Encrypt mobile data remotely manage devices prevent usb malware secure flash drive (2 pages)
Summary of Contents for IronKey Personal Secure Flash Drive Personal
Page 1
User Guide IronKey Personal Secure Flash Drive IRONKEY USER GUIDE PAGE ...
Page 2
Thank you for your interest in IronKey. IronKey is committed to creating and developing the best security technologies and making them simple-to-use, affordable, and available to every- one. Years of research and millions of dollars of development have gone into bringing this tech- nology to you in the IronKey.
IronKey Device Security IronKey Services Security How Does it Work? Product Walkthrough Initializing and Activating Your IronKey on Windows Using the IronKey Unlocker on Windows Initializing Your IronKey on a Mac Using the IronKey Unlocker on a Mac Initializing Your IronKey on Linux...
Core Features Hardware-Encrypted Flash Drive Your IronKey can safely store , , 4 or 8 gigabytes of documents, applica- tions, files and other data. The IronKey Cryptochip inside the IronKey protects your data to the same level as highly classified government infor- mation, and it cannot be disabled or accidently turned off.
Page 5
Secure Data Recovery Securely back up the data on your IronKey using IronKey’s Secure Backup software. It allows you to recover your data to a new IronKey in case your IronKey is ever lost, and even synchronize data between IronKeys.
Device Diagrams The IronKey has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure maximum protection of your data. Additionally, the IronKey has been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting.
Device Password Protection The device password is hashed using salted SHA-56 before being trans- mitted to the IronKey Secure Flash Drive over a secure and unique USB channel. It is stored in an extremely inaccessible location in the protected hardware. The hashed password is validated in hardware (there is no “get- Password”...
Secure Communications & Data at Rest When users access IronKey web sites and services, all information is ex- changed over an encrypted channel. This is accomplished through Secure Socket Layer (SSL) and by utilizing VeriSign Secure Site and VeriSign Secure Site Pro certificates.
Page 9
Secure Sessions: Making Tor Faster and More Secure IronKey maintains a secure, private Tor network with its own, high-perfor- mance servers (separate from the public Tor network). This improves the overall security in at least two ways: Find lots more technical information at https://learn.ironkey.com.
INITIALIzINg & ACTIVATINg YOUR IRONKEY ON WINDOWS When you open the package, you will find one IronKey Secure Flash Drive, one lanyard, and a Quick Start Guide. Below is a brief description of the standard way of setting up an IronKey:...
Page 11
9 Respond to the confirmation email by entering in the activation code on the website. At this point, your IronKey is ready to protect your data, identity, and online privacy. IRONKEY USER GUIDE Since you can have multiple IronKeys associated with one IronKey account, the nickname helps you distin- guish between different IronKey devices.
It prompts you for your password, securely validates it, and then mounts your secure volume where all of your files are stored on the IronKey. Here is how to unlock your IronKey on Windows 2000 (SP4), XP (SP2), and Vista: Step Plug in your IronKey and unlock it with your password.
INITIALIzINg YOUR IRONKEY ON A MAC If you prefer to use a Mac, you can choose to initialize your IronKey on a Mac OS X computer: Step Plug the IronKey into your computer’s USB port. Launch the IronKey Unlocker.
USINg THE IRONKEY UNLOCKER ON A MAC The IronKey Unlocker for Mac will allow you to access your files and change your device pass- word on a Mac. You can use the other IronKey applications and services on a Windows com- puter.
Depending on your Linux distribution, you may need root privileges to use the program ‘iron- key’ found in the Linux folder of the mounted virtual CD-ROM. If you have only one IronKey attached to the system, simply run the program from a command shell with no arguments (e.g.
Page 16
--show 3. Permissions You must have permissions to mount external/usb/flash devices » You must have permissions to run executables off the IronKey CD-ROM in order to launch the IronKey Unlocker » You may need root user permissions 4. Supported distributions Not all distributions of Linux are supported.
Most of the Control Panel’s options are located in the “Settings” menu. Description When you click on “Secure Files” in the IronKey Control Panel, Windows Explorer will open directly to your secure volume. All files on your IronKey are strongly encrypted with military-grade AES encryption.
Page 18
IronKey Unlocker window. In the event that you lose your IronKey, someone can return it to you if you provide your contact information. You can change your device password and option- ally back it up online to your Online Security Vault at my.ironkey.com.
Virtual Keyboard icon » Use the keyboard shortcut of CTRL + ALT + V The IronKey Virtual Keyboard can be used in a number of other applications when you need extra security typing out information (e.g. email, documents, etc.). IRONKEY USER GUIDE...
USINg THE ONBOARD FIREFOx & SECURE SESSIONS SERVICE (WIndoWs) Since your IronKey comes with a Firefox web browser already onboard, none of your cookies, history files, bookmarks, add-ons or online passwords are stored on the local computer. Now you can carry your personalized web experience with you to other computers without worry.
Page 21
Network Map, Bandwidth Meter, and Changing Identities IRONKEY USER GUIDE Clicking the IronKey button on the bottom right of the onboard Firefox will silently turn IronKey’s Secure Sessions Service on/off. This will create an encrypted tunnel directly from your IronKey, out to a secured IronKey web server, where it is then decrypted and sent out to the destination site.
IronKey’s Password Manager also allows you to back up your encrypted Password Manger data to your Online Security Vault, synchronize password data between IronKeys, or, if your IronKey is ever lost or stolen, securely restore all your passwords to a new IronKey. Only you can access and decrypt your passwords.
Page 23
First, set up this information by clicking on the “Set- tings” button in the IronKey Toolbar. Then, to fill a webform, simply click the “Form Filler” button. You can use the Password Generator (located within the IronKey Control Panel) to create long, random passwords.
Description You can create an encrypted backup of a single file or your entire IronKey to your local comput- er. Click on the “Secure Backup” button in the IronKey Control Panel, select a destination folder, and select which files to back up. It’s that simple.
The import process uses IronKey’s PKCS# interface and requires Mozilla Firefox. Note that there is only space for one additional private key in the IronKey Cryptochip, though that key will receive the security benefits of the Cryptochip’s tamperproof hardware and self-destruct mechanisms.
Page 26
4 Note that IronKey’s certificate is available here. Now you can add your own. Click the ‘Import’ button. 5 Browse to the PKCS#-for- mat certificate file and open it. 6 A window will appear ask- ing you to confirm where to store the certificate.
This locks down your account so that you must have both your IronKey and your password in order to gain access. In other words, only you can access your online IronKey account, even if someone stole your IronKey or your password.
Page 28
6 Changing account credentials In the event that you ever lose your IronKey or forget your IronKey device password, you can still access the site in Safe Mode: a restricted mode with limited functionality. This is useful for marking your IronKey as lost, or recovering a forgotten password.
You can unlock your IronKey in a read-only state such that files on your IronKey cannot be ed- ited. An example of when this is useful is when you want to access a file on your IronKey while using an untrusted or unknown computer. If you unlock your IronKey in Read-Only Mode, you need not fear that malware on that machine will infect your IronKey or modify your files.
Windows 2000 (SP4), XP (SP2), Vista IronKey Unlocker for Linux (2.6+, x86) IronKey Unlocker for Mac (10.4+, PPC and Intel) * Speeds tested with 4GB device in a laboratory environment with Iometer software. Actual speeds may vary. Advertised capacity is approximate and not all of it will be available for storage. Some space is required for onboard software.
Have a cool idea or suggestion? Please let us know. You can open a thread on the IronKey Forum (forum.ironkey.com) or submit feedback to feedback@ironkey.com. Let us know if you would like to be a beta tester of new functionality.
The information contained in this document represents the current view of IronKey on the issue discussed as of the date of publication. IronKey can- not guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. IronKey makes no warranties, expressed or implied, in this document.
Need help?
Do you have a question about the Personal Secure Flash Drive Personal and is the answer not in the manual?
Questions and answers