Here you can compare the prices for data encryption devices Origin Storage, get acquainted with photos and technical characteristics (for example PIN-secured access, Supported drive bays, Linux operating systems supported, SmartCard slot, Housing material, SmartCard slots quantity) and buy a liked model data encryption devices in one of the reliable online stores.
Chameleon Pro Master, 256-Bit AES, USB3.0, 360g, Silver
Administrative Control
Protect your organization's confidential data with User Chameleon devices. A Chameleon Pro Master manages Chameleon devices for the entire organization. The Master can access any of its Users' data.
Unlimited Encrypted Data
Unlike flash drives, the encrypted data is not stored on the Chameleon. It remains in your storage device. In the event of a lost Chameleon, your data is still recoverable and remains safe in your computer, external hard drive, or flash drive. You can make the biggest Chameleon drives up to 2TB in size. You can make any number of Chameleon drives on your internal hard disk or on flash drives. There is no limit on how much encrypted data can be created by Chameleon. The limit will only be the size of your flash drive, internal or external hard drive.
Revoke Users by Migrating keys
When a User device is lost or an employee with a User device leaves the company, the need to revoke a User and its device arises. A Master device can initiate a migration process to retire a User device or migrate the old User key to a new User key.
PC Lock
PC Lock automatically locks the Windows session whenever Chameleon device is removed. A Master devive can set policy to require its User to enforce PC Lock.
AutoLogin
Chameleon Autologin is the opposite of PC Lock: if enabled, you can log-in to Windows simply by plugging in the Chameleon device. A Master device has the option of forbiding their Users from using Auto Login. AutoLogin is only supported on Windows Vista and Windows 7.
By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.