Apricorn

Aegis Secure Key 3NX

Features

Benefits

APPLY FOR PARTNERSHIP

Thank you for your interest. Kindly fill out the details below and we will contact you back soon.

Contact Us

Please complete this form to be contacted by one of our experts.

  1. Home
  2. /
  3. Vendors
  4. /
  5. Apricorn
  6. /
  7. Apricorn: Encrypted Flash Keys – Aegis Secure Key 3NX

Aegis Secure Key 3NX

Our fourth generation Secure Keys offer enhanced security, up to 25% lower working temperatures, and cheaper costs. AES XTS 256-bit hardware encryption, onboard keypad PIN authentication, and USB 3.2 (3.0) data transfer speeds. The device’s PINs and Data remain encrypted while the drive is in use. It runs on Windows, Linux, Mac, Android, Chrome, embedded systems, and any device with a powered USB port and a storage file system. Hardened epoxy protects all internal components from physical damage, and locked-down firmware protects against malware assaults like BadUSB.

FIPS 140-2 level 3 Validated | Ultra Compact | On-the-Fly 100% Hardware-Based Encryption | Software-Free Setup and Operation | Cross-Platform Compatible | Host-Free Onboard Keypad Authentication | Rugged Extruded Aluminum Enclosure

Product badges Product badgesProduct badgesProduct badgesProduct badgesProduct badges

Size: 2GB – 128GB

Request A Copy Today!

Please fill in details below before downloading Apricorn Secure Key 3NX Datasheet

Why Aegis Secure Key 3NX

Don't Put Text Here
Featuring AegisWare™

The heart and soul of every Apricorn Secure Device, AegisWare is our patent-protected firmware combined with the industry’s most advanced feature set. Aegis Configurator compatible, the windows-Based App that quickly sets up multiple devices simultaneously.

Invisible (Don't Put Text Here)
FIPS 140-2 Level 3 Validation

Meets the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for the protection of sensitive data. NIST cert #3943

Invisible (Don't Put Text Here)
IP 67 Certified

Dust and Water Resistant Durable Aluminum Housing Protecting data goes well beyond encryption. Tough enough to go anywhere, the Aegis Secure Key’s resilient design makes it perfect for travel and field applications. With its rugged, extruded aluminum crush-resistant casing, the Aegis Secure Key is tamper evident and well-protected against physical damage.

Invisible (Don't Put Text Here)
Two Read-only Modes

Admin control global, all-access settings and User control individual settings. Universal Read Only is set by the admin and can’t be modified or disabled only by the admin. The second read-only mode can be set and disabled by a user but can also be enabled or disabled by the admin.

Invisible (Don't Put Text Here)
Separate Admin and User Mode

Admin (Device Configuration) and User Access. Admin and User PINs are separate on the Aegis Fortress L3. The Admin mode controls the device’s universal programmable settings and requires the Admin PIN. The User mode can only read/write, unlock/lock external drives. The admin PIN can also access the drive’s data in User mode.

Invisible (Don't Put Text Here)
Admin & User Forced Enrollment

During setup, a unique PIN must be created. Before using or writing to the Fortress L3, or any other Apricorn secure drive, the admin must create a complex, unique PIN. A second user PIN can be generated to access the device’s data. This PIN can be set up by the admin during initial configuration, or by the intended user prior to using the device.

Invisible (Don't Put Text Here)
Data Recovery PINs

Restores access to drive by requiring user enrollment. It is possible for an admin to re-enrol a device in User Forced Enrollment mode if a User PIN is forgotten. It is possible to generate a new User PIN to replace an old one.

Invisible (Don't Put Text Here)
Fixed Disk or Removable Media (U.S. Patent No. 10,338,840)

Can be Configured as Fixed Disk or Removable Media in Device Setup. Compatible with embedded devices and OSs that only recognise one type of removable storage. 

Invisible (Don't Put Text Here)
Brute-Force Defense

Select the number of consecutive invalid PIN attempts permitted (4-20) before crypto-erase. Your data is safeguarded from physical brute force attacks by a programmable “Brute Force Hack Defense Mechanism” that deletes the encryption key after unsuccessful password entries.

Invisible (Don't Put Text Here)
Unattended Auto Lock

Programmable Length of Time of Inactivity Permitted Before Drive Locks Itself. All Aegis Secure Drives will automatically lock once disconnected from a computer’s USB port or the power to that USB port is interrupted or after a pre-programmed period of inactivity.

Invisible (Don't Put Text Here)
Drive Reset Feature

Reset and re-deploy Apricorn devices. Drive reset clears both the User and Admin PINs, destroys data, creates a new randomly generated encryption key, and allows the drive to be reused indefinitely.

Invisible (Don't Put Text Here)
Self-Destruct PIN

When activated it generates a new PIN to ensure data security when the device’s physical security is compromised. it erases the drive’s contents but leaves it in working order and ready to deploy.

Specifications

Data Transfer Rate

Up to 77MB/s Read / 72MB/s Write

Power Supply

USB Port / Internal Battery

Interface

Super Speed USB 3.2 gen 1 (Backwards compatible with USB 3.0, 2.0 and 1.1)

Dimensions

81mm x 18.4mm x 9.5mm | 22 g

Warranty

3-year Limited Warranty

Approvals

FIPS 140-2 Level 3, IP-67, FCC, CE, VCCI, WEE, C-TICK

Certification Policies

ECCN / HTS / Cage Code

5A992.c / 8523.51.0000 / 3VYK8

System Requirements

Windows®, Mac®, Linux, Android and Symbian systems, or any powered USB OS with a storage file system

Apricorn Products

Apricorn’s portable USB storage devices are unique in the data security field in that they all employ a 100% hardware-centric approach void of software involvement in any of the processes. All authentication and encryption functions take place fully within the devices, and no critical security parameters are ever shared with their host computer.

It’s Time to Get Started with Halodata

Request Demo

Contact Us

Please complete this form to be contacted by one of our experts.

Talk to one of our experts and discover the benefits of Halodata for your company.