Kingston IronKey Vault Privacy 50 series are premium USB Type-A and USB Type-C drives that provide enterprise-grade security with FIPS 197 certified AES 256-bit hardware-encryption in XTS mode, including safeguards against BadUSB with digitally-signed firmware and against Brute Force password attacks. VP50 has been Penetration Tested (Pen Tested) for enterprise-grade security. Because it is encrypted storage under the user's physical control, VP50 series are superior to using the Internet and Cloud services to safeguard data.
Vault Privacy 50 supports multi-password (Admin, User, and One-Time Recovery) option with Complex or Passphrase modes. This enhances the ability to recover access to the data if one of the passwords is forgotten. Traditional Complex mode allows for password from 6-16 characters using 3 out of 4-character sets. New passphrase mode allows for a numeric PIN, sentence, list of words, or even lyrics from 10 to 64 characters long. Admin can enable a User and a One-Time Recovery password, or reset the User password to restore data access. To aid in password entry, the "eye" symbol can be enabled to reveal the typed-in password, reducing typos leading to failed login attempts. Brute Force attack protection locks out User or One-Time Recovery passwords upon 10 invalid passwords entered in a row, and crypto-erases the drive if the admin password is entered incorrectly 10 times in a row.
To protect against potential malware on untrusted systems, both Admin and User can set Read-Only mode to write-protect the drive; additionally, the built-in virtual keyboard shields passwords from keyloggers or screen loggers.
Organizations can customize and configure VP50 series drives with a Product ID (PID) for integration with standard Endpoint Management software to meet corporate IT and cybersecurity requirement through Kingston's Customization Program.
Small and Medium Businesses can use the admin role to locally manage their drives, e.g. use Admin to configure or reset employee user or one-time recovery passwords, recover data access on locked drives, and comply with laws and regulations when forensics are required.