IronKey Basic S200 User Manual

IronKey Basic S200 User Manual

Usb flash drive
Hide thumbs Also See for Basic S200:

Advertisement

IRONKEY Basic
User Guide
Models
S200, S100
D200
IRONKEY BASIC USER GUIDE
PAGE 1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Basic S200 and is the answer not in the manual?

Questions and answers

Summary of Contents for IronKey Basic S200

  • Page 1 IRONKEY Basic User Guide Models S200, S100 D200 IRONKEY BASIC USER GUIDE PAGE 1...
  • Page 2 Thank you for your interest in IronKey. IronKey is committed to creating and developing the best security technologies and making them simple-to-use, affordable, and available to everyone. Years of research and millions of dollars of development have gone into bringing this technology to you in the IronKey.
  • Page 3: Table Of Contents

    Using the IronKey Unlocker on Windows ........
  • Page 4: What Is It

    What is it? Meet the IronKey IronKey Basic is designed to be the world’s most secure USB flash drive. Now you can safely carry your files and data with you wherever you go. And even if your IronKey is lost or stolen, your data remains protected and can even be restored to a new IronKey from an encrypted backup.
  • Page 5: Core Features

    Secure Local Backup and Data Recovery Securely back up the data on your IronKey using IronKey’s Secure Backup software. It allows you to recover you data to a new IronKey in case your IronKey is ever lost or stolen, or to synchronize data between multiple IronKeys.
  • Page 6: Device Diagrams

    Device Diagrams The IronKey has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure that only you can access your data. Additionally, the IronKey has been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting.
  • Page 7: Technical And Security Notes

    Technical and Security Notes We are endeavoring to be very open about the security architecture and technology that we use in designing and building the IronKey. There is no hocus-pocus or handwaving here. We use established cryptographic algorithms, we develop threat models, and we perform security analyses (internal and third party) of our systems all the way through design, development and deployment.
  • Page 8: How Does It Work

    A USB 2.0 port for high-speed data transfer INITIALIZING YOUR IRONKEY ON WINDOWS When you open the package, you will find one IronKey Secure Flash Drive, one lanyard, and a Quick Start Guide. Below is a brief description of the standard way of setting up an IronKey:...
  • Page 9: Using The Ironkey Unlocker On Windows

    It prompts you for your password, securely validates it, and then mounts your secure volume where all of your files are stored on the IronKey. Here is how to unlock your IronKey on Windows 2000 (SP4), XP (SP2+), and Vista: Step...
  • Page 10: Initializing Your Ironkey On A Mac

    INITIALIZING YOUR IRONKEY ON A MAC If you prefer to use a Mac, you can initialize your IronKey on a Mac OS X computer: # Step Description 1 Plug the IronKey into your Your IronKey will run on Mac OS X (10.4+, Intel) computer’s USB port.
  • Page 11: Using The Ironkey Unlocker On A Mac

    USING THE IRONKEY UNLOCKER ON A MAC You can use the IronKey Unlocker for Mac to access your files and change your device password on a Mac. You can use the other IronKey applications on a Windows computer. # Step...
  • Page 12: Initializing Your Ironkey On Linux

    INITIALIZING YOUR IRONKEY ON LINUX If you prefer to use a Linux computer, you can initialize your IronKey on Linux: # Step Description 1 Plug it into your computer’s USB Your IronKey can be initialized on Linux 2.6+ (x86 systems port.
  • Page 13: Using The Ironkey Unlocker On Linux

    Also, on 64-bit linux systems the 32-bit libraries must be installed in order to run the ironkey program.
  • Page 14: Activating Ironkey Enterprise

    If requested by your system administrator, users with IronKey Basic devices can activate IronKey Enterprise. Activating IronKey Enterprise helps organizations to remotely manage IronKey devices with a suite of security software and online services. See the “IronKey Enterprise User Guide” on your device for information about IronKey Enterprise features.
  • Page 15 IronKey Control Panel is shown. Step Description 1 Creating, editing, deleting secure files When you click “Secure Files” in the IronKey Control Panel, the default browser on your computer opens directly to your secure volume. All files on your IronKey are strongly encrypted with military-grade AES encryption.
  • Page 16 This feature allows you to create a message that appears on the IronKey Unlocker window. In the event that you lose your IronKey, someone can return it to you if you provide your contact information. 4 Changing your device password You can change your device password, that you use to unlock your IronKey.
  • Page 17: Using The Secure Backup Software (Windows Only)

    (destination folder). It’s that simple. 2 Restoring encrypted backups If you ever lose your IronKey, you can restore your data from an encrypted backup. Open the Secure Backup software, select the location on your local computer where the backup is located, and select which files/folders to restore.
  • Page 18: Using The Ironkey Virtual Keyboard (Windows Only)

    Virtual Keyboard icon » Use the keyboard shortcut CTRL+ALT+ V The IronKey Virtual Keyboard can be used in a number of other applications when you need extra security typing out information (e.g. email, documents). # Step...
  • Page 19: Using Your Ironkey In Read-Only Mode (Windows, Mac, Linux)

    You can unlock your IronKey in a read-only state such that files on your IronKey cannot be edited. An example of when this is useful is when you want to access a file on your IronKey while using an untrusted or unknown computer. If you unlock your IronKey in Read-Only Mode, you need not fear that malware on that machine will infect your IronKey or modify your files.
  • Page 20: Product Specifications

    Product Specifications For details about your device, see “About IronKey” in IronKey Control Panel Settings. CAPACITY* Up to 32GB, depending on the model DIMENSIONS 75mm X 19mm X 9mm WEIGHT 0.8 oz WATERPROOF MIL-STD-810F OPERATING TEMPERATURE 0C, 70C OPERATING SHOCK...
  • Page 21: What's Next

    Have a cool idea or suggestion? Please let us know. You can open a thread on the IronKey Forum (forum.ironkey.com) or submit feedback to feedback@ironkey.com. Let us know if you would like to be a beta tester of new functionality.
  • Page 22: Contact Information

    This document is for information purposes only. IronKey makes no warranties, expressed or implied, in this document. IronKey and the IronKey logo are trademarks of IronKey, Inc. in the United States and other countries.

This manual is also suitable for:

Basic s100Basic d200

Table of Contents