USB 3.0 Flash Drive
Capacities up to 64GB*
FIPS PUB 197 certified
XTS-AES 256- bit hardware encryption – no software required
OS & Platform independent
What is datAshur Personal2?
The iStorage datAshur Personal2 is the world’s most secure, easy to use and affordable USB 3.0 flash drive, employing PIN code access with military grade XTS-AES 256-bit hardware encryption. The datAshur Personal2 incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port.
All data transferred to the datAshur Personal2 is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access even if your datAshur Personal2 is lost or stolen. The datAshur Personal2 automatically locks when unplugged from the host computer or power to the USB port is turned off and can be set to timeout (lock) after a predetermined amount of time.
The datAshur Personal2 operates straight out of the box, does not require any software or drivers to be installed and is compatible with Windows, Mac, Linux, Chrome, Android, Thin Clients and embedded systems. The datAshur Personal2 delivers drag and drop encryption, plug and play simplicity and can be used with any software.
The datAshur Personal2 can be configured with independent User and Admin PINs, making it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN. The datAshur Personal2 also incorporates a drive reset feature which clears both User and Admin PINs, deletes all data, creates a new randomly generated encryption key and allows the drive to be reused. The datAshur Personal2 is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required.
As the iStorage datAshur Personal2 is unlocked via the on-board keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. The datAshur Personal2 protects your data with a “Brute Force Hack Defence Mechanism”. If both Admin and User PINs have been created and a User enters an incorrect User PIN 10 (ten) consecutive times, the datAshur Personal2's brute force mechanism will trigger and the User PIN will be deleted. All data will remain on the datAshur Personal2 and can only be accessed by the Admin entering the correct Admin PIN. If Admin enters an incorrect Admin PIN 10 (ten) consecutive times, then both the User and Admin PINs, the encryption key and all data will be deleted and lost forever The datAshur Personal2 will then revert back to factory default settings and will need to be formatted before it can be reused.
The datAshur Personal2 is an investment that will last for years.
How does datAshur Personal2 work?
Step 1: Enter your PIN Step 2: Plug & Play Step 3: Unplug to automatically lock
Why choose datAshur Personal2?
Did you know that millions of flash drives are lost or stolen every year and this figure is rising? Have you ever considered the impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it.
Information Commissioner's Office (ICO)
The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB flash drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.
General Data Protection Regulation (GDPR)
The European Union will soon have the power to fine companies €20 million or 4% of their annual turnover if they are found to be in breach of the new General Data Protection Regulation (GDPR). The forthcoming legislation compels anyone who holds data on EU Citizens to implement adequate security measures to protect data from loss or theft.
Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage datAshur Personal2 can protect you against all of this.
What is the difference between software and hardware encryption?
Complex passwords can be cracked easily and quickly with a Brute Force Attack
Simple password cracking software is readily available on the internet, often free of charge
Software encryption is vulnerable to key loggers – where every key pressed is logged in either a software or hardware key logger
Software encryption can be corrupted by viruses
Software encryption is much slower when compared to hardware encryption
Software encryption needs to be installed on each computer that the external storage device is used on
Software encryption shares computers resources to encrypt data with other programs on the computer, making it only as safe as your computer.
The datAshur Personal2 cannot be brute force attacked
The datAshur Personal2 is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard
The datAshur Personal2 does not require any software and can be used on any Windows, Mac, Linux, Chrome, Android, Thin Clients and Embedded Systems.
Encryption is performed in real-time thus there is no speed degradation
No software or drivers are required
OS and platform independent – compatible with Windows, Mac, Linux, Chrome, Android, Thin Clients and embedded systems
Capacities of 8GB, 16GB, 32GB & 64GB*
Real-time military grade XTS-AES 256-bit Hardware Encryption
Crypto-parameters protected with SHA-256 hashing
Timeout Lock - set to lock after predetermined amount of time
Super-fast USB 3.0
Read-Only (Write Protect) & Read/Write mode
Read/Write Speeds - 116/43 MBps
Guaranteed with 3 year warranty
Works with Smartphones, tablets, Google Chromebooks, thin clients, printers, scanners, CCTV cameras – any device with a USB or USB OTG port
PIN activated 7-15 digits - Alphanumeric keypad use a memorable number or word for your PIN
Brute Force Hack Defence Mechanism
Supports Admin and User independent PINs
Drive reset deletes data, User/Admin PINs, Encryption Key and recovers use of drive
No software or drivers required
Works with any USB/USB On-The-Go devices
Immune to BadUSB
Customisation service available – contact iStorage for further information
| Stock code || IEE-idap3-8|
| Brand || iStorage|
| Series || datAshur Personal2|
| Model || IS-FL-DAP3-B-8|
| Type || USB3 Key (Black) - 256-bit AES|
| ROHS || Y|
| Date added || 28/11/2016|
IS-FL-DAP3-B-8 Spec Information
| Capacity || 8GB|
| Form Factor / Drive Height || 83 x 17.4 x 8.6mm|
| Platter size || USB Stick|
| Guarantee || 3yr|
| Encryption || Military Grade FIPS PUB 197|
| OS Support - Windows || OS & Platform independent|
| OS Support - Mac/OSX || OS & Platform independent|
| OS Support - Linux || OS & Platform independent|
| OS Support - Other || OS & Platform independent|
| Read speed (Max) || 116|
| Write speed (Max) || 43|
| Colour || Black|
| Weight (kg) || 0.1kg|
| Weight (bare) || 20g|
iStorage datAshur Pro IS-FL-DA3-256-4 USB3 Key (Aluminium) - 256-bit AES 4GB |
Seagate Expansion Portable Drive STEA1000400 USB 3.0 - Black 1TB |
Toshiba Canvio Ready HDTP210EK3AA USB3 Portable Black 1TB |
Toshiba Canvio Ready HDTP210EW3AA USB3 Portable White 1TB |
Seagate Backup Plus Slim portable drive STDR1000200 USB 3.0 - Black 1TB |
Why People Choose Us?
14 Day Return Guarantee
If you change your mind, you can return all or part of your order.
Next Day Delivery
Order before 4pm*, and in-stock products will be with you the next day. (Or Saturday. Or even Same Day).
Wherever you are in the world, we can get your order to you at high speed.
SpanStor Build & Test
Our free service helps you choose the right NAS and Drives, then makes sure it is built & ready to use as soon as you get it.
Professional Live Support
We are here to assist you - before, during and after your purchase, by phone, email or live chat.