Hello and Welcome to IronKey.
If you have not already heard the good news, Kingston Digital has acquired the USB technology and assets of IronKey™ from Imation Corp. Kingston's goal is to ensure a smooth transition for existing IronKey customers and partners – enabling access to products, sales and world class technical support services. Kingston will also leverage its longstanding relationships with Flash memory semiconductors, controller partners and other component makers – as well as our strong channel presence – to bring IronKey products into the future.
In addition, encryption services leader DataLocker® Inc. has purchased the IronKey Enterprise Management Services (EMS) platform which provides centralized management to encrypted USB drives, and has also acquired the IronKey encrypted hard drive business. DataLocker® Inc. will continue to manage the SafeConsole® and Enterprise Management Services (EMS) platforms that both Kingston and IronKey managed encrypted drives utilize.
For product or support information, please click on the product pages and the links will direct you to either Kingston or DataLocker for additional information.
Thank You.
CloseUpdated on: August, 2015
Ironkey’s mobile security products are used by the world's most security conscious and demanding organizations. To make sure these products exceed the security and reliability expectations of customers, Ironkey places significant importance on achieving the highest level of certifications, validation, and industry compliance. Ironkey’s mobile security products were the first to achieve FIPS 140-2 Level 3 certification for an encrypted USB storage device. Ironkey continues to update and maintain certifications. This page includes updates and links for Ironkey certifications and industry compliance.
The Federal Information Processing Standards (FIPS) are U.S. government standards for information technology and computer security. The FIPS program is run by the National Institute of Standards (NIST). NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. All products using cryptography in use by civilian and military US federal agencies must comply with FIPS 140. The current FIPS version is 140-2.
Obtaining FIPS 140 validation requires a rigorous testing process by an accredited testing laboratory. The results are then reviewed by the National Institute of Standards and Technology (NIST) which issues a FIPS 140 validation certificate. IronKey Basic, Personal and Enterprise devices were the first to achieve FIPS 140-2 Level 3 certification for an encrypted USB storage device. Ironkey certifies not only the Cryptochip used to secure data and protect encryption keys but all electronic components within these devices. This provides customers the assurance that data stored on these devices will remain secure.
The following lists Ironkey FIPS certification status and links to certification and security documentation.
Device Firmware | FIPS Level | Status | FIPS Certificate # | Security Policy |
---|---|---|---|---|
2.0 | 140-2 L3 | Validated | 1149 | #1149 Security Policy |
2.0.1 | 140-2 L3 | Validated | 1149 | #1149 Security Policy |
2.0.2 | 140-2 L3 | Validated | 1149 | #1149 Security Policy |
2.0.3 | 140-2 L3 | Validated | 1149 | #1149 Security Policy |
2.0.5 | 140-2 L3 | Validated | 1149 | #1149 Security Policy |
2.0.6 | 140-2 L3 | Validated | 1149 | #1149 Security Policy |
2.0.8 | 140-2 L3 | Validated | 1149 | #1149 Security Policy |
2.0.9 | 140-2 L3 | Validated | 1149 | #1149 Security Policy |
2.0.10 | 140-2 L3 | Validated | 1442 | #1442 Security Policy |
2.0.11 | 140-2 L3 | Validated | 1442 | #1442 Security Policy |
2.0.12 | 140-2 L3 | Validated | 1442 | #1442 Security Policy |
2.0.13 | 140-2 L3 | Validated | 1442 | #1442 Security Policy |
Device Firmware | FIPS Level | Status | FIPS Certificate # | Security Policy |
---|---|---|---|---|
3.03 | 140-2 L3 | Validated | 2183 | #2183 Security Policy |
3.0.5 | 140-2 L3 | Validated | 2320 | #2320 Security Policy |
1.00 | 140-2 L3 | Validated | 2359 | #2359 Security Policy |
Device Firmware | FIPS Level | Status | FIPS Certificate # | Security Policy |
---|---|---|---|---|
2.0.10 | 140-2 L3 | Validated | 1479 | #1479 Security Policy |
2.0.11 | 140-2 L3 | Validated | 1479 | #1479 Security Policy |
2.0.12 | 140-2 L3 | Validated | 1479 | #1479 Security Policy |
2.0.13 | 140-2 L3 | Validated | 1479 | #1479 Security Policy |
2.1.0 | 140-2 L3 | Validated | 1479 | #1479 Security Policy |
2.1.1 | 140-2 L3 | Validated | 1479 | #1479 Security Policy |
2.1.2 | 140-2 L3 | Validated | 1479 | #1479 Security Policy |
Device Firmware | FIPS Level | Status | FIPS Certificate # | Security Policy |
---|---|---|---|---|
4.0.0 | 140-2 L3 | Validated | 1734 | #1734 Security Policy |
4.0.1 | 140-2 L3 | Validated | 1816 | #1816 Security Policy |
The following algorithms are used in Ironkey devices and are certified according to FIPS 140.
NLNCSA – IronKey Basic x250: RESTRICTED
The Netherlands National Communications Security Agency supports the national government of the Netherlands in the protection of classified information.
IronKey devices are registered with the USB Implementers Forum (USB-IF). Identifying information for IronKey devices can be found below. Using this information, many device control solutions can restrict the use of USB storage to only IronKey devices.
Vendor ID (VID) for S100, S200, and D200 IronKey devices: 1953
Product ID (PID) by IronKey x200 device family:
Vendor ID (VID) for S250 and D250 IronKey devices: 718
Product ID (PID) by IronKey x250 device family:
Product ID (PID) by IronKey S1000 device family:
Product ID (PID) by IronKey Workspace device family:
MIL-STD-810, also referred to as US Department of Defense Test Method Standard for Environmental Engineering Considerations and Laboratory Tests, establishes testing standards to evaluate the durability of products, especially in extreme circumstances. IronKey devices are waterproof and dustproof according to either MILD-STD-810F or MIL-STD-810G standards.
Device | FIPS Level | FIPS Certificate # |
---|---|---|
F200 | Contains the FIPS 140-2 Level 3 Validated Bluefly Security Processor* | #1269 |
F150 | Contains the FIPS 140-2 Level 3 Validated Bluefly Security Processor* | #1269 |
F100 | Contains the FIPS 140-2 Level 3 Validated Bluefly Security Processor* | #1269 |
H200 Biometric | Contains the FIPS 140-2 Level 3 Validated Bluefly Security Processor* | #1269 |
H100 | Contains the FIPS 140-2 Level 3 Validated Bluefly Security Processor* | #1269 |
(Hardware Versions: 3.0, Part #950 000 003 R [1] and 4.0, Part #950 000 004 R [2]; Firmware Versions: 2.0 [1], 2.1 [1,2], 2.2 [1,2], 2.3 [1,2], 2.4 [1,2] or 1.15 [1,2]
Security Policy link: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1269.pdf
The following is a list of certified algorithms: