Here you can compare the prices for memory cards IronKey, get acquainted with photos and technical characteristics (for example Storage, Transfer speed, Packaging language (option), Bluetooth / PC Card remote boot, Packaging language, Operating instructions) and buy a liked model memory cards in one of the reliable online stores.
D2-S250-S16-4FIPS - 16GB, USB 2.0, 0.025kg
BUILT TO BE THE WORLD’S MOST SECURE FLASH DRIVES IronKey Enterprise S250 and D250 flash drives are designed specifically for enterprise, government and military customers that require exceptional security, performance and manageability from their mobile storage devices. Built from the ground up to be the world’s most secure flash drives, IronKey Enterprise drives meet the stringent Security Level 3 requirements of the FIPS 140-2 standard, are outfitted with strong hardware encryption, and use the algorithm approved by the DOD for storing Top Secret data. A ruggedized, waterproof * metal chassis helps protect S250 and D250 drives from the elements. Active anti-malware helps prevent USB threats from spreading. And an intuitive user console makes IronKey Enterprise drives as simple as secure allows.
CENTRALIZED, ENTERPRISE-CLASS ADMINISTRATION Use an intuitive, secure online management console to apply security policies to thousands of IronKey Enterprise flash drives. - Enforce device-specific policies, including password strength and retry limits, onboard portable applications, and where devices are allowed to be used. - Mitigate risks of data loss by remotely disabling or detonating lost and stolen Enterprise drives. - Control where IronKey Enterprise drives may be used based on IP address or range. - Securely recover access to user devices, remotely force password changes, and recommission devices that are no longer in use. - Manage access to software pre-loaded onto drives, including a secure portable version of Mozilla Firefox, IronKey Identity Manager and IronKey Secure Sessions Service
By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.