iStorage IS-FL-DBT-256-128 datAshur BT Clé USB 3.2 (Gen1) avec cryptage matériel 128 Go Sécurisée Bluetooth Protection par mot de passe







































iStorage IS-FL-DBT-256-128 datAshur BT Clé USB 3.2 (Gen1) avec cryptage matériel 128 Go Sécurisée Bluetooth Protection par mot de passe
iStorage IS-FL-DBT-256-128
- Free Shipping
- 1 an Garantie
- Retours de 30 jours.
- Neutre en carbone
Caractéristiques clés du produit
- Vergrendel en ontgrendel vanaf de datAshur BT Personal app op uw mobiele apparaat met een wachtwoord van 7-15 tekens of gebruik eenvoudig de biometrische ontgrendeling (Face ID/Gezichtsherkenning, Touch ID/Vingerafdruk en IRIS-scanning).
- Encryptie van gegevens in rust met veilige Bluetooth-gebruikersauthenticatie via elke smartphone/tablet (iOS/Android) of Apple Watch. Het Bluetooth-kanaal is beveiligd met een door FIPS gevalideerde encryptielaag en wordt alleen voor verbindingsdoeleinden gebruikt.
- Alle gegevens die op de schijf zijn opgeslagen, worden in real-time versleuteld met militaire AES-XTS 256-bits hardware-encryptie (FIPS 140-2 Niveau 3 nalevingsontwerp en -technologie) om te voldoen aan strenge regelgeving en richtlijnen, zoals GDPR, HIPAA, SOX, CCPA en meer.
- OS- en hostonafhankelijk - werkt met elk besturingssysteem (Windows, Mac, Linux, Chrome, enz.) en op alle hosts en ingebedde systemen (computers, medische apparaten, tv’s, drones, printers, scanners, enz.).
- Klaar voor extern beheer via de iStorage Remote Management Console (optioneel). datAshur BT-schijven kunnen binnen enkele minuten worden provisioned en ingezet als beheerde schijven.

iStorage
IS-FL-DBT-256-128
Return Policy |
Time to Return |
Standard Return Policy |
We offer a hassle-free 30-day returns policy for domestic (US) orders, excluding non-refundable items. Refund or Replacement within 30 days of the delivery date. All products that fall under the Standard Return Policy qualify for our 30-Day Hassle-Free Returns. Please see the section above for more details. |
Replacement Only Return Policy |
Replacement within 30 days of the delivery date. |
Manufacturer Only Return Policy |
Covered by the manufacturer's warranty. Please refer to the terms and conditions for the manufacturer's warranty or contact the manufacturer. |
Holiday Extended Return Policies |
Extended Holiday Return Policy.Qualifying purchases of products displaying the " Extended Holiday Return Policy ", from November 1st, 2023 to December 25, 2023, are eligible for a Refund or Replacement until January 31, 2024. Extended Holiday Replacement-Only Return PolicyQualifying purchases of products displaying the " Extended Holiday Replacement-Only Return Policy ", from November 1st, 2023 to December 25, 2023, are eligible for a Replacement until January 31, 2024. |

Military-Grade Encryption in Pocket Size
Technical Specifications
- FIPS-certified AES-XTS 256-bit encryption
- USB 3.2 Gen 1 interface
- Rugged aluminum construction
Applications
- Secure document transport between offices
- Protected client data storage
- Confidential file sharing

Seamless Integration with Any System
Technical Specifications
- OS-independent operation
- Plug-and-play functionality
- Universal USB compatibility
Applications
- Cross-platform data transfer
- Mixed IT environment deployment
- Mobile workforce support

Enhanced Durability Meets Security
Technical Specifications
- Impact-resistant casing
- Water and dust protection
- Tamper-evident design
Applications
- Field operations data security
- Mobile professional use
- Harsh environment deployment

Smart Device Management Interface
Technical Specifications
- Bluetooth secure pairing
- Multi-factor authentication
- Remote management ready
Applications
- Enterprise security administration
- Team access management
- Compliance monitoring

Professional Identity Integration
Technical Specifications
- Unique device identification
- Asset tracking capability
- Enterprise management support
Applications
- IT asset management
- Compliance documentation
- Device fleet tracking

Precision Engineering for Data Protection
Technical Specifications
- High-quality USB interface
- Stable data connection
- Secure hardware design
Applications
- Critical data transfer
- Secure backup storage
- Regular business operations

Workspace Integration Excellence
Technical Specifications
- Space-efficient design
- Compatible port spacing
- Easy connectivity
Applications
- Desktop workstation use
- Mobile computing
- Multi-device setups

Intelligent Security Protocol
Technical Specifications
- Auto-lock functionality
- Secure state monitoring
- Tamper protection
Applications
- Automatic data protection
- Unattended device security
- Compliance enforcement

Complete Security Ecosystem
Technical Specifications
- Multi-device management
- Cross-platform control
- Real-time status monitoring
Applications
- Enterprise security oversight
- Multi-user environment
- Remote team management

User-Friendly Security Interface
Technical Specifications
- Simplified user interface
- Quick access controls
- Status indicators
Applications
- User authentication
- Security policy management
- Access control

Remote Management Capability
Technical Specifications
- Remote configuration
- Policy enforcement
- Administrative control
Applications
- Remote workforce security
- Global team management
- IT administration

Advanced Administrator Controls
Technical Specifications
- Administrative dashboard
- Policy management
- User access control
Applications
- Enterprise security management
- Compliance enforcement
- Access monitoring

Comprehensive Security Settings
Technical Specifications
- Customizable security options
- Flexible authentication
- Granular access control
Applications
- Custom security implementation
- Regulatory compliance
- Risk management