MXI Stealth HD

MXI Security M200

MXI Stealth HD was designed for organizations that need high-capacity, secure storage on an encrypted USB drive. This compact, portable hard drive can carry large amounts of data, including, when enabled with the MXI Stealth Zone platform, a complete desktop with OS environment and applications. The MXI Stealth Zone platform enables employees to securely compute, isolated from outside risk, within the trusted environment of the hard drive.

Our innovative MXI Stealth HD is the first and only USB hard drive to offer FIPS 140-2 Level 3 validation, made possible by the on-board powerful MXI Stealth Processor. Hard to compromise yet easy to use, the intelligence of the device’s AES-256 hardware encryption makes it perfect for both surveillance, digital identity management and access control.

 Download Product Sheet PDF

Features

  • Powered by the MXI Stealth Processor, which is FIPS 140-2 Level 3 validated (non-FIPS version available)
  • Hardware-based, AES-256 encryption secures data
  • Multifactor user authentication (strong password and CAC/PIV)
  • Able to carry RSA SecurID® soft tokens, providing 2-factor authentication to critical systems and information
  • Failed user authentication threshold with the option of automatic data destruction Sml M200
  • Zero software footprint means nothing for the user to install
  • ACCESS Enterprise lifecycle-management system gives administrators flexible and easy tools to provision and configure employee devices and digital identities
  • ACCESS Identity, an identity management software suite, gives administrators unparalelled control and ease of use, including features such as single sign-on, remote access, full disk encryption and PKI
  • Strongest anti-malware defences with optional ACCESS Antivirus Scanner, which shields user data and host systems
  • Innovative, tamper-evident high-strength aluminum enclosure
  • SafeShare™ technology, unique to the industry, permits users to collaborate using on-device data without compromising security

Capacities available

250

320

500

750

GB

 

Frequently Asked Questions

Why is strong authentication so important?

Encrypting data is not enough to ensure that your information is secure. If the authentication to access the data is weak then the strength of the encryption or the size of the encryption key is irrelevant. To ensure that your data stays encrypted and does not fall into the wrong hands, strong authentication is necessary to protect the encryption key and thus the overall data. By combining password, biometric, and/or smart card authentication with hardware that automatically locks down if too many authentications fail, significant levels of security are added to protect your encrypted information. Furthermore, with authentication performed in hardware, software attacks are ineffective.

Why is a truly portable device so important?

True portability means the device can be used on any machine regardless of operating system, including unsecured public or shared systems. As long as USB mass storage is supported on the host machine, then the device will operate like any USB storage device. The hardware implementation of authentication and transparent encryption means that no locally installed software is needed and the device has the same mobility as a regular flash drive.

Why is hardware-based encryption so important?

Hardware encryption offers more security and portability than software-based encryption. With software encryption, the data is processed on the host computer where it can be exposed to malicious software. By contrast, hardware encryption occurs within the trusted environment of the device. Because hardware-based encryption happens on the device transparently, no software needs to be installed and the flash drive is as fully portable as a regular, unencrypted USB device.

Why is AES-256 encryption so important?

AES-256 encryption with 256-bit keys offers the strongest data protection available in a FIPS-approved symmetric encryption algorithm. The National Security Agency (NSA) considers the design of AES-256 and the strength of its key sizes sufficient for protecting its classified information. CNSS Policy No. 15 states that key sizes of 128, 192, and 256 bits are sufficient for SECRET classification, while only 192 and 256 bits are sufficient for TOP SECRET. See CNSS Policy No. 15, Fact Sheet No. 1