IRONKEY Basic User Guide Models S200, S100 D200 IRONKEY BASIC USER GUIDE PAGE 1
Thank you for your interest in IronKey. IronKey is committed to creating and developing the best security technologies and making them simple-to-use, affordable, and available to everyone. Years of research and millions of dollars of development have gone into bringing this technology to you in the IronKey. For a quick product overview, you can also view our online demos at https://www.ironkey.com/demo.
CONTENTS What is it? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Meet the IronKey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Core Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Device Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What is it? Meet the IronKey IronKey Basic is designed to be the world’s most secure USB flash drive. Now you can safely carry your files and data with you wherever you go. And even if your IronKey is lost or stolen, your data remains protected and can even be restored to a new IronKey from an encrypted backup. While it uses some of today’s most advanced security technologies, it is simple to use and you only need to remember one password to unlock it.
Core Features Hardware-Encrypted Flash Drive Your IronKey can safely store gigabytes of documents, applications, files and other data. The IronKey Cryptochip inside the IronKey protects your data to the same level as highly classified government information. This encryption technology is always on and cannot be disabled. Self-Destruct Sequence If the IronKey Cryptochip detects physical tampering by a thief or a hacker, it initiates a self-destruct sequence.
Device Diagrams The IronKey has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure that only you can access your data. Additionally, the IronKey has been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting. You can rest assured that your data is secured when you carry an IronKey.
Technical and Security Notes We are endeavoring to be very open about the security architecture and technology that we use in designing and building the IronKey. There is no hocus-pocus or handwaving here. We use established cryptographic algorithms, we develop threat models, and we perform security analyses (internal and third party) of our systems all the way through design, development and deployment.
How does it work? Product Walkthrough The IronKey Basic consists of the following components: » IronKey Unlocker: Securely unlocks your IronKey » IronKey Control Panel (Windows and Mac) » IronKey Secure Backup (Windows only) » IronKey Virtual Keyboard (Windows only) Standard Usage Requires: » Windows 2000 (SP4), XP (SP2+), Vista, Mac OS X (10.4+) or Linux (2.6+) computer » A USB 2.
# Step Description 3 Create a device password and a nickname for your IronKey. Your password is case-sensitive and must be at least 4 characters long. The threat of brute-force password attacks is removed by the IronKey’s self-destruct feature. 4 The IronKey initializes. During this process, it generates the AES encryption keys, creates the file system for the secure volume, and copies secure applications and files to the secure volume.
INITIALIZING YOUR IRONKEY ON A MAC If you prefer to use a Mac, you can initialize your IronKey on a Mac OS X computer: # Step Description 1 Plug the IronKey into your computer’s USB port. Your IronKey will run on Mac OS X (10.4+, Intel) computers. It can also be set up and used on Windows and Linux. To use the full speed of the IronKey, plug it into a USB 2.0 port. 2 Double-click the IronKey drive on your desktop, and double-click the “IronKey” file. The “Initialize Your IronKey” screen appears.
USING THE IRONKEY UNLOCKER ON A MAC You can use the IronKey Unlocker for Mac to access your files and change your device password on a Mac. You can use the other IronKey applications on a Windows computer. # Step Description 1 Plug the IronKey into your computer’s USB port. 2 Double-click the IronKey drive on your desktop, and double-click the “IronKey” file. The “Unlock Your IronKey” screen appears. 3 Unlock it with your password.
INITIALIZING YOUR IRONKEY ON LINUX If you prefer to use a Linux computer, you can initialize your IronKey on Linux: # Step Description 1 Plug it into your computer’s USB port. Your IronKey can be initialized on Linux 2.6+ (x86 systems only). It can also be set up and used on Windows and a Mac. 2 Run the ironkey program from the IronKey’s linux folder. 3 Agree to the license agreement. 4 Create a device password and a nickname for your IronKey. 5 The IronKey initializes.
USING THE IRONKEY UNLOCKER ON LINUX Use the IronKey Unlocker for Linux to access your files and change your device password on Linux, allowing you to securely transfer files from and between Windows, Mac, and Linux computers. You can use the other IronKey applications on a Windows computer. Depending on your Linux distribution, you might need root privileges to use the program “ironkey” found in the Linux folder of the mounted virtual CD-ROM.
2. Mounting problems Make sure you have permissions to mount external SCSI and USB devices » Some distributions do not mount automatically and require the following command to be run: mount /dev/ /media/ » The name of the mounted device varies depending on the distribution. The names of the IronKey devices can be discovered by running: ironkey --show 3.
USING THE IRONKEY CONTROL PANEL (WINDOWS AND MAC) The IronKey Control Panel is a central location for: » Accessing your secure files » Launching Secure Backup software (Windows only) » Configuring your IronKey settings » Changing your IronKey password » Reformatting your IronKey » Safely locking your device Most of the Control Panel’s options are located in the “Settings” menu. NOTE: The Windows version of the IronKey Control Panel is shown.
# Step Description 3 Creating a Lost and Found Message This feature allows you to create a message that appears on the IronKey Unlocker window. In the event that you lose your IronKey, someone can return it to you if you provide your contact information. 4 Changing your device password You can change your device password, that you use to unlock your IronKey. Changing your password on a regular basis is a good security practice. However, be especially careful to remember your IronKey password.
USING THE SECURE BACKUP SOFTWARE (WINDOWS ONLY) If your IronKey is lost or stolen, you have peace of mind knowing that your confidential information cannot be seen by anyone but you. Getting your data back is simple with IronKey’s Secure Backup software, which securely restores your data to a new or existing IronKey. Secure Backup works by saving an encrypted backup of some or all of your IronKey files to your local computer. You can also restore one or all of your files.
USING THE IRONKEY VIRTUAL KEYBOARD (WINDOWS ONLY) If you are using your IronKey on an unfamiliar computer and are concerned about keylogging and screenlogging spyware, use the IronKey Virtual Keyboard, which helps protects your passwords by letting you click out letters and numbers. The underlying techniques in the IronKey Virtual Keyboard will bypass many trojans, keyloggers, and screenloggers.
USING YOUR IRONKEY IN READ-ONLY MODE (WINDOWS, MAC, LINUX) You can unlock your IronKey in a read-only state such that files on your IronKey cannot be edited. An example of when this is useful is when you want to access a file on your IronKey while using an untrusted or unknown computer. If you unlock your IronKey in Read-Only Mode, you need not fear that malware on that machine will infect your IronKey or modify your files.
Product Specifications For details about your device, see “About IronKey” in IronKey Control Panel Settings. CAPACITY* Up to 32GB, depending on the model DIMENSIONS 75mm X 19mm X 9mm WEIGHT 0.8 oz WATERPROOF MIL-STD-810F OPERATING TEMPERATURE 0C, 70C OPERATING SHOCK 16G rms ENCRYPTION Hardware: 256-bit AES (Models S200, D200), 128-bit AES (Model S100) Hashing: 256-bit SHA PKI: 2048-bit RSA FIPS CERTIFICATIONS See www.ironkey.com for details. HARDWARE USB 2.0 (High-Speed) port recommended, USB 1.
What’s next? In many ways, that’s up to you. We are focused on building not only the world’s most secure flash drive, but also enabling technologies that are simple and enjoyable to use. Your feedback really matters to us, and we carefully review all feature requests and customer feedback for prioritization of our next great features and products. Have a cool idea or suggestion? Please let us know. You can open a thread on the IronKey Forum (forum.ironkey.com) or submit feedback to feedback@ironkey.com.
Contact Information Product Feedback feedback@ironkey.com Feature Requests featurerequest@ironkey.com IronKey Online https://my.ironkey.com https://learn.ironkey.com https://support.ironkey.com https://forum.ironkey.com https://store.ironkey.com IronKey Support https://support.ironkey.com support@ironkey.