IronKey Personal Secure Flash Drive Personal User Manual

Ironkey personal secure flash drive user's guide

Advertisement

Quick Links

User Guide
IronKey Personal
Secure Flash Drive
IRONKEY USER GUIDE
PAGE 

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Personal Secure Flash Drive Personal and is the answer not in the manual?

Questions and answers

Summary of Contents for IronKey Personal Secure Flash Drive Personal

  • Page 1 User Guide IronKey Personal Secure Flash Drive IRONKEY USER GUIDE PAGE ...
  • Page 2 Thank you for your interest in IronKey. IronKey is committed to creating and developing the best security technologies and making them simple-to-use, affordable, and available to every- one. Years of research and millions of dollars of development have gone into bringing this tech- nology to you in the IronKey.
  • Page 3: Table Of Contents

    IronKey Device Security IronKey Services Security How Does it Work? Product Walkthrough Initializing and Activating Your IronKey on Windows Using the IronKey Unlocker on Windows Initializing Your IronKey on a Mac Using the IronKey Unlocker on a Mac Initializing Your IronKey on Linux...
  • Page 4: What Is It

    Core Features Hardware-Encrypted Flash Drive Your IronKey can safely store , , 4 or 8 gigabytes of documents, applica- tions, files and other data. The IronKey Cryptochip inside the IronKey protects your data to the same level as highly classified government infor- mation, and it cannot be disabled or accidently turned off.
  • Page 5 Secure Data Recovery Securely back up the data on your IronKey using IronKey’s Secure Backup software. It allows you to recover your data to a new IronKey in case your IronKey is ever lost, and even synchronize data between IronKeys.
  • Page 6: Device Diagrams

    Device Diagrams The IronKey has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure maximum protection of your data. Additionally, the IronKey has been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting.
  • Page 7: Technical & Security Notes

    Device Password Protection The device password is hashed using salted SHA-56 before being trans- mitted to the IronKey Secure Flash Drive over a secure and unique USB channel. It is stored in an extremely inaccessible location in the protected hardware. The hashed password is validated in hardware (there is no “get- Password”...
  • Page 8: Ironkey Services Security

    Secure Communications & Data at Rest When users access IronKey web sites and services, all information is ex- changed over an encrypted channel. This is accomplished through Secure Socket Layer (SSL) and by utilizing VeriSign Secure Site and VeriSign Secure Site Pro certificates.
  • Page 9 Secure Sessions: Making Tor Faster and More Secure IronKey maintains a secure, private Tor network with its own, high-perfor- mance servers (separate from the public Tor network). This improves the overall security in at least two ways: Find lots more technical information at https://learn.ironkey.com.
  • Page 10: How Does It Work

    INITIALIzINg & ACTIVATINg YOUR IRONKEY ON WINDOWS When you open the package, you will find one IronKey Secure Flash Drive, one lanyard, and a Quick Start Guide. Below is a brief description of the standard way of setting up an IronKey:...
  • Page 11 9 Respond to the confirmation email by entering in the activation code on the website. At this point, your IronKey is ready to protect your data, identity, and online privacy. IRONKEY USER GUIDE Since you can have multiple IronKeys associated with one IronKey account, the nickname helps you distin- guish between different IronKey devices.
  • Page 12: Using The Ironkey Unlocker On Windows

    It prompts you for your password, securely validates it, and then mounts your secure volume where all of your files are stored on the IronKey. Here is how to unlock your IronKey on Windows 2000 (SP4), XP (SP2), and Vista: Step Plug in your IronKey and unlock it with your password.
  • Page 13: Initializing Your Ironkey On A Mac

    INITIALIzINg YOUR IRONKEY ON A MAC If you prefer to use a Mac, you can choose to initialize your IronKey on a Mac OS X computer: Step  Plug the IronKey into your computer’s USB port.  Launch the IronKey Unlocker.
  • Page 14: Using The Ironkey Unlocker On A Mac

    USINg THE IRONKEY UNLOCKER ON A MAC The IronKey Unlocker for Mac will allow you to access your files and change your device pass- word on a Mac. You can use the other IronKey applications and services on a Windows com- puter.
  • Page 15: Using The Ironkey Unlocker On Linux

    Depending on your Linux distribution, you may need root privileges to use the program ‘iron- key’ found in the Linux folder of the mounted virtual CD-ROM. If you have only one IronKey attached to the system, simply run the program from a command shell with no arguments (e.g.
  • Page 16 --show 3. Permissions You must have permissions to mount external/usb/flash devices » You must have permissions to run executables off the IronKey CD-ROM in order to launch the IronKey Unlocker » You may need root user permissions 4. Supported distributions Not all distributions of Linux are supported.
  • Page 17: Using The Ironkey Control Panel

    Most of the Control Panel’s options are located in the “Settings” menu. Description When you click on “Secure Files” in the IronKey Control Panel, Windows Explorer will open directly to your secure volume. All files on your IronKey are strongly encrypted with military-grade AES encryption.
  • Page 18 IronKey Unlocker window. In the event that you lose your IronKey, someone can return it to you if you provide your contact information. You can change your device password and option- ally back it up online to your Online Security Vault at my.ironkey.com.
  • Page 19: Using The Ironkey Virtual Keyboard

    Virtual Keyboard icon » Use the keyboard shortcut of CTRL + ALT + V The IronKey Virtual Keyboard can be used in a number of other applications when you need extra security typing out information (e.g. email, documents, etc.). IRONKEY USER GUIDE...
  • Page 20: Using The Onboard Firefox & Secure Sessions Service

    USINg THE ONBOARD FIREFOx & SECURE SESSIONS SERVICE (WIndoWs) Since your IronKey comes with a Firefox web browser already onboard, none of your cookies, history files, bookmarks, add-ons or online passwords are stored on the local computer. Now you can carry your personalized web experience with you to other computers without worry.
  • Page 21 Network Map, Bandwidth Meter, and Changing Identities IRONKEY USER GUIDE Clicking the IronKey button on the bottom right of the onboard Firefox will silently turn IronKey’s Secure Sessions Service on/off. This will create an encrypted tunnel directly from your IronKey, out to a secured IronKey web server, where it is then decrypted and sent out to the destination site.
  • Page 22: Using The Ironkey Password Manager

    IronKey’s Password Manager also allows you to back up your encrypted Password Manger data to your Online Security Vault, synchronize password data between IronKeys, or, if your IronKey is ever lost or stolen, securely restore all your passwords to a new IronKey. Only you can access and decrypt your passwords.
  • Page 23 First, set up this information by clicking on the “Set- tings” button in the IronKey Toolbar. Then, to fill a webform, simply click the “Form Filler” button. You can use the Password Generator (located within the IronKey Control Panel) to create long, random passwords.
  • Page 24: Using The Secure Backup Software

    Description You can create an encrypted backup of a single file or your entire IronKey to your local comput- er. Click on the “Secure Backup” button in the IronKey Control Panel, select a destination folder, and select which files to back up. It’s that simple.
  • Page 25: Importing A Digital Certificate Into The Ironkey

    The import process uses IronKey’s PKCS# interface and requires Mozilla Firefox. Note that there is only space for one additional private key in the IronKey Cryptochip, though that key will receive the security benefits of the Cryptochip’s tamperproof hardware and self-destruct mechanisms.
  • Page 26 4 Note that IronKey’s certificate is available here. Now you can add your own. Click the ‘Import’ button. 5 Browse to the PKCS#-for- mat certificate file and open it. 6 A window will appear ask- ing you to confirm where to store the certificate.
  • Page 27: Using My.ironkey.com

    This locks down your account so that you must have both your IronKey and your password in order to gain access. In other words, only you can access your online IronKey account, even if someone stole your IronKey or your password.
  • Page 28 6 Changing account credentials In the event that you ever lose your IronKey or forget your IronKey device password, you can still access the site in Safe Mode: a restricted mode with limited functionality. This is useful for marking your IronKey as lost, or recovering a forgotten password.
  • Page 29: Using Your Ironkey In Read-Only Mode

    You can unlock your IronKey in a read-only state such that files on your IronKey cannot be ed- ited. An example of when this is useful is when you want to access a file on your IronKey while using an untrusted or unknown computer. If you unlock your IronKey in Read-Only Mode, you need not fear that malware on that machine will infect your IronKey or modify your files.
  • Page 30: Operating Shock

    Windows 2000 (SP4), XP (SP2), Vista IronKey Unlocker for Linux (2.6+, x86) IronKey Unlocker for Mac (10.4+, PPC and Intel) * Speeds tested with 4GB device in a laboratory environment with Iometer software. Actual speeds may vary. Advertised capacity is approximate and not all of it will be available for storage. Some space is required for onboard software.
  • Page 31: What's Next

    Have a cool idea or suggestion? Please let us know. You can open a thread on the IronKey Forum (forum.ironkey.com) or submit feedback to feedback@ironkey.com. Let us know if you would like to be a beta tester of new functionality.
  • Page 32: Contact Information

    The information contained in this document represents the current view of IronKey on the issue discussed as of the date of publication. IronKey can- not guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. IronKey makes no warranties, expressed or implied, in this document.

Table of Contents