Apricorn

Aegis Padlock DT

Features

Benefits

APPLY FOR PARTNERSHIP

Thank you for your interest. Kindly fill out the details below and we will contact you back soon.

Contact Us

Please complete this form to be contacted by one of our experts.

  1. Home
  2. /
  3. Vendors
  4. /
  5. Apricorn
  6. /
  7. Apricorn: Encrypted Desktop Drives – Aegis Padlock DT – USB 3.0 Desktop Drive

Aegis Padlock DT – USB 3.0 Desktop Drive

The Padlock DT delivers the ultimate data security in a wide range of storage capacities. AES XTS 256-bit hardware encryption, onboard keypad PIN authentication, and USB 3.1 (3.0) data transfer speeds. The PINs and Data are encrypted while the drive is in use. The Padlock DT works with Windows, Linux, Mac, Android, and Chrome. It also thrives in environments where software-authenticated encrypted devices fail, such as embedded systems or devices with a powered USB port but no keyboard. The firmware is locked down to prevent any modifications, making it impervious to malware attacks like BadUSB.

On-the-Fly 100% Hardware-Based Encryption | Software-Free Setup and Operation | Cross-Platform Compatible | Host-Free Onboard Keypad Authentication

Product badgesProduct badgesProduct badgesProduct badges

Size: 2TB – 16TB

Request A Copy Today!

Please fill in details below before downloading Apricorn Padlock DT Datasheet.

Why Aegis Padlock DT

Don't Put Text Here
Featuring AegisWare™

The heart and soul of every Apricorn Secure Device, AegisWare is our patent-protected firmware combined with the industry’s most advanced feature set. Aegis Configurator compatible, the windows-Based App that quickly sets up multiple devices simultaneously.

Invisible (Don't Put Text Here)
Military-grade FIPS PUB 197 Validated Encryption

Due to the use of AES-XTS 256-bit hardware encryption, the Aegis Padlock DT is capable of seamlessly encrypting all data stored on the drive on the fly, ensuring that all data at rest remains safe even if the hard drive is removed from its enclosure.

Invisible (Don't Put Text Here)
Polymer-Coated Keypad

Drive is unlocked by entering a PIN on the keypad. By excluding the host system from the authentication process, the embedded keypad defeats all hardware and software key logging attempts. The polymer-coated prevents revealing the commonly used buttons.

Invisible (Don't Put Text Here)
Two Read-only Modes

Admin control global, all-access settings and User control individual settings. Universal Read Only is set by the admin and can’t be modified or disabled only by the admin. The second read-only mode can be set and disabled by a user but can also be enabled or disabled by the admin.

Invisible (Don't Put Text Here)
Separate Admin and User Mode

Admin (Device Configuration) and User Access. Admin and User PINs are separate on the Aegis Fortress L3. The Admin mode controls the device’s universal programmable settings and requires the Admin PIN. The User mode can only read/write, unlock/lock external drives. The admin PIN can also access the drive’s data in User mode.

Invisible (Don't Put Text Here)
Admin & User Forced Enrollment

During setup, a unique PIN must be created. Before using or writing to the Fortress L3, or any other Apricorn secure drive, the admin must create a complex, unique PIN. A second user PIN can be generated to access the device’s data. This PIN can be set up by the admin during initial configuration, or by the intended user prior to using the device.

Invisible (Don't Put Text Here)
Data Recovery PINs

Restores access to drive by requiring user enrollment. It is possible for an admin to re-enrol a device in User Forced Enrollment mode if a User PIN is forgotten. It is possible to generate a new User PIN to replace an old one.

Invisible (Don't Put Text Here)
Malware Prevention

All internal componentry is protected from physical tampering with a layer of hardened epoxy, and the firmware is locked down to prevent any modifications making it impervious to malware attacks such as BadUSB.

Invisible (Don't Put Text Here)
Brute-Force Defense

Select the number of consecutive invalid PIN attempts permitted (4-20) before crypto-erase. Your data is safeguarded from physical brute force attacks by a programmable “Brute Force Hack Defense Mechanism” that deletes the encryption key after unsuccessful password entries.

Invisible (Don't Put Text Here)
Unattended Auto Lock

Programmable Length of Time of Inactivity Permitted Before Drive Locks Itself. All Aegis Secure Drives will automatically lock once disconnected from a computer’s USB port or the power to that USB port is interrupted or after a pre-programmed period of inactivity.

Invisible (Don't Put Text Here)
Drive Reset Feature

Reset and re-deploy Apricorn devices. Drive reset clears both the User and Admin PINs, destroys data, creates a new randomly generated encryption key, and allows the drive to be reused indefinitely.

Invisible (Don't Put Text Here)
Self-Destruct PIN

When activated it generates a new PIN to ensure data security when the device’s physical security is compromised. it erases the drive’s contents but leaves it in working order and ready to deploy.

Specifications

Data Transfer Rate USB 3.0 – up to 5 Gbps
Power Supply 12V AC Adapter
Buffer Size 8 MB
Interface Super Speed USB 3.0 (Backwards compatible with USB 2.0 and 1.1)
Average seek time 12 ms
Shock (non-operating) 1000G 1ms
Shock (operating) 300G 2ms
Dimensions and Weight 4.5” X 7.2” X 1.5”   3lbs, 1.6oz.
Warranty 3 year limited
Approvals FCC & CE
ECCN   / HTS / Cage Code 5A992.c / 8471.70.2000 / 3VYK8
System Requirements Compatible with all Operating Systems, including Windows, Mac and Linux Requires USB port
Comments One gigabyte (GB) = one billion bytes; accessible capacity will be less and actual capacity depends on the operating environment and formatting.

Apricorn Products

Apricorn’s portable USB storage devices are unique in the data security field in that they all employ a 100% hardware-centric approach void of software involvement in any of the processes. All authentication and encryption functions take place fully within the devices, and no critical security parameters are ever shared with their host computer.

It’s Time to Get Started with Halodata

Request Demo

Contact Us

Please complete this form to be contacted by one of our experts.

Talk to one of our experts and discover the benefits of Halodata for your company.