User Manual
Encryption Technology
One of the most secure and cutting-edge hardware-based encryption chipsets is integrated into
the internal circuitry of the Hawker lines. The chipset contains features such as Advanced
Encryption Standard Algorithm AES-256 bit key strength, and real-time encryption so that there
is virtually zero time in encrypting and decrypting the data. While in either CBC or ECB modes,
the encryption chipset bears certifications from the National Institute of Standards and
Technology (NIST), and FIPS Level 2 for a Cryptographic Module. The Hawker is authenticated
by a digital key token, which is inserted for authentication, and removed soon after the device
is authenticated, and then ready for secure data transfer.
How Does Hawker Encrypted External Hard Drives Protect Your Data?
Q: What security technology does Hawker external hard drives adopt?
A: Several security schemes are popularly employed to protect data, including:
• Password security without hardware encryption - This basic OS/software solution blocks
unauthorized data access by requiring a password. While this may be adequate for a
coffee break, this form of security is very easy to bypass.
• Biometric security without hardware encryption - This form of security requires a
combination of a unique physical characteristic, such as a fingerprint, retinal scan, or
vocal signature. While more secure than simple password security, it can be
circumvented too, leaving unencrypted data at risk. Biometric security also requires a
substantial hardware investment and additional administrative burden.
• Hardware security—Hardware security is by far the most thorough, cost-effective, and
easily implemented form of advanced security.
ROCSTOR | ROCSECURE | HAWKER HX user manual Page | 42










