IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 9
What systems can I use it on?
»
Windows
®
8.1
»
Windows
®
8
»
Windows
®
7 (SP1)
»
Windows
®
Vista (SP2)
»
Mac OS
®
X (10.9.x - 10.11.x)
»
Linux (2.6+)
The computer must have a USB 2.0 port for high-speed data transfer. A USB 1.1 port or
powered hub will also work, but will be slower.
Some applications are available only for specific systems:
»
Windows Only
•
IronKey Identity Manager
•
CRYPTOCard
»
Mac Only
•
Auto-Launch Assistant
How secure is it?
IronKey Enterprise 250 Series has been designed from the ground up with security in mind. A
combination of advanced security technologies are used to ensure that only you can access your
data. Additionally, it has been designed to be physically secure, to prevent hardware-level attacks
and tampering, as well as to make the device rugged and long-lasting.
The IronKey Cryptochip is hardened against physical attacks such as power attacks and bus
sniffing. It is physically impossible to tamper with its protected data or reset the password
counter. If the Cryptochip detects a physical attack from a hacker, it destroys the Cryptochip
making the stored encrypted files inaccessible.
We strive to be very open about the security architecture and technology that we use in
designing and building this product. We use established cryptographic algorithms, we develop
threat models, and we perform security analyses (internal and third party) of our systems all the
way through design, development and deployment.