background image

PAGE  5

IRONKEY WORKSPACE W500 USER GUIDE

DEVICE SECURITY

Data Encryption Keys

 

»

AES key generated by onboard Random Number Generator

 

»

AES key generated at initialization time and encrypted with hash of user password

 

»

No backdoors:  AES key cannot be decrypted without the user password

 

»

AES key never leaves the hardware and is not stored in NAND flash

Data Protection

 

»

Windows To Go partition is not accessible until password is verified in hardware

 

»

Password try-counter implemented in tamper-resistant hardware

 

»

Once password try-count is exceeded, all data is erased by hardware

 

»

Secure box architecture accessible only to firmware to store sensitive data and settings

Device Password Protection

 

»

USB command channel encryption to protect device communications

 

»

Password-in-memory protection to protect against cold-boot and other attacks

The device password is hashed using salted SHA-256 before being transmitted to the device 

firmware over a secure and unique USB channel.  It is stored in an extremely inaccessible 

location in the protected Cryptochip hardware. The hashed password is validated in hardware 

(there is no “getPassword” function that can retrieve the hashed password), and only after the 

password is validated is the AES encryption key decrypted. The password try-counter is also 

implemented in hardware to prevent memory rewind attacks. Typing your password incorrectly 

too many times initiates a permanent “flash-trash” self-destruct sequence, which is run in 

hardware rather than using software, ensuring the ultimate protection for your data.

Product specifications

For details about your device, see “Device Info” in the IronKey Control Panel settings.

Specification

Details

Capacity*

Up to 32GB, 64GB, 128GB

Dimensions

82mm X 21.1mm X 9.1mm

Weight

1.12 oz (32 grams)

Operating Temperature

0C, 70C

Operating Shock

16G rms

Hardware Encryption

• 

Data: 256-bit AES (CBC mode)

•  Hardware: 256-bit AES 
•  Hashing: 256-bit SHA

Summary of Contents for Workspace W500

Page 1: ...PAGE 1 IRONKEY WORKSPACE W500 USER GUIDE IronKey Workspace Models W500 Updated September 2013 User Guide ...

Page 2: ...best security technologies and making them simple to use and widely available Years of research and millions of dollars of development have gone into bringing this technology to you We are very open to user feedback and would appreciate hearing about your comments suggestions and experiences with this product Feedback securityfeedback imation com User Forum https forum ironkey com ...

Page 3: ...o boot from USB 8 Set up the device 8 Activate a managed device 9 Start the secureWorkspace for the first time 10 Access the secure Workspace 10 Boot from the device to access the secureWorkspace 10 Unlock and lock the device 11 Unlock device 11 Lock device 11 Unplug the device 12 Access my device if I forget my password 12 Change my password 13 Update my device 13 Find information about my device...

Page 4: ...n you are using the operating system of the host computer and the device is just a USB device and is not booted into Windows To Go Secure Workspace Describes when you boot the Windows To Go operating system on the device How is it different than a regular flash drive Hardware Encryption Inside your device is the IronKey Cryptochip which protects your data to the same level as highly classified gov...

Page 5: ...be slower Each computer must be configured to allow you to boot an operating system from a USB device For more information see Set up the host computer on page 8 How secure is it IronKey Workspace W500 has been designed from the ground up with security in mind A combination of advanced security technologies are used to ensure that only you can access your data Additionally it is a physically secur...

Page 6: ...d is hashed using salted SHA 256 before being transmitted to the device firmware over a secure and unique USB channel It is stored in an extremely inaccessible location in the protected Cryptochip hardware The hashed password is validated in hardware there is no getPassword function that can retrieve the hashed password and only after the password is validated is the AES encryption key decrypted T...

Page 7: ... anti virus scan before setting up the device In the host environment Lock the device when not in use before unplugging it before the system enters sleep mode In the secure Workspace WindowsTo Go Do NOT unplug the device while you are booted into WTG as it can result in loss of data or possibly cause irreparable damage to the operating system If your WTG operating system is in Hibernate mode do no...

Page 8: ...nges You can download device software updates only in the Control Panel in the host environment Does not have a lock device option You can use the Control Panel in either environment to do the following Change device password View device information Modify Unlock Message that displays when you unlock the device View notifications about device software updates Access the Admin Console if you are an...

Page 9: ...mputer and enter the BIOS UEFI This is a very fast step You have only a few seconds to press the correct key to access the BIOS UEFI An on screen message will indicate the key sequence for example Press the Esc key or Press F1 to enter setup 3 Configure the system to boot from USB by turning on USB BOOT and moving the setting USB MassStorage to the first position in the boot order 4 Save the new B...

Page 10: ... Workspace drive 3 Type the Activation Code You should have received the code in an e mail message sent from your Administrator 4 Type a device password and confirm it and then click the Continue button Your password is case sensitive and must comply with the password policy set by the administrator 5 If you are prompted to provide an e mail address for an online account enter it now and click the...

Page 11: ...Workspace NOTE When you start the secure portable Workspace on different computers Windows To Go will adapt to the hardware of the local system to use its unique set of hardware components This hardware adaptation process will not be performed with each subsequent startup on the same computer The device stores information for each system from which it has been booted It applies the hardware profil...

Page 12: ...e after every three failed password attempts TIP If you want to boot into the secure Workspace see Access the secure Workspace on page 10 Create a message that displays in the Unlocker This feature if enabled by the System Admin allows you to create a message that appears on the IronKey Unlocker window For example you can provide contact information so that if you lose your device someone will kno...

Page 13: ...the Preferences button in the left sidebar 4 Click the checkbox for auto locking the device and set the time out for either 5 15 30 60 120 or 180 minutes Unplug the device In host environment Lock the device and perform a safe removal operation of the USB drive then unplug the device In the secure Workspace After you are finished using your secure Workspace you must properly shut down the operatin...

Page 14: ... confirm it in the fields provided 5 Click the Change Password button Update my device In the host environment you can securely update software and firmware on your device through signed updates that are verified in hardware Keeping your device up to date helps protect you from future malware and online threats If you are in the secure Workspace you will be notified that your device has updates av...

Page 15: ...t have both your device and your password in order to gain access To log on to your online account 1 In the host environment Unlock your device and click the Settings button on the menu bar of the Control Panel 2 Click the Account button in the left sidebar 3 Click the Manage Account Settings button The Admin Console displays CHANGE DEVICE NICKNAME If you own more than one IronKey Workspace W500 d...

Page 16: ...et question attempt You can also sign up to be notified of new Ironkey product announcements Edit Secret Questions and Answers Click the Edit button to modify your Secret Question responses that you provided during the setup of your online account You can also edit time zone data NOTE You cannot update e mail addresses in your online profile unless you are a System Administrator ...

Page 17: ...e for technical or editorial errors and or omissions contained herein nor for incidental or consequential damages resulting from the furnishing or use of this material The information provided herein is subject to change without notice The information contained in this document represents the current view of Imation on the issue discussed as of the date of publication Imation cannot guarantee the ...

Reviews: