secure USB Mass Storage - 1GB to 32GB
- On-board Bluefly Processor
- Hardware Based AES 256-bit Encryption
- Safeshare
- Malware Protection
- Tamper Evident
- Dustproof
- Waterproof
- One Time Password (Stealth M500 and Stealth M550 only)
- Simple Management - with addition of ACCESS Enterprise software (Stealth M500 and Stealth M550 only)
- Microsoft Windows 2000, XP, Vista; Macintosh OSX
- ACCESS Antivirus Scanner optional
|
|
FIPS 140-2 Level 3 Validated
|
|
|
|
|
|
|
|
|
Call or email for more information | BUY NOW
|
|
|
|
|
|
|
|
|
|
|
Stealth HD Bio Biometric Hard Drive, High capacity, Secure Portable Storage
|
|
|
The Stealth HD Bio is ideally suited for organizations that need high capacities for sensitive data or fully portable desktop and OS environments with strong user authentication- biometric, password or both.
Features:
|
|
|
- Biometric Authentication
- Password Authentication
- Bluefly Processor
- Malware Protection
- Safeshare
- Tamper Evident
- Waterproof
- Dustproof
- Secure USB Mass Storage - 250GB, 320GB and 500GB
- AES 256-bit CBC Hardware Encryption
- Simple Management with ACCESS Enterprise software.
- Windows, Mac, Linux
- ACCESS Antivirus Scanner is optional
|
FIPS 140-2 Level 3 Validated
|
|
|
|
|
|
|
Call or email for more information | BUY NOW
|
|
|
|
|
|
|
|
|
|
|
Stealth HD Encrypted USB Hard Drive, High Capacity, Secure Portable Storage
|
|
|
This non-biometric Stealth HD is ideally suited for organizations that need high capacities for sensitive data or fully portable desktops and OS environments with strong user authentication. Stealth HD provides true zero footprint portability in any environment that supports USB mass storage. It also provides transparent hardware based AES 256-bit CBC encryption and advanced digital identity features.
Features:
|
|
|
- Strong Password Authentication
- Bluefly Processor
- Malware Protection
- Safeshare
- Tamper Evident
- Waterproof
- Dustproof
- Secure USB Mass Storage - 250GB, 320GB and 500GB
- AES 256-bit Hardware Encryption
- Simple Management with ACCESS Enterprise Software
- Windows, Mac, Linux
- ACCESS Antivirus Scanner optional
|
|
|
FIPS 140-2 Level 3 Validated
|
|
Call or email for more information | BUY NOW
|
|
|
|
|
|
|
|
|
|
|
Outbacker MXP Bio Biometric USB Hard Drive
|
|
|
The Outbacker MXP is ideally suited for organizations that need high capacities for portable data or portable desktop. Provides strong user authentication- biometric, password or both.
Features:
|
|
|
|
|
- Biometric Authentication
- Password Authentication
- Secure USB Mass Storage - 250GB, 320GB, 500GB
- Hardware Data Encryption
- Simple Management with ACCESS Enterprise Software
- Windows 2000, XP, Vista; Macintosh OSX; Linux
|
|
|
FIPS 140-2 Level 2 Validation
|
|
|
|
|
|
Call or email for more information | BUY NOW
|
|
|
|
|
|
ACCESS Enterprise Device Management Solution
|
|
|
ACCESS Enterprise is a full featured device management solution. ACCESS Enterprise provides unmatched control over large deployments of portable security devices. Provisioning is streamlined, security policies are customizable, deploying and managing MXI Security devices across a wide range of network and security environments are made simple.
There is a solution for each of your Stealth portable security needs- all of them manageable with ACCESS Enterprise.
|
|
|
The Ultimate in Provisioning
|
|
|
- Administrators can tailor security policies and device behavior to different end user needs.
- Advanced user credentials such as digital certificates and RSA SecurID soft tokens can be automatically requested from their issuing servers and placed on the device in a single step.
- A simple user interface featuring intuitive wizards facilitates self serve deployments
|
|
|
The Ultimate in Manageability
|
|
|
- Separable administrative roles provide the granularity required for proper delegation of management duties.
- Seamless integration with an organization’s corporate directory avoids any duplication of identity stores.
- A complete history of administrative activities, security policies and respective state of each individual device are logged to satisfy audit and compliance requirements.
- Queries based on username, device serial number or certain issuance parameters enhance the administrator’s ability to get information about the devices in the system.
- Remote administrative device recovery keeps users productive wherever they are.
- Optional data destruction after multiple failed authentication attempts keeps sensitive data secure.
|
|
|
The Ultimate in Portability
|
|
|
- Zero footprint approach means no software needs to be installed on user workstations.
- No administrative rights are necessary on the local system.
|
|
|
Call or email for more information | See Prices
|
|
|
|
|
|
|
|
|
|
|
ACCESS Identity Strong Authenication for Security Applications
|
|
|
ACCESS Identity is a suite of modules delivering strong authentication and digital identity features to security applications. ACCESS Identity allows mission critical enterprise systems such as single sign on, remote access, full disk encryption, PKI and device lifecycle management solutions such as ACCESS Enterprise to be fully secured while allowing for total portability. (Requires ACCESS Enterprise)
|
|
|
Call or email for information or pricing.
|
|
|
|
|
|
|
|
|
|
|
ACCESS Antivirus Scanner On Board Virus and Malware Protection
|
|
|
ACCESS Antivirus Scanner prevents malware from being copied onto USB drives allowing users to retain the convenience of portable storage while protecting their device, their data and systems they encounter from malware. ACCESS Antivirus Scanner resides on the device and requires no installation. Access Antivirus Scanner employes McAfee® technology to protect against viruses, worms, trojans and other malware threats.
|
|
Call or email for information or pricing
|
|
|
|
|
|