Hard drive
Hard drive capacity |
1000 GB |
Ports & interfaces
USB version |
2.0 |
USB connectivity |
Y |
Additionally
Wireless technologies |
Wired |
MXCA1B001T4001FIPS - 1 TB
<b>Centrally manage devices and access policies</b>
<b>Manage Defender H200 Biometric External Drives with your choice of two comprehensive device management platforms.</b>
McAfee ePolicy Orchestrator® integrates directly with Defender external USB drives and gives you extensive control over how your employees handle confidential data, enabling you to simultaneously lock down data by unleashing the potential built into every Imation encrypted USB drive.
IronKey ACCESS™ Enterprise management platform lets you broadly deploy USB devices and police their use.
Key features include:
<b>Flexible policy enforcement. Active Directory integration lets you enforce policies both internally and over the Internet.</b>
<b>Tailored environments. Tailor security policies and device behavior to different user needs. Adjust authentication policies ― password complexity rules, biometric security levels, retry limits and more ― to the needs of each group of users.</b>
<b>Advanced reporting. Make it easier to meet audit and compliance requirements by logging and storing a complete history of administrative activities and security-related events for each device.</b>
Streamlined device management. With optional ACCESS Enterprise Server, allow users to self-issue devices right at their desks while maintaining full adherence to predefined security policies. Then update policies at any time, even over the Internet.
Secure device communication. An industry first, the ACCESS Enterprise Server uses direct device communication through a NIST SP800-56A certified, authenticated secure channel. Unlike lesser server solutions that put the burden of policy translation on the device, Imation’s server directly applies policies to devices for true security and policy immunity to host-resident malware.
<b>User self-rescue. With ACCESS Enterprise Server, ensure that devices remain accessible even if a user forgets their password or damages their fingerprint.</b>
<b>Device revocation. Prevent leakage by using ACCESS Enterprise Server to remotely block compromised, lost or stolen devices, or even erase data remotely.</b>