Take advantage of our risk-free "try before you buy" options. When you're satisfied with the repaired results, you can proceed to purchase.
Level 3 requires strong physical security features to prevent theft, tampering, or unauthorized physical access. In addition, the drives are Certified secure key distribution, storage, and destruction mechanisms through the use of validated cryptographic algorithms and protocols that are rigorously tested against potential attacks.
Our drives are designed to work seamlessly on any operating system without any compatibility issues, including:
Intelligently designed to safeguard against any kind of brute force attacks. After a cumulative total of 10 unsuccessful attempts at entering the correct user PIN, the user PIN will be automatically crypto-erased.
Plug & Play right out of the box.
• SecureDrive® KP
• USB 3.0 Cable
• USB-C Cable
• Quick Start Guide
• Shockproof Splash Resistant Carrying Case
• SecureCard - RFID protector
Eliminate data leaks and protect digital files with the hardware-encrypted SecureDrive KP. The device is hardware-encrypted and is FIPS-validated. It is unlocked by entering the user PIN via the onboard keypad. The keypad is wear-resistant to prevent unauthorized parties from seeing commonly used keys.
If the SecureDrive KP is stolen, the brute-force, anti-hacking mechanism wipes the drive clean after 10 consecutive failed PIN entries. Epoxy coating on internal components prevents hackers from accessing data through physical tampering. The device is OS-independent and can be used across all devices with a USB port.
Capacity: 250 GB – 20 TB
Size: 500 GB, 1, 2, 4, 8, 16 TB SSD & 500 GB, 1, 2 TB HDD - H: 125 mm W: 77 mm L: 12.5mm20 TB SSD & 4, 5 TB HDD - H: 125 mm W: 77 mm L: 20.5 mm
User Authentication: Ergonomically designed 10+1 keypad
Security Validation: FIPS 140-2 Level 3 validated
Encryption: Real-time, military-grade XTS-AES 256-bit full-disk hardware encryption
Data transfer speed: Reads up to 355 MB per second; writes up to 333 MB per second
Interface: USB 3.0/3.1 gen1/3.2 gen1
Physical Protection: Protected with epoxy compound to prevent physical access to the device through tampering.
Complete Drive Reset (Safe Erase): Erases all data after 10 consecutive, incorrect PIN entry attempts
Immune to Bad USB: Yes; firmware updates not allowed
Roles/Permissions: 1 Admin, 1 User
Read Only Mode: Yes
Inactivity Auto-lock: Predefined times between 1 and 60 minutes
OS Compatibility: Windows, MacOS, Linux, Chrome, Thin Clients, Embedded Systems, VMware, Citrix (no software or drivers needed)
Regulatory Approvals: RoHs, FCC, CE, FIPS 140-2 Level 3
Warranty: 2-year limited (HDD)3-year limited (SSD)When referring to drive capacity, one gigabyte (GB) equals one billion bytes.
One terabyte (TB) equals one trillion bytes. Your computer’s operating system may use a different standard for measurement and report a lower capacity.
Standard License - Intended for small businesses and/or individuals.
Standard license limitations:
Business License - Intended for small or medium businesses.
SecureDrive® and SecureUSB® products are developed and manufactured by SecureData and are based on DataLock® technology licensed from ClevX, LLC. U.S. Patent. www.clevx.com/patents
Trusted by 3,000+ happy Customers & Organizations.
As an alternative to downloadable utility, you can get instant results with our breakthrough online file repair. With no software to download and install it's easier and faster than ever.
Repair your corrupt files by uploading them to our cloud-based platform. After upload, processing typically takes from a few seconds to a minute, after which the user is offered free and paid options for downloading the results of the recovery.
Dozens of file formats are supported, including Microsoft Word documents, Excel spreadsheets, PowerPoint presentations, Access databases, JPEG, GIF, TIFF, BMP, PNG and RAW images.
Press the Key button and enter your user PIN, followed by the Key button again. To lock, disconnect the drive or press and hold the Key button for 2 seconds.
No. Secure Drive KP is a sophisticated, hardware-encrypted storage device which must have a PIN to operate.
Press 7 + Key, then enter 999, then press 7 + Key. All user data and drive formatting will be immediately reset beyond recovery.
If the Admin password was set up, the drive can be unlocked with Admin PIN. If no Admin PIN exists or it is not available, then there are no backdoors or resets. After 10 consecutive, incorrect attempts the brute-force, anti-hacking mechanism wipes all user data and drive attributes.
The key advantage is that in case the user PIN is entered incorrectly 10 consecutive times, the anti-hacking mechanism wipes the user PIN attributes but leaves the user data intact so that no more attempts to unlock via User Mode can be complete, but an Admin PIN can unlock the drive without data loss.
No. Admin mode and User mode view identical contents. Admin mode can override User settings such as Read Only and Auto-lock.
While using the SecureData Lock® app you do not need to be connected to the internet or have a cell signal in order to unlock the drive. However, some settings require an internet connection or cell phone signal, including dual-factor authentication, password recovery, and remote wipe. Alternatively, if your device is remote managed you must unlock it via the SecureData Lock® RM app which requires an internet connection or cell service.
The drive will revert to factory settings, become unformatted, and the default drive name and all user data will be gone. The drive requires formatting for continued use.
No. There are absolutely no backdoors nor resets. After 10 consecutive, incorrect attempts the anti-hacking, brute-force self-defense mechanism wipes all user data and drive attributes.
No. Resetting the drive activates a crypto erase command which deletes and then regenerates the encryption key. Once the key is gone there is absolutely no way to get it back. Even though there will be encrypted data on the drive, there is no viable way to decrypt it.
Our data repair experts can solve the most difficult data corruption situations. Corrupted files are taken apart bit by bit, and recoverable data is reconstructed into a new file.
To learn more please submit this form and one of our technicians will contact you to go over the process.