M550 Encrypted USB Drive

MXI Security M200

MXI Stealth Key M550; offers fast and secure, hardware-based encryption to protect data and digital identity, along with added manageability functions for administrators. Identical to the MXI Stealth Key M500 except for its casing — a lightweight, tamper-evident metal enclosure with steel ring attached ― MXI Stealth M550 was designed for rugged use by road warriors.

The M550 can also accommodate MXI Stealth Zone, an innovative platform for carrying your desktop on the device in order to transform any untrusted computer into a fully secure, managed IT environment.  COMPARE MXI STEALTH KEY FEATURES

 Download Product Sheet PDF

Features

  • Powered by the MXI Stealth Processor, which is FIPS 140-2 Level 3 validated (non-FIPS version available)
  • Hardware-based, AES-256 encryption secures data
  • Multifactor user authentication (strong password, optional biometric and CIC/PIV)
  • Able to carry RSA SecurID® soft tokens, providing 2-factor authentication to critical systems and infor¬mation
  • Sml M200
  • Lightweight, thixotropically injected magnesium enclosure that is tamper-evident, waterproof and dustproof
  • Zero software footprint
  • ACCESS Enterprise lifecycle-management system, to provision and configure employee devices and digital identities
  • Optional ACCESS Antivirus Scanner shields user data and host systems
  • SafeShare™ technology, unique to the industry, permits users to collaborate using on-device data without compromising its security

  • Capacities available

    1

    2

    4

    8

    16

    32

    64

    GB

     

    Frequently Asked Questions

    Why is strong authentication so important?

    Encrypting data is not enough to ensure that your information is secure. If the authentication to access the data is weak then the strength of the encryption or the size of the encryption key is irrelevant. To ensure that your data stays encrypted and does not fall into the wrong hands, strong authentication is necessary to protect the encryption key and thus the overall data. By combining password, biometric, and/or smart card authentication with hardware that automatically locks down if too many authentications fail, significant levels of security are added to protect your encrypted information. Furthermore, with authentication performed in hardware, software attacks are ineffective.

    Why is a truly portable device so important?

    True portability means the device can be used on any machine regardless of operating system, including unsecured public or shared systems. As long as USB mass storage is supported on the host machine, then the device will operate like any USB storage device. The hardware implementation of authentication and transparent encryption means that no locally installed software is needed and the device has the same mobility as a regular flash drive.

    Why is hardware-based encryption so important?

    Hardware encryption offers more security and portability than software-based encryption. With software encryption, the data is processed on the host computer where it can be exposed to malicious software. By contrast, hardware encryption occurs within the trusted environment of the device. Because hardware-based encryption happens on the device transparently, no software needs to be installed and the flash drive is as fully portable as a regular, unencrypted USB device.

    Why is AES-256 encryption so important?

    AES-256 encryption with 256-bit keys offers the strongest data protection available in a FIPS-approved symmetric encryption algorithm. The National Security Agency (NSA) considers the design of AES-256 and the strength of its key sizes sufficient for protecting its classified information. CNSS Policy No. 15 states that key sizes of 128, 192, and 256 bits are sufficient for SECRET classification, while only 192 and 256 bits are sufficient for TOP SECRET. See CNSS Policy No. 15, Fact Sheet No. 1