Hello and Welcome to IronKey.
If you have not already heard the good news, Kingston Digital has acquired the USB technology and assets of IronKey™ from Imation Corp. Kingston's goal is to ensure a smooth transition for existing IronKey customers and partners – enabling access to products, sales and world class technical support services. Kingston will also leverage its longstanding relationships with Flash memory semiconductors, controller partners and other component makers – as well as our strong channel presence – to bring IronKey products into the future.
In addition, encryption services leader DataLocker® Inc. has purchased the IronKey Enterprise Management Services (EMS) platform which provides centralized management to encrypted USB drives, and has also acquired the IronKey encrypted hard drive business. DataLocker® Inc. will continue to manage the SafeConsole® and Enterprise Management Services (EMS) platforms that both Kingston and IronKey managed encrypted drives utilize.
For product or support information, please click on the product pages and the links will direct you to either Kingston or DataLocker for additional information.
Protect Against BadUSB Malware
IronKey Secure USB devices are not vulnerable to BadUSB malware which was revealed at The Black Hat conference held in August of 2016. BadUSB is the first USB malware designed to attack the device itself instead of attacking the data on the device. IronKey's leadership in security, including its use of digital signatures in all controller firmware, makes its products immune to this new threat.
As revealed at the Black Hat session on BadUSB, the attack changes the firmware that controls the behavior of the USB hardware, allowing the USB device to become a host that can subsequently infect other computers and USB devices. The modified controller firmware cannot be detected by today's anti-malware solutions, and in many cases, may remain undetectable.
As explained by the researchers, the best protection against this vulnerability is to use code signing for firmware updates. If the signed firmware is modified, the device cannot authenticate the firmware and simply will not operate. This prevents the infection from spreading but results in an unusable device. That is why in addition to using signed firmware, IronKey protects the mechanism used to update the firmware with hardware-based security keys. This prevents tampering with the signed firmware, which would leave the device unusable.