IronKey Personal S200 User Manual

Ironkey personal secure flash drive
Hide thumbs Also See for Personal S200:

Advertisement

Quick Links

IRONKEY Personal
User Guide
Models
S200, S100
D200
IRONKEY USER GUIDE
PAGE 1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Personal S200 and is the answer not in the manual?

Questions and answers

Summary of Contents for IronKey Personal S200

  • Page 1 IRONKEY Personal User Guide Models S200, S100 D200 IRONKEY USER GUIDE PAGE 1...
  • Page 2 Thank you for your interest in IronKey. IronKey is committed to creating and developing the best security technologies and making them simple-to-use, affordable, and available to everyone. Years of research and millions of dollars of development have gone into bringing this technology to you in the IronKey.
  • Page 3: Table Of Contents

    ,PSRUWLQJ D 'LJLWDO &HUWLÀFDWH LQWR WKH ,URQ.H\ :LQGRZV 2QO\ ....24 Using my.ironkey.com (Windows and Mac) ....... . . 26 Using Your IronKey in Read-Only Mode (Windows, Mac, Linux) .
  • Page 4: What Is It

    Core Features Hardware-Encrypted Flash Drive Your IronKey can safely store 1, 2, 4, 8, or 16 gigabytes of documents, DSSOLFDWLRQV ÀOHV DQG RWKHU GDWD 7KH ,URQ.H\ &U\SWRFKLS LQVLGH WKH ,URQ.H\ SURWHFWV \RXU GDWD WR WKH VDPH OHYHO DV KLJKO\ FODVVLÀHG government information, and it cannot be disabled or accidently turned off.
  • Page 5 Secure Data Recovery Securely back up the data on your IronKey using IronKey’s Secure Backup software. It allows you to recover your data to a new IronKey in case your IronKey is ever lost, and even synchronize data between IronKeys.
  • Page 6: Device Diagrams

    Device Diagrams The IronKey has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure maximum protection of your data. Additionally, the IronKey has been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting.
  • Page 7: Technical And Security Notes

    Technical and Security Notes We are endeavoring to be very open about the security architecture and technology that we use in designing and building the IronKey devices and online services. There is no hocus-pocus or handwaving here. We use established cryptographic algorithms, we develop threat models, and we SHUIRUP VHFXULW\ DQDO\VHV LQWHUQDO DQG WKLUG SDUW\ RI RXU V\VWHPV DOO WKH way through design, development and deployment.
  • Page 8: Ironkey Services Security

    The IronKey Identity Manager and my.ironkey.com work together, giving you the ability to back up your online passwords to your Online Security Vault at my.ironkey.com. First, you must unlock your IronKey device, which requires two-factor authentication. Your passwords are securely stored LQ D KLGGHQ KDUGZDUHHQFU\SWHG DUHD LQVLGH WKH GHYLFH QRW LQ WKH ÀOH...
  • Page 9 Secure Sessions: Making Tor Faster and More Secure IronKey maintains a secure, private Tor network with its own, high- SHUIRUPDQFH VHUYHUV VHSDUDWH IURP WKH SXEOLF 7RU QHWZRUN 7KLV improves the overall security in at least two ways: Since IronKey controls the “exit-node” in your encrypted Tor...
  • Page 10: How Does It Work

    INITIALIZING AND ACTIVATING YOUR IRONKEY ON WINDOWS :KHQ \RX RSHQ WKH SDFNDJH \RX ZLOO ÀQG RQH ,URQ.H\ 6HFXUH )ODVK 'ULYH DQG D 4XLFN 6WDUW Guide. Below is a brief description of the standard way of setting up an IronKey: Step...
  • Page 11 At this point, your IronKey is ready to protect your data, identity, and online privacy. IRONKEY USER GUIDE PAGE 10...
  • Page 12: Using The Ironkey Unlocker On Windows

    +HUH LV KRZ WR XQORFN \RXU ,URQ.H\ RQ :LQGRZV  63  ;3 63  9LVWD DQG   Step Description Plug in your IronKey and unlock When you plug your IronKey in, the “Unlock Your it with your password. IronKey” window appears. ‡...
  • Page 13: Initializing And Activating Your Ironkey On A Mac

    INITIALIZING AND ACTIVATING YOUR IRONKEY ON A MAC If you prefer to use a Mac, you can choose to initialize your IronKey on a Mac OS X computer: Step Description 1 Plug the IronKey into your <RXU ,URQ.H\ ZLOO UXQ RQ 0DF 26 ;  ,QWHO computer’s USB port.
  • Page 14: Using The Ironkey Unlocker On A Mac

    At this point, your IronKey is ready to protect your data, identity, and online privacy. USING THE IRONKEY UNLOCKER ON A MAC 7KH ,URQ.H\ 8QORFNHU IRU 0DF ZLOO DOORZ \RX WR DFFHVV \RXU ÀOHV DQG FKDQJH \RXU GHYLFH password on a Mac.
  • Page 15: Initializing Your Ironkey On Linux

    INITIALIZING YOUR IRONKEY ON LINUX If you prefer to use a Linux computer, you can choose to initialize your IronKey on Linux: Step Description 1 Plug it into your computer’s USB <RXU ,URQ.H\ FDQ EH LQLWLDOL]HG RQ /LQX[  [ port.
  • Page 16 NOTE: ironkey only unlocks the secure volume; it must then be mounted. Many modern Linux distributions will do this automatically; if not, run the mount program from the command line, using the device name printed by ironkey. To change the password of the IronKey named “devicename,” enter: ironkey --changepwd [devicename] To lock the IronKey named “devicename,”...
  • Page 17: Using The Ironkey Control Panel (Windows And Mac)

    3. Permissions <RX PXVW KDYH SHUPLVVLRQV WR PRXQW H[WHUQDOXVEÁDVK GHYLFHV » You must have permissions to run executables off the IronKey CD-ROM in order to launch the IronKey Unlocker » You might need root user permissions 4. Supported distributions Not all distributions of Linux are supported. Please visit https://support.ironkey.com/linux for the latest list of supported distributions.
  • Page 18 8SGDWLQJ GHYLFH ÀUPZDUHVRIWZDUH The IronKey can securely update its software and ÀUPZDUH WKURXJK VLJQHG XSGDWHV WKDW DUH YHULÀHG LQ hardware. This allows users to keep their devices up- to-date and protect themselves from future malware and online threats. To check for available updates, click the “Check for 8SGDWHVµ...
  • Page 19 ZLWK WKDW ÀOHW\SH Locking and unplugging the IronKey &OLFNLQJ ´/RFN 'ULYHµ :LQGRZV &75// RU ´/RFN 4XLWµ 0DF H[LWV RSHQ ,URQ.H\ DSSOLFDWLRQV DQG locks the device. It is then safe to unplug it from your computer.
  • Page 20: Using The Ironkey Virtual Keyboard (Windows Only)

    Virtual Keyboard icon » 8VH WKH NH\ERDUG VKRUWFXW &75/$/7 9 The IronKey Virtual Keyboard can be used in a number of other applications when you need H[WUD VHFXULW\ W\SLQJ RXW LQIRUPDWLRQ HJ HPDLO GRFXPHQWV  Step...
  • Page 21 USING THE ONBOARD FIREFOX AND SECURE SESSIONS SERVICE (WINDOWS) Since your IronKey comes with a Firefox web browser already onboard, none of your cookies, KLVWRU\ ÀOHV ERRNPDUNV DGGRQV RU RQOLQH SDVVZRUGV DUH VWRUHG RQ WKH ORFDO FRPSXWHU 1RZ you can carry your personalized web experience with you to other computers without worry.
  • Page 22: Using The Ironkey Identity Manager (Windows Only)

    The IronKey Identity Manager also allows you to back up your encrypted Identity Manager data to your Online Security Vault, to synchronize password data between IronKeys, and to securely restore all your passwords to a new IronKey if your IronKey is ever lost or stolen. Only you can access and decrypt your passwords.
  • Page 23 You can lock down some important online accounts VeriSign’s VIP Service with VeriSign’s VIP service so that they can only be accessed by using your IronKey. Log into eBay or PayPal, and the Identity Manager guides you through the rest.
  • Page 24: Using The Secure Backup Software (Windows Only)

    IROGHU DQG VHOHFW ZKLFK ÀOHV WR EDFN XS ,W·V WKDW simple. 2 Restoring encrypted backups If you ever lose your IronKey, you can restore your data from an encrypted backup. Open the Secure Backup client, select the location on your local computer where the backup is located, and VHOHFW ZKLFK ÀOHVIROGHUV WR UHVWRUH ,I WKH GDWD LV...
  • Page 25: Psruwlqj D 'Ljlwdo &Huwlàfdwh Lqwr Wkh ,Urq.h\ :Lqgrzv 2Qo

    The import process uses IronKey’s PKCS#11 interface and requires Mozilla Firefox. Note that there is only space for one additional private key in the IronKey Cryptochip, though that key ZLOO UHFHLYH WKH VHFXULW\ EHQHÀWV RI WKH &U\SWRFKLS·V WDPSHUSURRI KDUGZDUH DQG VHOIGHVWUXFW mechanisms.
  • Page 26 FHUWLÀFDWH If no password was used, VLPSO\ OHDYH WKH WH[W ÀHOG blank. 8 <RXU FHUWLÀFDWH LV QRZ VWRUHG securely in the IronKey Cryptochip and is available for use in the onboard Mozilla Firefox. IRONKEY USER GUIDE PAGE 25...
  • Page 27: Using My.ironkey.com (Windows And Mac)

    This locks down your account so that you must have both your IronKey and your password in order to gain access. In other words, only you can access your online IronKey account, even if someone stole your IronKey or your password.
  • Page 28 In the event that you ever lose your IronKey or forget your IronKey device password, you can still access the site in Safe Mode: a restricted mode with limited functionality. This is useful for marking your IronKey as lost, or recovering a forgotten password.
  • Page 29: Using Your Ironkey In Read-Only Mode (Windows, Mac, Linux)

    --lock FDQ HGLW ÀOHV DJDLQ ORFN \RXU ,URQ.H\ Have a cool idea or suggestion? Please let us know. You can open a thread on the IronKey )RUXP forum.ironkey.com) or submit feedback to feedback@ironkey.com. Let us know if you would like to be a beta tester of new functionality.
  • Page 30: 3Urgxfw 6Shflàfdwlrqv

    3URGXFW 6SHFLÀFDWLRQV For details about your device, see “About IronKey” in IronKey Control Panel Settings. CAPACITY* Up to 32GB, depending on the model DIMENSIONS 75mm X 19mm X 9mm WEIGHT 0.8 oz WATERPROOF MIL-STD-810F OPERATING TEMPERATURE 0C, 70C OPERATING SHOCK...
  • Page 31: What's Next

    Have a cool idea or suggestion? Please let us know. You can open a WKUHDG RQ WKH ,URQ.H\ )RUXP forum.ironkey.com) or submit feedback to feedback@ironkey.com. Let us know if you would like to be a beta tester of new functionality.
  • Page 32: Contact Information

    This document is for information purposes only. IronKey makes no warranties, expressed or implied, in this document. IronKey and the IronKey logo are trademarks of IronKey, Inc. in the United States and other countries.

This manual is also suitable for:

Personal s100Personal d200

Table of Contents