Take advantage of our risk-free "try before you buy" options. When you're satisfied with the repaired results, you can proceed to purchase.
Level 3 requires strong physical security features to prevent theft, tampering, or unauthorized physical access. In addition, the drives are Certified secure key distribution, storage, and destruction mechanisms through the use of validated cryptographic algorithms and protocols that are rigorously tested against potential attacks.
Our drives are designed to work seamlessly on any operating system without any compatibility issues, including:
Intelligently designed to safeguard against any kind of brute force attacks. After a cumulative total of 10 unsuccessful attempts at entering the correct user PIN, the user PIN will be automatically crypto-erased.
Plug & Play right out of the box.
• SecureUSB® KP
• MIcro B Adaptor
• USB-C Adaptor
• Quick Start Guide
• 1 x Lanyard
Physical Security for Digital Data with the SecureUSB KP.
Protect digital files and prevent data leaks with the portable SecureUSB® KP. The device is hardware-encrypted and is FIPS-validated. It is unlocked when a user enters the PIN via the onboard keypad. The keypad itself is wear-resistant to prevent unauthorized persons from seeing commonly used numbers.
In addition to physical security, this flash drive has brute-force, anti-hacking technology. This feature erases the data on the device after 10 consecutive, failed PIN entries. The device itself is IP68 dust- and water-resistant, and is OS-independent to be used across any device with a USB port.
Capacity 8 GB – 256 GB
Size With sleeve - H: 78 mm W: 20 mm L: 10 mm
Without sleeve - H: 77 mm W: 20 mm L: 10 mm
Weight With sleeve: 18 grams
Without sleeve: 12 grams
Data Transfer Speed Reads up to 130 MB per second; writes up to 118 MB per second
Keypad Wear-resistant keypad
Security Module Validation FIPS 140-2 Level-3 Validated
Authentication method User authentication via onboard keypad
Interface USB 3.0/3.1 gen1/3.2 gen1
Data Protection Real-time military grade XTS-AES 256-bit full-disk hardware encryption
Waterproof IP68 Certified (in Sleeve)
Tamper-evident Protected with epoxy compound to prevent physical access to the device through tampering
Brute-force defense Erases all data after 10 consecutive, incorrect PIN entry attempts
Immune to Bad USB Yes; firmware updates not allowed
Roles/Permissions 1 Admin / 1 user
Read Only Mode Yes
Inactivity Auto-lock Predefined times between 1 and 60 minutes
OS Compatibility Microsoft Windows, macOS, Android, Linux, Chrome, Thin Clients, VMWare, Citrix Embedded Systems (no software or drivers needed)
Regulatory Approvals FCC, CE
Warranty 3-year limited
When referring to drive capacity, one gigabyte (GB) equals one billion bytes. One terabyte (TB) equals one trillion bytes. Your computer’s operating system may use a different standard for measurement and report a lower capacity.
Standard License - Intended for small businesses and/or individuals.
Standard license limitations:
Business License - Intended for small or medium businesses.
SecureDrive® and SecureUSB® products are developed and manufactured by SecureData and are based on DataLock® technology licensed from ClevX, LLC. U.S. Patent. www.clevx.com/patents
Trusted by 3,000+ happy Customers & Organizations.
As an alternative to downloadable utility, you can get instant results with our breakthrough online file repair. With no software to download and install it's easier and faster than ever.
Repair your corrupt files by uploading them to our cloud-based platform. After upload, processing typically takes from a few seconds to a minute, after which the user is offered free and paid options for downloading the results of the recovery.
Dozens of file formats are supported, including Microsoft Word documents, Excel spreadsheets, PowerPoint presentations, Access databases, JPEG, GIF, TIFF, BMP, PNG and RAW images.
Press the Key button and enter your user PIN, followed by the Key button again. To lock, disconnect the drive or press and hold the Key button for 2 seconds.
No. Secure Drive KP is a sophisticated, hardware-encrypted storage device which must have a PIN to operate.
Press 7 + Key, then enter 999, then press 7 + Key. All user data and drive formatting will be immediately reset beyond recovery.
If the Admin password was set up, the drive can be unlocked with Admin PIN. If no Admin PIN exists or it is not available, then there are no backdoors or resets. After 10 consecutive, incorrect attempts the brute-force, anti-hacking mechanism wipes all user data and drive attributes.
The key advantage is that in case the user PIN is entered incorrectly 10 consecutive times, the anti-hacking mechanism wipes the user PIN attributes but leaves the user data intact so that no more attempts to unlock via User Mode can be complete, but an Admin PIN can unlock the drive without data loss.
No. Admin mode and User mode view identical contents. Admin mode can override User settings such as Read Only and Auto-lock.
While using the SecureData Lock® app you do not need to be connected to the internet or have a cell signal in order to unlock the drive. However, some settings require an internet connection or cell phone signal, including dual-factor authentication, password recovery, and remote wipe. Alternatively, if your device is remote managed you must unlock it via the SecureData Lock® RM app which requires an internet connection or cell service.
The drive will revert to factory settings, become unformatted, and the default drive name and all user data will be gone. The drive requires formatting for continued use.
No. There are absolutely no backdoors nor resets. After 10 consecutive, incorrect attempts the anti-hacking, brute-force self-defense mechanism wipes all user data and drive attributes.
No. Resetting the drive activates a crypto erase command which deletes and then regenerates the encryption key. Once the key is gone there is absolutely no way to get it back. Even though there will be encrypted data on the drive, there is no viable way to decrypt it.
Our data repair experts can solve the most difficult data corruption situations. Corrupted files are taken apart bit by bit, and recoverable data is reconstructed into a new file.
To learn more please submit this form and one of our technicians will contact you to go over the process.