M700 Bio Encrypted USB Drive
For mobile users who need the most secure biometric authentication technology ― along with high-capacity, secure storage and protection of data and digital identity ― the MXI Stealth Key M700 Bio has the strongest multi-factor authentication available in the industry. COMPARE MXI STEALTH KEY FEATURES
Multi-Factor Authentication
Biometric authentication is made possible through an ergonomic finger-swipe sensor, with hardware-based matching that is fully isolated from PC-based attacks. Coupled with this technology is strong password authentication that offers hardware-enforced complexity and usage rules. In contrast to common single-factor devices, on-board data is protected with 2-factor authentication, and 3-factor authentication protects PKI token and RSA SecurID® operations.
Hardware Encryption
Powered by the MXI Stealth Processor ― which is FIPS 140-2 Level 3 validated ― the MXI Stealth Key M700 Bio features on-board hardware AES-256 encryption that is fast and transparent to the user. It automatically protects all content, including data, applications and digital identities.
Portable Desktop
The M700 Bio can optionally accommodate MXI Stealth Zone, an innovative platform for carrying your desktop on the device in order to transform any untrusted computer into a fully secure, managed IT environment.
Superior Manageability
ACCESS Enterprise device-management system allows organizations to easily provision, configure and support any number of employee devices. It maximizes the benefits of data protection, portable applications, secure digital identities and strong user authentication. For larger organizations, the MXI Stealth Key M700 Bio can also be managed by McAfee® ePO™ or the related U.S. DoD Host-Based Security System (HBSS).
Features
- Powered by the MXI Stealth Processor, which is FIPS 140-2 Level 3 validated (non-FIPS version available)
- Integrated MXI Stealth Processor, with malware-proof protection of on-board firmware and software
- Fast and transparent AES-256 hardware-based encryption
- Multifactor user authentication (strong password, optional biometric and CIC/PIV)
- Able to carry RSA SecurID® soft tokens, providing 2-factor authentication to critical systems and information
- Sate-of-the-art lightweight, thixotropically injected magnesium enclosure that is tamper-evident, waterproof and dustproof
- Hardware-enforced retry limits and password lifetime

- Zero software footprint means nothing for the user to install
- Anti-MITM, anti-replay secure host-device communications compliant with NIST SP800-56A
- ACCESS Enterprise lifecycle-management system gives administrators flexible and easy tools to provision and configure employee devices and digital identities
- Strongest anti-malware defences with optional ACCESS Antivirus Scanner, which shields user data and host systems
- Innovative, tamper-evident enclosure that is waterproof and dustproof
- SafeShare™ technology, unique to the industry, permits users to collaborate using on-device data without compromising security
Capacities available
1 |
2 |
4 |
8 |
16 |
32 |
64 |
GB |
Frequently Asked Questions
Why is strong authentication so important?
Encrypting data is not enough to ensure that your information is secure. If the authentication to access the data is weak then the strength of the encryption or the size of the encryption key is irrelevant. To ensure that your data stays encrypted and does not fall into the wrong hands, strong authentication is necessary to protect the encryption key and thus the overall data. By combining password, biometric, and/or smart card authentication with hardware that automatically locks down if too many authentications fail, significant levels of security are added to protect your encrypted information. Furthermore, with authentication performed in hardware, software attacks are ineffective.
Why is a truly portable device so important?
True portability means the device can be used on any machine regardless of operating system, including unsecured public or shared systems. As long as USB mass storage is supported on the host machine, then the device will operate like any USB storage device. The hardware implementation of authentication and transparent encryption means that no locally installed software is needed and the device has the same mobility as a regular flash drive.
Why is hardware-based encryption so important?
Hardware encryption offers more security and portability than software-based encryption. With software encryption, the data is processed on the host computer where it can be exposed to malicious software. By contrast, hardware encryption occurs within the trusted environment of the device. Because hardware-based encryption happens on the device transparently, no software needs to be installed and the flash drive is as fully portable as a regular, unencrypted USB device.
Why is AES-256 encryption so important?
AES-256 encryption with 256-bit keys offers the strongest data protection available in a FIPS-approved symmetric encryption algorithm. The National Security Agency (NSA) considers the design of AES-256 and the strength of its key sizes sufficient for protecting its classified information. CNSS Policy No. 15 states that key sizes of 128, 192, and 256 bits are sufficient for SECRET classification, while only 192 and 256 bits are sufficient for TOP SECRET. See CNSS Policy No. 15, Fact Sheet No. 1
