User Guide. IronKey Workspace Models: W700 Updated: September 2013 IRONKEY WORKSPACE W700 USER GUIDE

Size: px
Start display at page:

Download "User Guide. IronKey Workspace Models: W700 Updated: September 2013 IRONKEY WORKSPACE W700 USER GUIDE"

Transcription

1 User Guide IronKey Workspace Models: W700 Updated: September 2013 PAGE 1

2 Thank you for your interest in IronKey Workspace W700 by Imation. Imation s Mobile Security Group is committed to creating and developing the best security technologies and making them simple-to-use and widely available. Years of research and millions of dollars of development have gone into bringing this technology to you. We are very open to user feedback and would appreciate hearing about your comments, suggestions, and experiences with this product. Feedback: securityfeedback@imation.com User Forum: PAGE 1

3 CONTENTS About my device....3 IronKey Workspace W How is it different than a regular flash drive?...3 What systems can I use it on?...4 Device Security....5 Product specifications....5 Recommended best practices...6 About IronKey Control Panel....6 Start the Control Panel....7 How do I...?...8 Set up the host computer....8 Set the host computer to boot from USB...8 Set up the device....8 Activate a managed device....9 Start the secure Workspace for the first time Access the secure Workspace...10 Boot from the device to access the secure Workspace...10 Unlock and lock the device...11 Unlock device...11 Lock device Unplug the device...12 Access my device if I forget my password...12 Change my password...13 Update my device...13 Find information about my device Manage my online account settings...14 Change device nickname...14 Manage account settings...14 Where can I get Help?...16 For more information To contact support...16 PAGE 2

4 About my device IronKey Workspace W700 IIronKey Workspace W700 is a trusted, secure USB flash drive. The Microsoft-certified Windows To Go device, IronKey Workspace W700, allows you to use virtually any computer as your own secure personal workspace, capable of using all host system resources. Your IronKey Workspace W700 device contains a fully functional version of Windows 8. If your device is managed by IronKey Enterprise Server, you will receive update notifications and policy changes for the device when the device connects to the server. The IronKey Control Panel application lets your device communicate with the IronKey Enterprise Server. This guide refers to two different device environments: Host environment Also called the non-boot environment. Describes the scenario when you are using the operating system of the host computer and the device is just a USB device and is not booted into Windows To Go. Secure Workspace Describes when you boot the Windows To Go operating system on the device. How is it different than a regular flash drive? Hardware Encryption Inside your device is the IronKey Cryptochip, which protects your data to the same level as highly classified government information. This security technology is always on and cannot be disabled. Password-Protected Unlock the device with a password using the Unlocker software that is carried on the device. Do not share your password with anyone. That way, even if your device is lost or stolen, no one else can access your data. Self-Destruct Sequence If the Cryptochip detects physical tampering by a hacker, or if a specified number of consecutive incorrect password attempts have been entered, it initiates a permanent self-destruct sequence that securely erases all onboard data using flash-trash technology so remember your password. PAGE 3

5 Simple Device Management Your device includes the IronKey Control Panel, a central management area for editing your preferences, changing your device password and safely locking your device. For more information about the IronKey Control Panel, see About IronKey Control Panel on page 6. Waterproof and Tamper-Resistant Designed to survive the extremes, IronKey Workspace W700 has a rugged metal encasing that is injected with an epoxy compound that makes it not only tamper-resistant, but waterproof to military specifications (MIL-STD-810F). What systems can I use it on? Windows 8 Windows 7 PCs that are certified for use with Windows 7 or Windows 8 can be configured to boot directly from USB, check with the hardware manufacturer if you are unsure of the ability of your PC to boot from USB. NOTE: The computer must have a USB 3.0 or 2.0 port for high-speed data transfer. A USB 1.1 port or powered hub will also work, but will be slower. Each computer must be configured to allow you to boot an operating system from a USB device. For more information, see Set up the host computer on page 8. How secure is it? IronKey Workspace W700 has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure that only you can access your data. Additionally, it is a physically secure device, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting. The IronKey Cryptochip is hardened against physical attacks such as power attacks and bus sniffing. It is physically impossible to tamper with its protected data or reset the password counter. If the Cryptochip detects a physical attack from a hacker, it destroys the encryption keys, making the stored encrypted files inaccessible. We strive to be very open about the security architecture and technology that we use in designing and building this product. We use established cryptographic algorithms, we develop threat models, and we perform security analyses (internal and third party) of our systems all the way through design, development and deployment. PAGE 4

6 DEVICE SECURITY Data Encryption Keys AES key generated by onboard Random Number Generator AES key generated at initialization time and encrypted with hash of user password No backdoors: AES key cannot be decrypted without the user password AES key never leaves the hardware and is not stored in NAND flash Data Protection Windows To Go partition is not accessible until password is verified in hardware Password try-counter implemented in tamper-resistant hardware Once password try-count is exceeded, all data is erased by hardware Secure box architecture accessible only to firmware to store sensitive data and settings Device Password Protection USB command channel encryption to protect device communications Password-in-memory protection to protect against cold-boot and other attacks The device password is hashed using salted SHA-256 before being transmitted to the device firmware over a secure and unique USB channel. It is stored in an extremely inaccessible location in the protected Cryptochip hardware. The hashed password is validated in hardware (there is no getpassword function that can retrieve the hashed password), and only after the password is validated is the AES encryption key decrypted. The password try-counter is also implemented in hardware to prevent memory rewind attacks. Typing your password incorrectly too many times initiates a permanent flash-trash self-destruct sequence, which is run in hardware rather than using software, ensuring the ultimate protection for your data. Product specifications For details about your device, see Device Info in the IronKey Control Panel settings. Specification Capacity* Dimensions Weight Operating Temperature Operating Shock Hardware Encryption Details Up to 32GB, 64GB, 128GB 82mm X 21.1mm X 9.1mm 1.12 oz (32 grams) 0C, 70C 16G rms Data: 256-bit AES (CBC mode) Hardware: 256-bit AES Hashing: 256-bit SHA PAGE 5

7 Specification Details Hardware USB 3.0 (Super speed) port recommended, USB 2.0 (High-Speed), USB 1.1 Water-resistant MIL-STD-810F Dust-resistant Shock-resistant Ruggedized OS Compatibility Windows 8, Windows 7 (any PC certified for use with Windows 7 or Windows 8) Accessibility IronKey Control Panel is designed to be Section 508 compliant. Users with disabilities have keyboard navigation and screen reader support. Designed and Assembled in the U.S.A. * Advertised capacity is approximate. Some space is required for Windows To Go software. Recommended best practices Never unplug the device when the LED is on Never share your device password»» Perform a computer anti-virus scan before setting up the device In the host environment: Lock the device: when not in use before unplugging it before the system enters sleep mode In the secure Workspace (Windows To Go): Do NOT unplug the device while you are booted into WTG as it can result in loss of data. or possibly cause irreparable damage to the operating system. If your WTG operating system is in Hibernate mode, do not unplug the device and move it to another computer. Hibernate mode does not support roaming between computers and could corrupt your device. About IronKey Control Panel IronKey Control Panel connects a managed device to the IronKey Enterprise Server. It also allows you to modify device settings, for example, you can change your password. There are two IronKey Control Panel applications on your device. Some IronKey Control Panel operations are only available in one of the device environments. PAGE 6

8 1. IronKey Control Panel on the USB drive (in the host environment) This application is accessible only from the USB drive. Connects to the server to receive and allow you to download device updates and policy changes. Allows you to unlock and lock your USB device in the host environment. Opens automatically after you Activate the device. 2. IronKey Control Panel on your Windows To Go operating system (in the secure Workspace environment) This application opens automatically and is accessible in the taskbar only when the device is booted in Windows To Go. Connects to the server to receive device update notifications and policy changes. You can download device software updates only in the Control Panel in the host environment. Does not have a lock device option. You can use the Control Panel in either environment to do the following: Change device password View device information Modify Unlock Message that displays when you unlock the device View notifications about device software updates Access the Admin Console (if you are an Admin user) START THE CONTROL PANEL In the host environment 1. Double-click the IronKey.exe file from the IronKey Workspace drive on the device. 2. Type your device password and click Unlock. The IronKey Control Panel will open automatically. In the secure Workspace The Control Panel starts automatically when you boot into your Windows To Go secure Workspace. You can access it from the Windows taskbar. Click the IronKey icon in the taskbar and choose IronKey Control Panel. PAGE 7

9 How do I...? Set up the host computer Before you plug in your device, you must make sure that the host computer is able to boot from a USB device. You should check the boot setting for each computer on which you want to use your device. The host computer must use either a Windows 7 or Windows 8 operating system (or be certified for use with Windows 7 or Windows 8). Once the computer is configured to boot from a USB device, you can plug in your IronKey Workspace W700 device. If this is the first time booting the device into the secure Workspace, you may have to set up some Windows installation settings. NOTE: If your administrator has already configured the boot setting for the host computer, you can skip this step and set up the device. SET THE HOST COMPUTER TO BOOT FROM USB 1. Shut down the host computer if it is not already turned off. 2. Turn on the computer and enter the BIOS/UEFI. This is a very fast step. You have only a few seconds to press the correct key to access the BIOS/UEFI. An on-screen message will indicate the key sequence, for example, Press the Esc key, or Press F1 to enter setup. 3. Configure the system to boot from USB by turning on USB BOOT and moving the setting USB MassStorage to the first position in the boot order. 4. Save the new BIOS/UEFI settings and shut down the computer. 5. You can now plug in your device and follow the steps in the section Set up the device on page 8. Set up the device Before you can access your Windows To Go Workspace, you must activate the device. During the activation process, the device policy from IronKey Enterprise Server is applied to the device. Device activation is done in the host environment before you boot into the secure Workspace. You will need the activation code that was sent to you in an message from an administrator. During the activation procedure, you will have to set a device password. After you activate the device, you can start up the secure Workspace on the device. PAGE 8

10 The first time you start the Windows To Go operating system on the device, you might be required to complete some Windows installation settings. Some administrators may configure these settings before they give you the device. NOTE: If your device is not managed by IronKey Enterprise Server, you do not need to activate it. Follow the steps to start the secure Workspace. You will be asked for a device password. This is the password your administrator gave to you. You should change the password from the default one, see Change my password on page 13. ACTIVATE A MANAGED DEVICE 1. In the host environment, plug the IronKey device into the host computer s USB port. 2. Double-click the IronKey.exe file from the IronKey Workspace drive. 3. Type the Activation Code. You should have received the code in an message sent from your Administrator. 4. Type a device password and confirm it, and then click the Continue button. Your password is case-sensitive and must comply with the password policy set by the administrator. 5. If you are prompted to provide an address for an online account, enter it now and click the Continue button. (Online accounts are required for admin users). A message prompt will appear indicating that an has been sent to you. Follow the instructions in the to set up your online account; this includes creating a secret question. Once you have set up your online account, click OK in the message prompt to proceed with the device setup. 6. The device initializes. During this process, it applies the policy for the device as configured in IronKey Enterprise Server. 7. When the initialization is complete, the IronKey Control Panel appears. PAGE 9

11 If you want to add or modify the message that displays on the Unlocker screen, see Create a message that displays in the Unlocker on page Safely eject the device and unplug it, then power off the host computer. The device is now ready to boot into the secure Workspace. START THE SECURE WORKSPACE FOR THE FIRST TIME 1. Ensure that the host computer is powered off, and then insert the W700 device into the USB port. 2. Turn on the computer and wait for the IronKey Workspace Preboot Environment to start. 3. Type the device password (if the device is not managed by IronKey Enterprise Server, your administrator will give this to you, otherwise, type the password that you set when you activated the device) and click Unlock. 4. The computer will reboot into the secure Windows To Go workspace. 5. Follow the on-screen instructions to configure settings for the Windows installation on the device. This is only required the first time you boot into the secure Workspace. NOTE: When you start the secure portable Workspace on different computers, Windows To Go will adapt to the hardware of the local system to use its unique set of hardware components. This hardware adaptation process will not be performed with each subsequent startup on the same computer. The device stores information for each system from which it has been booted. It applies the hardware profile for that system as the computer boots. Access the secure Workspace After you set up the device you are ready to use it as your secure portable Workspace. Each time you boot from the device, you must provide the device password to unlock the operating system so Windows To Go can start. The steps are almost identical to starting the secure Workspace for the first time except that you do not have to customize the Windows Installation. BOOT FROM THE DEVICE TO ACCESS THE SECURE WORKSPACE 1. Ensure that the host computer is powered off, and then insert the W700 device into the USB port. 2. Turn on the computer and wait for the IronKey Workspace Preboot Environment to start. 3. Type the device password and click the Unlock button. 4. The computer will reboot into the secure Windows To Go workspace. PAGE 10

12 Unlock and lock the device When you unlock the device in the host environment, the IronKey Control Panel starts from the USB device. You should always lock the device before you unplug it from the host environment. When you boot the device in Windows To Go, you unlock the device during the Preboot Environment. You cannot lock the device from the Control Panel in Windows To Go. UNLOCK DEVICE 1. In the host environment, plug in your device to the host computer and start the Unlocker window by opening the IronKey Workspace device drive and double-clicking the IronKey.exe file. 2. Type your device password and click Unlock. The IronKey Control Panel will appear. Entering the wrong password a consecutive number of times depends on the password settings defined by the administrator will permanently destroy the device and all your onboard data. As a security precaution, you must unplug and reinsert the device after every three failed password attempts. TIP: If you want to boot into the secure Workspace, see Access the secure Workspace on page 10. Create a message that displays in the Unlocker This feature, if enabled by the System Admin, allows you to create a message that appears on the IronKey Unlocker window. For example, you can provide contact information so that if you lose your device someone will know how to return it to you. 1. In the host environment, unlock your device and click the Settings button in the menu bar of the Control Panel. 2. Click the Preferences button in the left sidebar. 3. Enter text in the Unlock Message field. Your message text must fit the space provided (approximately 7 lines and 200 characters). LOCK DEVICE In the host environment, click the Lock button in the bottom left of the Control Panel to safely lock your device. You can also use the keyboard shortcut: CTRL + L. If you want the device to automatically lock when not in use, see Set device to automatically lock on page 12. CAUTION: Once the device is locked, you can perform a safe removal operation to safely unplug it. However, do not unplug the device when it is unlocked. PAGE 11

13 NOTE: You cannot lock a device from the Control Panel in the secure Workspace. You must shut down the Windows operating system to safely remove the device. For more information, see Unplug the device on page 12. Set device to automatically lock If enabled by your System Admin, you can set a device time-out to automatically lock your device after a specified period of inactivity. This will help prevent others from accessing your secure files. This is only available in the host environment and not while you are booted into the secure Workspace. 1. In the host environment, access the IronKey Control Panel on your device from the USB drive of the host computer. 2. Click the Settings button in the menu bar. 3. Click the Preferences button in the left sidebar. 4. Click the checkbox for auto-locking the device and set the time-out for either 5, 15, 30, 60, 120, or 180 minutes. Unplug the device In host environment Lock the device and perform a safe removal operation of the USB drive then unplug the device. In the secure Workspace After you are finished using your secure Workspace, you must properly shut down the operating system on the device before you unplug it. Follow the procedure in the Windows documentation to shut down the Windows To Go operating system. IMPORTANT: DO NOT unplug the device without first shutting down Windows To Go; this can result in loss of data and potentially cause irreparable damage to the operating system. Access my device if I forget my password If you forget your password, you must contact your administrator. Your administrator can reset your password and you can then follow the steps in the Change my password procedure to set it again. PAGE 12

14 Change my password Password policy settings are determined by an administrator. Sometimes you may be required to change your password to comply with new corporate password policies. When a change is required, the Password Change screen will appear the next time your device connects to IronKey Enterprise Server (either when you unlock the device in the host environment or after you boot into the secure Workspace environment). It is also good security practice to regularly change your password. However, be especially careful to remember your device password. You can change your password in the host environment using the IronKey Control Panel on the device or in the Control Panel in the secure Workspace environment. 1. From the Control Panel, click the Settings button in the menu bar. 2. Click the Password button in the left sidebar. 3. Enter your current password in the field provided. 4. Enter your new password and confirm it in the fields provided. 5. Click the Change Password button. Update my device In the host environment, you can securely update software and firmware on your device through signed updates that are verified in hardware. Keeping your device up-to-date helps protect you from future malware and online threats. If you are in the secure Workspace, you will be notified that your device has updates available, however, you can only update the device from the host environment. 1. In the host environment, unlock your device and click the Settings button on the menu bar of the IronKey Control Panel. 2. Click the Tools sidebar and in the Updates section, click the Check for Updates button. 3. If an update is available, click Download to install it. TIP: In the host environment, you can check for updates automatically by clicking the Automatically check for updates checkbox. The device will check for updates every 7 days. If your administrator has already set this option, the check box will appear enabled and dimmed. Find information about my device 1. In the Control Panel, click the Settings button in the menu bar. 2. Click the Device Info button in the left sidebar. PAGE 13

15 On this screen you can view details about your device, including: Model number Serial number Software and firmware versions TIP: You can also click the Copy button to copy the device information to the clipboard for pasting in an , forum posting or support request. Manage my online account settings NOTE: You may not have an online account if your System Administrator has not enabled this feature. An online account is required for Admin users. Online accounts are typically created during device setup. Your device supports advanced cryptographic authentication using strong PKI key pairs generated in the Cryptochip. When you log into your online account from your device, it uses these unique keys as your digital identity credentials. This locks down your account so that you must have both your device and your password in order to gain access. To log on to your online account 1. In the host environment, Unlock your device and click the Settings button on the menu bar of the Control Panel. 2. Click the Account button in the left sidebar. 3. Click the Manage Account Settings button. The Admin Console displays. CHANGE DEVICE NICKNAME If you own more than one IronKey Workspace W700 device, you can create nicknames for each device. Names help you tell the devices apart from each other. 1. Log on to your online account. 2. On the My IronKeys tab, click the Edit button beside the device whose nickname you want to change. 3. Type a new nickname in the box and click the Save button. MANAGE ACCOUNT SETTINGS The following table describes some tasks you can perform when you log on to your online account. Access your online account and then follow the steps in the table below. Task Review account activity Description Click Account Dashboard to monitor recent events such as logins, failed password attempts and so on. PAGE 14

16 Set up alerts Edit Secret Questions and Answers Click Account Alerts to have alert notices sent to you when specific activities occur, such as an incorrect secret question attempt. You can also sign up to be notified of new Ironkey product announcements. Click the Edit button to modify your Secret Question responses that you provided during the setup of your online account. You can also edit time zone data. NOTE: You cannot update addresses in your online profile unless you are a System Administrator. PAGE 15

17 Where can I get Help? For more information forum.ironkey.com support.ironkey.com securityfeedback@imation.com Online forum with thousands of users and security experts Support information, knowledgebase and video tutorials Product feedback and feature requests General information To contact support For support, please contact your Help desk or System Administrator. securityts@imation.com 910 E. Hamilton Ave. Suite 410 Campbell, CA UNITED STATES Monday - Friday, 6am - 5pm PST NOTE: Imation is not liable for technical or editorial errors and/or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing or use of this material. The information provided herein is subject to change without notice. The information contained in this document represents the current view of Imation on the issue discussed as of the date of publication. Imation cannot guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. Imation makes no warranties, expressed or implied, in this document. Imation, the Imation logo, IronKey and the IronKey logo are trademarks of Imation Corp. and its subsidiaries. All other trademarks are the property of their respective owners Imation Corp. All rights reserved. PAGE 16

IRONKEY WORKSPACE PROVISIONING TOOL 1.3. User Guide

IRONKEY WORKSPACE PROVISIONING TOOL 1.3. User Guide IRONKEY WORKSPACE PROVISIONING TOOL 1.3 User Guide Copyright 2014 Imation Corp. Imation and Imation logo, IronKey and IronKey logo are trademarks of Imation Corp. All other trademarks are the property

More information

Sentry ONE User Guide

Sentry ONE User Guide version 6.1 DataLocker Inc. April, 2018 Sentry ONE Standard and Managed 1 Contents About This Guide 2 Quick Start 3 About My Device 3 How Is This Different Than A Regular USB Drive?...........................

More information

DATALOCKER H100 ENCRYPTED HARD DRIVE. User Guide

DATALOCKER H100 ENCRYPTED HARD DRIVE. User Guide DATALOCKER H100 ENCRYPTED HARD DRIVE User Guide CONTENTS Introducing DataLocker H100 Minimum System Requirements Device accessories DataLocker Documentation Getting Started Plugging in the device Personalizing

More information

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE IRONKEY D300S SECURE USB 3.0 FLASH DRIVE User Guide Document No. 48000130-001.A01 D300S Page 1 of 27 Table of Contents About This Manual... 3 System Requirements...3 Recommendations...3 Setup (Windows

More information

IronKey EMS Cloud. Quick Start Guide

IronKey EMS Cloud. Quick Start Guide IronKey EMS Cloud Quick Start Guide Last Updated July 2017 DataLocker is committed to creating and developing the best security technologies and making them simple-to-use and widely available. Years of

More information

IRONKEY H80 USER GUIDE

IRONKEY H80 USER GUIDE IRONKEY H80 USER GUIDE Contents Introducing IronKey H80 2 Minimum System Requirements 2 Device accessories 2 Imation Documentation 3 Getting Started 4 Plugging in the device 4 Personalizing a device 4

More information

Kanguru Defender V2 Rev.2 User Manual

Kanguru Defender V2 Rev.2 User Manual Kanguru Defender V2 Rev.2 User Manual Copyright 2012, All Rights Reserved. Model no: KDV2 Notices and Information NOTICES AND INFORMATION Please be aware of the following points before using your Kanguru

More information

Kanguru Defender Secure USB Flash Drive

Kanguru Defender Secure USB Flash Drive Kanguru Defender Secure USB Flash Drive User Manual For Defender Models: Defender 2000 Defender 3000 Defender Elite30 Defender Elite200 Defender Elite300 Copyright 2017, All Rights Reserved Notices and

More information

RocIT Defender User s Guide ViSoS TM Virtual System on a Stick

RocIT Defender User s Guide ViSoS TM Virtual System on a Stick RocIT Defender User s Guide ViSoS TM Virtual System on a Stick Table of Contents 1. Introduction 3 1.1. Minimum System Requirements 3 1.2. Drive Specifications 4 2. Startup Procedure 4 2.1. Configure computer

More information

Aegis Padlock DT. User s Manual

Aegis Padlock DT. User s Manual Aegis Padlock DT User s Manual Table of Contents About the Aegis Padlock Desktop Drive 4 Package contents 4 Aegis Padlock DT button panel 5 Aegis Padlock DT - Getting Started 6 Before you begin 6 Connecting

More information

This release of the hardware encrypted IronKey Workspace W500 Microsoft Certified Windows to Go drive, adds the following functionality:

This release of the hardware encrypted IronKey Workspace W500 Microsoft Certified Windows to Go drive, adds the following functionality: IronKey Workspace W500: Release Notes for 4.1.0.0 Availability Date: September 16, 2013 Supported Device: W500 Software Version: 4.1.0.0 Device Capacity: 32GB, 64GB, 128GB. Release Description This release

More information

DEFENDER F100 & DEFENDER F150 USER GUIDE

DEFENDER F100 & DEFENDER F150 USER GUIDE DEFENDER F100 & DEFENDER F150 USER GUIDE Contents Introducing Defender F100 & Defender F150 2 Minimum System Requirements 2 Imation Documentation 2 Getting Started 3 Opening and closing a device 3 Attaching

More information

Quick Start Guide. IronKey Enterprise Server 5.2

Quick Start Guide. IronKey Enterprise Server 5.2 Quick Start Guide IronKey Enterprise Server 5.2 Last Updated October 2014 System Requirements Pentium Core2Duo or higher class system (quad-core recommended) 2GHz or faster CPU minimum» Memory: 2048MB

More information

Kanguru Defender Elite200 User Manual. Copyright 2014, All Rights Reserved. Model no: KDFE200

Kanguru Defender Elite200 User Manual. Copyright 2014, All Rights Reserved. Model no: KDFE200 Kanguru Defender Elite200 User Manual Copyright 2014, All Rights Reserved Model no: KDFE200 Notices and Information NOTICES AND INFORMATION Please be aware of the following points before using your Kanguru

More information

Kanguru Defender HDD & Defender HDD300 User Manual. Copyright 2017, All Rights Reserved. Model no: KDH3B, KDH3B-300F

Kanguru Defender HDD & Defender HDD300 User Manual. Copyright 2017, All Rights Reserved. Model no: KDH3B, KDH3B-300F Kanguru Defender HDD & Defender HDD300 User Manual Copyright 2017, All Rights Reserved Model no: KDH3B, KDH3B-300F Notices and Information Notices and Information Please be aware of the following points

More information

User Guide. SimpleSafe. Flash Drive Security Software. For SimpleTech flash drives: Bonzai Xpress (STI-UFDBXA/XXX) SimpleTech USB 2.

User Guide. SimpleSafe. Flash Drive Security Software. For SimpleTech flash drives: Bonzai Xpress (STI-UFDBXA/XXX) SimpleTech USB 2. User Guide SimpleSafe Flash Drive Security Software For SimpleTech flash drives: Bonzai Xpress (STI-UFDBXA/XXX) Napster (NAP-USB2FD/XXX) SimpleTech USB 2.0 (STI-USB2FD/XXX) Disclaimers SimpleTech, Inc.

More information

BitLocker to Go: Encryption for personal USB

BitLocker to Go: Encryption for personal USB BitLocker to Go: Encryption for personal USB [Windows 10] Encryption is an effective method of protecting data stored on portable USB devices such as flash drives and external hard drives. Encryption encodes

More information

Storage Security Software (Version )

Storage Security Software (Version ) For Toshiba CANVIO series Storage Security Software (Version 1.00.6904) User s Manual Version 1.00 This document explains the installation process and basic usage of the Storage Security Software designed

More information

Sophos Central Device Encryption. Administrator Guide

Sophos Central Device Encryption. Administrator Guide Sophos Central Device Encryption Administrator Guide Contents About... 1 Manage BitLocker Drive Encryption... 2 Migrate to...2 Prepare Device Encryption...3 Device Encryption step by step... 3 Device Encryption

More information

Aegis Padlock SSD. User Guide. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive.

Aegis Padlock SSD. User Guide. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive. Aegis Padlock SSD User Guide Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive. If you are having difficulty please refer to the complete user s manual

More information

Creating Trust in a Highly Mobile World

Creating Trust in a Highly Mobile World Creating Trust in a Highly Mobile World Technical White Paper Oct, 2014 MobileCrypt with Hardware Strength Security MobileCrypt s solution leverages an Android based mobile application and a Hardware Security

More information

IronKey EMS On-Prem 7.1 Quick Start Guide

IronKey EMS On-Prem 7.1 Quick Start Guide IronKey EMS On-Prem 7.1 Quick Start Guide Last Updated June 2017 System Requirements Requirement Description Database Microsoft SQL Server 2005, Microsoft SQL Server 2008, or Microsoft SQL Server 2012,

More information

IronKey EMS Quick Start Guide. version 7.2 DataLocker Inc. June, 2018

IronKey EMS Quick Start Guide. version 7.2 DataLocker Inc. June, 2018 IronKey EMS Quick Start Guide version 7.2 DataLocker Inc. June, 2018 1 System Requirements Requirement Description Database Microsoft SQL Server 2005, Microsoft SQL Server 2008, Microsoft SQL Server 2012,

More information

User Manual SSD SSD SSD. istorage diskashur SSD Manual v

User Manual SSD SSD SSD. istorage diskashur SSD Manual v User Manual SSD SSD SSD 3.0 #1 Copyright istorage, Inc 2012. All rights reserved. Windows is a registered trademark of Microsoft Corporation. All other trademarks and copyrights referred to are the property

More information

THUNDERBAY 4 MINI. Assembly Manual & User Guide

THUNDERBAY 4 MINI. Assembly Manual & User Guide THUNDERBAY 4 MINI Assembly Manual & User Guide CONTENTS INTRODUCTION 1.1 Minimum System Requirements...1 1.1.1 Apple Mac Requirements 1.1.2 PC Requirements 1.1.3 Supported Drives 1.2 Package Contents...1

More information

ModeChanger

ModeChanger 35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive

More information

Copyright istorage, Inc All rights reserved.

Copyright istorage, Inc All rights reserved. User s Manual Copyright istorage, Inc 2009. All rights reserved. Windows is a registered trademark of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective

More information

Kanguru Defender Secure USB Flash Drive

Kanguru Defender Secure USB Flash Drive Kanguru Defender Secure USB Flash Drive Quick Start Guide for KRMC Enterprise Managed Devices For Defender Models: Defender 2000 Defender 3000 Defender Elite30 Defender Elite200 Defender Elite300 Copyright

More information

SOFTRAID. Quick Start Guide

SOFTRAID. Quick Start Guide SOFTRAID Quick Start Guide TABLE OF CONTENTS INTRODUCTION... 1 1.1 Minimum System Requirements 1.2 Features 1.3 About This Manual SYSTEM SETUP... 2 2.1 Getting Started 2.2 Initializing, Verifying, and

More information

User Manual FIPS SSD. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive.

User Manual FIPS SSD. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive. User Manual FIPS Level 2 Certified 140-2 Certificate number 1970 SSD Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive. If you are having difficulty please

More information

Check Point GO R75. User Guide. 14 November Classification: [Public]

Check Point GO R75. User Guide. 14 November Classification: [Public] Check Point GO R75 User Guide 14 November 2011 Classification: [Public] 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

SafeStick/SafeXs. User Guide. Created by BSO ITS Security Team Version 1.4

SafeStick/SafeXs. User Guide. Created by BSO ITS Security Team Version 1.4 SafeStick/SafeXs User Guide Created by BSO ITS Security Team Version 1.4 Version Control V0.1 Initial draft 23/09/2009 V1.0 Version 1 Approved 28/09/2009 V1.1 Updated for HSCNI Safeconsole 03/11/2011 V1.2

More information

Dell Data Security Console. User Guide v2.0

Dell Data Security Console. User Guide v2.0 Dell Data Security Console User Guide v2.0 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either

More information

Stealth HD Bio Quick Start Guide

Stealth HD Bio Quick Start Guide Stealth HD Bio Quick Start Guide Copyright 2011 MXI Security. All rights reserved. This document may not be reproduced or transmitted in any form (whether now known or hereinafter discovered or developed),

More information

IMPORTANT! Files saved to this USB are NOT automatically encrypted. You must use the SecureLock II software interface to secure your files.

IMPORTANT! Files saved to this USB are NOT automatically encrypted. You must use the SecureLock II software interface to secure your files. IMPORTANT! Files saved to this USB are NOT automatically encrypted. You must use the SecureLock II software interface to secure your files. SecureLock II User Manual Encryption Application for USB Flash

More information

KEYPAD MODEL USER MANUAL

KEYPAD MODEL USER MANUAL KEYPAD MODEL USER MANUAL Contents SecureDrive Overview 3 Safety Information 3 SecureDrive Features 4 PINs and Procedures 5 User Mode 5 User PINs 5 Unlocking the Drive in User Mode 6 Changing the User PIN

More information

DRIVE DOCK. User Guide

DRIVE DOCK. User Guide DRIVE DOCK User Guide CONTENTS INTRODUCTION 1.1 Minimum System Requirements...1 1.1.1 Apple Mac Requirements 1.1.2 PC Requirements 1.1.3 Supported Drives 1.2 Package Contents...1 1.3 About This Manual...1

More information

DataTraveler 4000 User Manual

DataTraveler 4000 User Manual DataTraveler 4000 User Manual DataTraveler 4000 Find the language and latest documentation for DataTraveler 4000 here.... For instructions in English.................. Para instrucciones en Español...

More information

User Manual 3.0. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the datashur Pro.

User Manual 3.0. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the datashur Pro. User Manual istorage datashur Pro Manual v 2.0 3.0 Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the datashur Pro. If you are having difficulty please refer

More information

User Guide CipherUSB

User Guide CipherUSB T E C H N O L O G I E S User Guide CipherUSB (CA256USB) www.addonics.com v3.1.11 Technical Support If you need any assistance to get your unit functioning properly, please have your product information

More information

Aegis Fortress L3. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive.

Aegis Fortress L3. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive. Aegis Fortress L3 Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive. User Guide Table of Contents About the Aegis Fortress L3 4 Aegis Fortress - Connections

More information

Peerless Drive System User's Manual

Peerless Drive System User's Manual Peerless Drive System User's Manual Copyright 2001 Iomega Corporation Iomega, the stylized "i" logo, Peerless, and the Peerless brand block are either registered trademarks or trademarks of Iomega Corporation

More information

Deposit Wizard Panini Installation Guide

Deposit Wizard Panini Installation Guide Guide Table of Contents System Requirements... 2 WebScan Overview... 2 Hardware Requirements... 2 Supported Browsers... 2 Driver Installation... 2 Step 1 - Determining Windows Edition & Bit Count... 3

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE

ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE Notice Copyright 2004 Altiris Inc. All rights reserved. Product Version: 6.1 Document Date: October 14, 2004 Bootworks U.S. Patent No. 5,764,593.

More information

OWC Mercury On-The-Go Pro USER GUIDE

OWC Mercury On-The-Go Pro USER GUIDE OWC Mercury On-The-Go Pro USER GUIDE TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 MINIMUM SYSTEM REQUIREMENTS 1.1.1 Apple Mac Requirements 1.1.2 PC Requirements 1.2 PACKAGE CONTENTS 1.3 ABOUT THIS MANUAL

More information

DRIVE DOCK. User Guide

DRIVE DOCK. User Guide DRIVE DOCK User Guide CONTENTS Introduction 1.1 Minimum System Requirements...1 1.1.1 Apple Mac Requirements 1.1.2 PC Requirements 1.1.3 Supported Drives 1.2 Package Contents...1 1.3 About This Manual...1

More information

Expert Reference Series of White Papers. BitLocker: Is It Really Secure? COURSES.

Expert Reference Series of White Papers. BitLocker: Is It Really Secure? COURSES. Expert Reference Series of White Papers BitLocker: Is It Really Secure? 1-800-COURSES www.globalknowledge.com BitLocker: Is It Really Secure? Mark Mizrahi, Global Knowledge Instructor, MCSE, MCT, CEH Introduction:

More information

USB Server User Manual. USB Server Manual (DN-13010)

USB Server User Manual. USB Server Manual (DN-13010) USB Server Manual (DN-13010) Copyright Notice Copyright 2010. Al rights reserved. Disclaimer Incorporated shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental

More information

Veeam Endpoint Backup

Veeam Endpoint Backup Veeam Endpoint Backup Version 1.5 User Guide March, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide 2 Wave Systems Corp. Client User Guide Table of Contents Overview... 3 What is the Trusted Drive Manager?... 3 Key Features of Trusted Drive Manager... 3 Getting Started... 4 Required Components... 4 Configure

More information

Protecting your data with Windows 10 BitLocker

Protecting your data with Windows 10 BitLocker Microsoft IT Showcase Protecting your data with Windows 10 BitLocker Microsoft BitLocker Drive Encryption technology uses the strongest publicly available encryption to protect your computer s data. It

More information

SOFTRAID FOR THUNDERBAY. Quick Start Guide

SOFTRAID FOR THUNDERBAY. Quick Start Guide SOFTRAID FOR THUNDERBAY Quick Start Guide CONTENTS Introduction... 1 1.1 Minimum System Requirements 1.2 Features 1.3 About This Manual Easy Setup... 2 2.1 About Easy Setup 2.2 Using Easy Setup Using SoftRAID...

More information

ImageMate 12-in-1 Reader/Writer User Guide

ImageMate 12-in-1 Reader/Writer User Guide ImageMate 12-in-1 Reader/Writer User Guide Model Number SDDR-89 Product Description The Multi-Function Hi-Speed USB 2.0 Reader/Writer CompactFlash Type I/II, SD TM, minisd TM, MultiMediaCard TM, RS-MMC

More information

Fiery proserver User Guide

Fiery proserver User Guide Fiery proserver User Guide Congratulations on your purchase of the Fiery proserver, a powerful production solution for your printer. Before you begin Make sure that you have: About this document Installed

More information

Dedicated Security Software for USB Flash Drive

Dedicated Security Software for USB Flash Drive Dedicated Security Software for USB Flash Drive Manual Contents Chapter 1 Introduction... 2 Chapter 2 System Requirements... 4 Chapter 3 Installing the Security Software... 5 1. Installing the Security

More information

DRIVE DOCK. User Guide

DRIVE DOCK. User Guide DRIVE DOCK User Guide CONTENTS INTRODUCTION 1.1 Minimum System Requirements...1 1.1.1 Apple Mac Requirements 1.1.2 PC Requirements 1.1.3 Supported Drives 1.2 Package Contents...1 1.3 About This Manual...1

More information

Metalogix Essentials for Office Creating a Backup

Metalogix Essentials for Office Creating a Backup Metalogix Essentials for Office 365 2.1 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

TOSHIBA USB Flash Memory U363 / U364

TOSHIBA USB Flash Memory U363 / U364 TOSHIBA USB Flash Memory U363 / U364 Update Tool Manual This manual gives instructions on how to update firmware of the Toshiba Memory USB Flash Memory U363/U364 series ( USB Flash Memory ). Before using

More information

Hiddn SafeDisk. Installation Manual. Version April //

Hiddn SafeDisk. Installation Manual. Version April // Hiddn SafeDisk Installation Manual Version 2.1.5 24. April 2018 1. Introduction This document will explain what is delivered, how units are initialized (loaded with certificates) and some alternatives

More information

Document # Rev. C 4/10 Cencon 4 Getting Started Guide

Document # Rev. C 4/10 Cencon 4 Getting Started Guide Page 1 KABA MAS Cencon 4 Getting Started Guide Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe locks. Its

More information

U-Storage User s Manual. Version 2.3

U-Storage User s Manual. Version 2.3 U-Storage User s Manual Version 2.3 Introduction Thank you for purchasing the U-Storage device. The manual explains how to use the U-Storage software bundled with the device. Safety Precautions Please

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

EZ Drive USB Flash Disk

EZ Drive USB Flash Disk EZ Drive USB Flash Disk User Manual Version 2.33 2002/10/31 Version: 2.33 TABLE OF CONTENTS 1 Introduction... 04 1.1 Features... 04 1.2 Specification... 04 1.3 Accessories... 05 2 Safe Precautions... 05

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

SECUDRIVE USB Office

SECUDRIVE USB Office SECUDRIVE USB Office User Guide Doc Ver. 3.0.1.383 2013-02-10 Brainzsquare, Inc. Table of Contents 1. Overview... 3 1.1 Features... 3 1.2 Product... 4 1.3 Glossary... 4 2. How to use SECUDRIVE USB Office...

More information

THUNDERBAY 4. Assembly Manual & User Guide

THUNDERBAY 4. Assembly Manual & User Guide THUNDERBAY 4 Assembly Manual & User Guide CONTENTS Introduction...1 1.1 Minimum System Requirements 1.1.1 Mac Requirements 1.1.2 PC Requirements 1.1.3 Supported Drives 1.2 Package Contents 1.3 About This

More information

Dell Data Security Console. User Guide v10.0

Dell Data Security Console. User Guide v10.0 Dell Data Security Console User Guide v10.0 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either

More information

FUSION F2. User s Guide. Portable 2-Drive RAID SATA Storage System. For Windows

FUSION F2. User s Guide. Portable 2-Drive RAID SATA Storage System. For Windows FUSION F2 Portable 2-Drive RAID SATA Storage System User s Guide For Windows Fusion F2 Specifications and Features Drive Power/Activity LED Drive Power/Activity LED Figure 1 esata Connector Figure 2 Power

More information

vívohub 2 Installation Instructions Getting Started When using the device for the first time, you must complete these tasks to set up the device.

vívohub 2 Installation Instructions Getting Started When using the device for the first time, you must complete these tasks to set up the device. vívohub 2 Installation Instructions Device Overview The vívohub device is an ANT to Wi Fi wireless bridge that supports Garmin wellness products. Using the ANT wireless protocol, the vívohub device detects

More information

Deposit Wizard TellerScan Installation Guide

Deposit Wizard TellerScan Installation Guide Guide Table of Contents System Requirements... 2 WebScan Overview... 2 Hardware Requirements... 2 Supported Browsers... 2 Driver Installation... 2 Step 1 - Determining Windows Edition & Bit Count... 3

More information

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy Integral Memory PLC. Chassis) and Crypto Dual Plus (Underlying FIPS 140-2 Security Policy Table of Contents 1. INTRODUCTION... 1 1.1 Purpose....1 1.2 References... 1 1.3 Document History... 1 2. PRODUCT

More information

THUNDERBAY 4. Assembly Manual & User Guide

THUNDERBAY 4. Assembly Manual & User Guide THUNDERBAY 4 Assembly Manual & User Guide TABLE OF CONTENTS INTRODUCTION...1 1.1 MINIMUM SYSTEM REQUIREMENTS 1.1.1 Apple Mac Requirements 1.1.2 PC Requirements 1.1.3 Supported Drives: up to four 3.5 SATA

More information

TABLE OF CONTENTS INTRODUCTION...1 DEVICE SETUP...4 SUPPORT RESOURCES...9

TABLE OF CONTENTS INTRODUCTION...1 DEVICE SETUP...4 SUPPORT RESOURCES...9 TABLE OF CONTENTS INTRODUCTION...1 1.1 Minimum System Requirements 1.2 Package Contents 1.3 About This Manual 1.4 Rear View 1.4.1 Rear Features 1.5 Usage Notes DEVICE SETUP...4 2.1 Quick Start 2.2 Assembly

More information

Fiery proserver User Guide

Fiery proserver User Guide Fiery proserver User Guide Congratulations on your purchase of the EFI Fiery proserver, a powerful production solution for your printer. Before you begin Make sure that you have: About this document Installed

More information

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile

More information

Encrypted Solutions. Your essential guide to encrypted data storage

Encrypted Solutions. Your essential guide to encrypted data storage Encrypted Solutions Your essential guide to encrypted data storage 2017 Are you GDPR Ready? The General Data Protection Regulation is a new EU legislation which aims to strengthen and future-proof data

More information

BIOS. Chapter The McGraw-Hill Companies, Inc. All rights reserved. Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs

BIOS. Chapter The McGraw-Hill Companies, Inc. All rights reserved. Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs BIOS Chapter 8 Overview In this chapter, you will learn how to Explain the function of BIOS Distinguish among various CMOS setup utility options Describe option ROM and device drivers Troubleshoot the

More information

User SSD Manual SSD. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the datashur SSD.

User SSD Manual SSD. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the datashur SSD. User SSD Manual SSD Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the datashur SSD. If you are having difficulty using the datashur SSD, please contact our

More information

Integrating RDX QuikStor into NetJapan ActiveImage Protector

Integrating RDX QuikStor into NetJapan ActiveImage Protector Integrating RDX QuikStor into NetJapan ActiveImage Protector INTEGRATION BRIEF Backup is the life insurance of a company as it protects its crown jewels. Backup ensures data availability and business continuity

More information

Aegis Secure Key 3.0. User s Manual. Data Security at Your Fingertips

Aegis Secure Key 3.0. User s Manual. Data Security at Your Fingertips Aegis Secure Key 3.0 User s Manual Remember to save your PIN in a safe place. If PIN is lost or forgotten, there will be no way to access data on the key. Data Security at Your Fingertips Table of Contents

More information

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Sophos Enterprise Console. EventTracker v8.x and above Integrate Sophos Enterprise Console EventTracker v8.x and above Publication Date: September 22, 2017 Abstract This guide provides instructions to configure Sophos Enterprise Console to send the events

More information

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012 SafeGuard Easy Demo guide Product version: 6 Document date: February 2012 Contents 1 Introduction...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What to expect

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

SecureAPlus User Guide. Version 3.4

SecureAPlus User Guide. Version 3.4 SecureAPlus User Guide Version 3.4 September 2015 Copyright Information Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious

More information

BlackBerry Wireless Handheld Getting Started Guide

BlackBerry Wireless Handheld Getting Started Guide BlackBerry Wireless Handheld Getting Started Guide Phone button Open the phone screen Earpiece Headset jack USB port Notification LED Trackwheel Select or click an item Escape button Exit a screen Alt

More information

Ceedo Client Family Products Security

Ceedo Client Family Products Security ABOUT THIS DOCUMENT Ceedo Client Family Products Security NOTE: This document DOES NOT apply to Ceedo Desktop family of products. ABOUT THIS DOCUMENT The purpose of this document is to define how a company

More information

LockState RL 4000 User Guide

LockState RL 4000 User Guide LockState RL 4000 User Guide www.resortlock.com Table of Contents Section 1: General Overview 1. Foreword... 3 2. Important Information.. 3 3. Software Installation.. 4 Section 2: Initial Lock Setup Manual

More information

SafeGuard Easy Demo guide. Product version: 6.1

SafeGuard Easy Demo guide. Product version: 6.1 SafeGuard Easy Demo guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What

More information

THUNDERBAY 4. Assembly Manual & User Guide

THUNDERBAY 4. Assembly Manual & User Guide THUNDERBAY 4 Assembly Manual & User Guide CONTENTS Introduction...1 1.1 Minimum System Requirements 1.1.1 Apple Mac Requirements 1.1.2 PC Requirements 1.1.3 Supported Drives 1.2 Package Contents 1.3 About

More information

Pocket Rocket FLE. File Level Encryption. User Guide. Model: Addonics Pocket Rocket

Pocket Rocket FLE. File Level Encryption. User Guide. Model: Addonics Pocket Rocket Pocket Rocket FLE Model: Addonics Pocket Rocket File Level Encryption User Guide OVERVIEW The Pocket Rocket works by encrypting data using a 256- bit algorithm set by a password key. It encrypts files

More information

PGP NetShare Quick Start Guide Version 10.2

PGP NetShare Quick Start Guide Version 10.2 PGP NetShare Quick Start Guide Version 10.2 What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. Use PGP NetShare to: Let authorized

More information

60 GHz Wireless Dock Basic Model

60 GHz Wireless Dock Basic Model 60 GHz Wireless Dock Basic Model Model 107007 User Manual Email: support@cablematters.com Table of Contents 1. INTRODUCTION... 1 1.1 Introduction 1.2 Copyright and Trademarks 1.3 FCC Compliance Statement

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

PTZOptics IP Joystick Controller

PTZOptics IP Joystick Controller PTZOptics IP Joystick Controller Third Generation IP Joystick Controller Installation & Operation Manual Please visit www.ptzoptics.com for the most up to date version of this manual Page1 Table of Contents.

More information

MITEL. Mobile Extension. Mobile Client Handset User Guide Release 1.7

MITEL. Mobile Extension. Mobile Client Handset User Guide Release 1.7 MITEL Mobile Extension Mobile Client Handset User Guide Release 1.7 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks Corporation

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12 26 SEP 2017 Horizon FLEX 1.12 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates.

More information

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide SafeNet MobilePKI for BlackBerry V1.2 Administration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have

More information

ipassconnect for Symbian User s Guide

ipassconnect for Symbian User s Guide ipassconnect 1.50.0 for Symbian User s Guide Version: 1.0, April 07 Corporate Headquarters ipass Inc. 3800 Bridge Parkway Redwood Shores, CA 94065 USA www.ipass.com +1 650-232-4100 +1 650-232-0227 F TABLE

More information