Search Results

We have found 24 items matching your search query.

fallback-no-image-1841

Crypto SSD

Internal encrypted hard drive. SATA III 2.5″. FIPS 140-2 certified. Windows only. Also offers encrypted USB drives.
fallback-no-image-1884

Aegis Padlock

Hardware encrypted hard drives. HDD and SSD. PIN pad and bio-metric. Portable and desktop. Feature brute force protection and FIPS 140-2 Level 2 Validation. 120 GB to 8 TB.
fallback-no-image-1843

Eclypt

External, internal and USB hardware encrypted drives. HDD or SSD. FIPS 140-2 certified.
fallback-no-image-1886

IronKey Workspace

Hardware and software encrypted USB computers. “Windows to Go” certified. Bootable in Windows 8 and 10 enterprise. Features FIPS 140-2 Level 3 certification. 32 GB to 128 GB.
fallback-no-image-1846

DataLocker H100

External hardware encrypted drive. First USB external hard drive to be FIPS 140-2 Level 3 validated. 256 GB to 1 TB. Formerly IronKey H100.
fallback-no-image-1888

EncryptStick Lite

Encryption software for USB drives. Features include instantly locking application and vault and ability to wipe program’s temporary files, clipboard, cache, and secure memory. FIPS 140-2 compli
fallback-no-image-1848

Kanguru Defender

Hardware encrypted drives. Feature HDD or SSD. FIPS 140-2 certification. Remote management. 256 GB to 1 TB
fallback-no-image-1933

PrivateWave

Voice apps for mobile devices. Features security compliance with FIPS, NIST and NSA.
fallback-no-image-1863

Safexs Protector XT

Hardware encrypted USB drive. Features auto destruct at a specific date and time, brute-force protection, anti-virus and FIPS 197 compliance.
fallback-no-image-2039

TrustCall

Encrypted voice for mobile. FIPS 140-2 Level 1 Certified.
fallback-no-image-1871

DataLocker Sentry 3

Hardware encrypted USB drive. Features brute force protection and FIPS 197 certification. 4 GB to 64 GB.
fallback-no-image-2454

NanoCrypto

A cryptographic engine purpose built for resource-constrained embedded systems environments. Features support for over 35 operating systems, cryptographic methods including RSA and elliptic curve, sym