Secure Storage

SPYRUS Secure Storage devices offered convenient and cost-effective storage solutions for on-the-go users with a paramount focus on robust data protection and containment for confidential corporate information.

Disclaimer: This is an archive of Spyrus Inc.’s legacy products. Secure Storage devices are no longer available; these resources are provided for informational purposes only.

About Spyrus

Spyrus specializes in comprehensive cybersecurity solutions, providing businesses with everything from in-depth audits and continuous monitoring to proactive penetration testing and rapid ransomware recovery. Our around-the-clock SOC services and targeted training programs empower your team to defend against and quickly respond to cyber threats, ensuring your operations remain secure and resilient.

About Product

The product line consisted of:

  • P-3X (USB 3.0, SSD): Secure USB encryption and authentication
  • Rosetta TrustedFlash (microSDHC, flash): Secure microSD encryption and authentication.

Key Security Features (Across Both Products)

  • Hardware AES 256-bit Encryption: Top-level hardware-based encryption for maximum data protection.
  • FIPS 140-2 Level 3 Validation: Assurance of meeting rigorous security standards.
  • Built-in PKI Smart Card: Enabled multi-factor authentication (MFA) and public key enabled (PKE) applications for enhanced security.
  • Suite B Military-Grade Security: Designed to meet the same security requirements used by the US Government to protect sensitive and classified data.
  • Secure by Design: The entire architecture prioritizes security at its core.
  • SEMS Device Management Support (P-3X): Option for centralized enterprise management for P-3X (USB) models using the SPYRUS Enterprise Management System.

SPYRUS Enterprise Management System (SEMS):

SEMS provided significant security and productivity benefits for organizations deploying P-3X secure storage devices:

  • Remote management: Ability to remotely disable/enable, destroy, reset passwords, and enforce policies.
  • Expiration Policy: Set expiration dates for devices.
  • File Auditing: Track files transferred to and from devices.
  • Scalability: Support for deployments ranging from small-scale to tens of thousands of devices.

Our Services

We safeguard your systems and data so you can focus on your mission. We have security services for the following:

Contact Us

Reach out to us to strengthen your cybersecurity defenses. Our team is ready to assist with audits, penetration testing, and customized security solutions. Get in touch for a free consultation.

The Spyrus Security Insights Blog

Stay ahead of evolving cyber threats. Explore our blog for expert insights, best practices, and the latest news on cybersecurity trends affecting your business.