DataLocker has been providing cutting-edge, advance encryption solutions since 2011. Our government and military clients are especially keen on protecting sensitive data and regularly look to us for solutions so they can securely transport, store and share data. Lost or stolen devices should not be equated with compromised data!
One of the typical requirements for encryption solutions is that they be FIPS validated. FIPS stands for Federal Information Processing Standards. These standards were developed by the National Institute of Standards for Technology (NIST) through the U.S. Department of Commerce as benchmarks for security in government pursuant to the Federal Information Security Management Act.
Several of our products are FIPS 140-2 validated. This refers specifically to cryptographic modules, such as our hardware-encrypted external hard drives and USB flash drives. There are four levels of security within FIPS 140-2. (Read more about FIPS 140-2 security levels here.) At the highest level, level 4, the physical security mechanisms provide a complete envelope of protection around the cryptographic module with the intent of detecting and responding to all unauthorized attempts at physical access.
So what makes DataLocker FIPS validated products unique? Our DataLocker DL3 FE is the only drive on the market that utilizes two pass cascading encryption using two different independently generated random keys for unsurpassed security. And the DataLocker H350 has earned end-to-end FIPS 140-2 Level 3 validation (certification #2359) for the entire H350 External Hard Drive – not just its encryption components- making it immune from attacks such as “BadUSB” or “Equation Group,” which also target other components of the device. In addition, the following DataLocker products are FIPS validated:
- DL2 Encrypted External Hard Drive USB 2.0
- H100/H200 Encrypted External Hard Drive USB 2.0
- Sentry 3 FIPS Encrypted Flash Drive
- SafeCrypt Cloud Encryption Gateway
More information on DataLocker’s certifications can be found here. If you are interested in receiving an evaluation of your mobile security, or to try one of our products, please click here and an account executive will be in touch. You may also email us at email@example.com.