MXI Stealth HD
MXI Stealth HD was designed for organizations that
need high-capacity, secure storage on an encrypted USB drive. This compact,
portable hard drive can carry large amounts of data, including, when enabled
with the MXI Stealth Zone platform, a complete desktop with OS environment and
applications. The MXI Stealth Zone platform enables employees to securely
compute, isolated from outside risk, within the trusted environment of the hard
drive.
Our innovative MXI Stealth HD is the first
and only USB hard drive to offer FIPS 140-2 Level 3 validation, made possible by
the on-board powerful MXI Stealth Processor. Hard to compromise yet easy to use,
the intelligence of the device’s AES-256 hardware encryption makes it perfect
for both surveillance, digital identity management and access
control.
Features
- Powered by the MXI Stealth Processor, which is FIPS 140-2 Level 3 validated (non-FIPS version available)
- Hardware-based, AES-256 encryption secures data
- Multifactor user authentication (strong password and CAC/PIV)
- Able to carry RSA SecurID® soft tokens, providing 2-factor authentication to critical systems and information
- Failed user authentication threshold with the option of automatic data destruction

- Zero software footprint means nothing for the user to install
- ACCESS Enterprise lifecycle-management system gives administrators flexible and easy tools to provision and configure employee devices and digital identities
- ACCESS Identity, an identity management software suite, gives administrators unparalelled control and ease of use, including features such as single sign-on, remote access, full disk encryption and PKI
- Strongest anti-malware defences with optional ACCESS Antivirus Scanner, which shields user data and host systems
- Innovative, tamper-evident high-strength aluminum enclosure
- SafeShare™ technology, unique to the industry, permits users to collaborate using on-device data without compromising security
Capacities available
250 |
320 |
500 |
750 |
GB |
Frequently Asked Questions
Why is strong authentication so important?
Encrypting data is not enough to ensure that your information is secure. If the authentication to access the data is weak then the strength of the encryption or the size of the encryption key is irrelevant. To ensure that your data stays encrypted and does not fall into the wrong hands, strong authentication is necessary to protect the encryption key and thus the overall data. By combining password, biometric, and/or smart card authentication with hardware that automatically locks down if too many authentications fail, significant levels of security are added to protect your encrypted information. Furthermore, with authentication performed in hardware, software attacks are ineffective.
Why is a truly portable device so important?
True portability means the device can be used on any machine regardless of operating system, including unsecured public or shared systems. As long as USB mass storage is supported on the host machine, then the device will operate like any USB storage device. The hardware implementation of authentication and transparent encryption means that no locally installed software is needed and the device has the same mobility as a regular flash drive.
Why is hardware-based encryption so important?
Hardware encryption offers more security and portability than software-based encryption. With software encryption, the data is processed on the host computer where it can be exposed to malicious software. By contrast, hardware encryption occurs within the trusted environment of the device. Because hardware-based encryption happens on the device transparently, no software needs to be installed and the flash drive is as fully portable as a regular, unencrypted USB device.
Why is AES-256 encryption so important?
AES-256 encryption with 256-bit keys offers the strongest data protection available in a FIPS-approved symmetric encryption algorithm. The National Security Agency (NSA) considers the design of AES-256 and the strength of its key sizes sufficient for protecting its classified information. CNSS Policy No. 15 states that key sizes of 128, 192, and 256 bits are sufficient for SECRET classification, while only 192 and 256 bits are sufficient for TOP SECRET. See CNSS Policy No. 15, Fact Sheet No. 1
