Hello and Welcome to IronKey.

If you have not already heard the good news, Kingston Digital has acquired the USB technology and assets of IronKey™ from Imation Corp. Kingston's goal is to ensure a smooth transition for existing IronKey customers and partners – enabling access to products, sales and world class technical support services. Kingston will also leverage its longstanding relationships with Flash memory semiconductors, controller partners and other component makers – as well as our strong channel presence – to bring IronKey products into the future.

In addition, encryption services leader DataLocker® Inc. has purchased the IronKey Enterprise Management Services (EMS) platform which provides centralized management to encrypted USB drives, and has also acquired the IronKey encrypted hard drive business. DataLocker® Inc. will continue to manage the SafeConsole® and Enterprise Management Services (EMS) platforms that both Kingston and IronKey managed encrypted drives utilize.

For product or support information, please click on the product pages and the links will direct you to either Kingston or DataLocker for additional information.

Thank You.



Configure and enforce policies across compatible IronKey secure USB mobile storage devices

With IronKey ACCESS software, you have a wide range of options for configuring and enforcing data security policies across nearly all IronKey™ hardware encrypted flash drives and hard drives. IronKey ACCESS offers the industry’s most comprehensive solution for managing IronKey F100, F150 and IronKey H100 and H200+ Biometric external hard drives. From the largest enterprises down to individuals and small groups, IronKey ACCESS offers a premise-based option for controlling your portable storage devices:

ACCESS Standard. Perfect for small organizations, it offers the ability to individually manage drives.

ACCESS Enterprise. Centralized management, streamlined provisioning, and the most robust security controls make this an ideal choice for large enterprises.


With factory-installed software preloaded on every device, individuals and small groups can benefit from strong password and authentication rules, zero footprint portability, automatic device wipe, and optional administrative capabilities like pre-configuring or reissuing devices.


Rely on this premise-based solution to centrally configure usage, password and authentication policies once and deploy them to individual devices, use pre-configured reports to simplify audits, and pre-load devices with applications for secure use in the field. Broadly deploy USB devices, including biometric drives, and police their use. You can even revoke user privileges or wipe drives remotely when the need arises.hardware-based identity management capabilities.

ACCESS Standard Features

Factory-installed tools for configuration and re-issue

Using tools that come pre-installed on your IronKey device, take on the administrator role to individually pre-configure devices for password policy and authentication rules. You can also get more from your portable storage investment by recycling used devices and issuing them to new users.

Strong password and authentication rules

Define rules for password length, special characters, retry attempts, re-use and more. On IronKey biometric devices, set single-factor or multi-factor authentication rules.

Wipe lost or stolen devices

Optionally configure devices to automatically wipe data if unsuccessful password attempts exceed a pre-defined limit.

Flexible biometric authentication

Configure biometric hardware devices (IronKey F200 + Biometric flash drives and IronKey H200 +Biometric hard drives) for one-factor or two-factor authentication: Password only, biometric only, password or biometric, password and biometric.

Zero-footprint portability

Leave no trace behind when you run ACCESS directly from the device on any host PC or Mac, without the need for special drivers or administration rights.

Optional factory-installed malware protection

Order drives with anti-virus protection to safeguard files, applications and host systems.

Scalable management

Managing more than a handful of devices is easy, because you can seamlessly upgrade any device managed by ACCESS Standard to ACCESS Enterprise Manager or ACCESS Enterprise Server.

ACCESS Enterprise Features

(Includes all ACCESS Standard features, plus the following)

Scalable, centralized policy management platform

From a centralized console, maintain control over thousands of devices by configuring policies to govern authentication, password structure, password usage, biometric security levels, retry limits, and device recovery

Efficient configuration

Configure policies once, then deploy those policies across individual devices as they are provisioned. Conveniently and remotely update policies from within your network or over the public Internet. You can also create groups and specify policies through integration with Active Directory.

Simple, portable content management

Drag and drop corporate applications so portable devices can be pre-loaded with approved software.

Streamlined device management

Allow users to self-issue devices right at their desks while maintaining full adherence to predefined security policies. Then update policies at any time, even over the Internet.

Distributed provisioning

Allow newly issued devices to securely connect to the server to obtain policies and updates, without relinquishing control.

User self-rescue

With ACCESS Enterprise Server, ensure that devices remain accessible even if a user forgets their password or damages their fingerprint

Comprehensive data recovery.

Help desk operators can now re-establish access to the device or even permanently erase all of the device’s data when users fail to authenticate their compatible IronKey device. Employ easy-to-implement password and biometric recovery options to rescue blocked users, even if they are away from the corporate network.

Secure device communication

Allow newly issued devices to securely connect to the server to obtain policies and updates, without relinquishing control.

On-premise security

ACCESS Enterprise operates entirely from within your IT environment, so you maintain the utmost control and security.

Malware protection management

Easily deploy on-board virus protection to managed devices, protecting files, applications, and host systems.

Tailored environments

Tailor security policies and device behavior to different user needs via multiple templates and profiles.

Advanced reporting

Make it easier to meet audit and compliance requirements by logging and storing a complete history of administrative activities for each device, along with real-time views into user and device status.



Compatible with IronKey F-series Flash Drives and H-series Hard Drives.


Microsoft Windows 8.1
Microsoft Windows 7
Windows Vista
Microsoft Windows XP


Public Key Cryptography Standard #11 (PKCS-#11)


7RSA SecurID
VeriSign Identity Protection (VIP)



For worldwide support of Mobile Security Products, please email us at support@datalocker.com. We will reply to your submission within 24 business hours, Monday-Friday.


You will now be redirected from the IronKey website to datalocker.com and will be subject to its privacy policies and practices.

If you are not automatically redirected within 10 seconds, click here