Storage System Solutions

Join our Community
Section 508 support
RoHS

Home > Products > Encryption / CipherChain > Cipher Z drive enclosure

Drive enclosure with eSATA and USB 3.0        FIPS 140-2 certified Crypto Module

Integrated with the CipherChain-ES, the Z drive enclosure turns any 3.5" or 2.5" hard drive into an external eSATA hard drive with bullet proof AES 256-bit encryption. By attaching an optional USB 3.0 - eSATA adapter, the Cipher Z drive enclosure can also connect to the latest USB 3.0 port or the ubiquitous USB 2.0 port commonly found on many computer systems.

Connecting Cipher Z Drive enclosure to Desktop or Notebook via eSATA or USB 3.0


Simple hard drive installation

Simple to use
Similar to all other Addonics encryption products, the Cipher Z enclosure is a pure hardware solution. This means that there is no software to run, no driver to install and no password to remember. There is very little user training required to use the Cipher Z drive enclosure. All the user needs to do is to insert the correct Cipher key at the back of the drive enclosure before turning on the power. The Cipher Z drive enclosure can be operated under any operating system. It is an ideal security solution for organization with heterogeneous computing environment and legacy systems.

Security
The Cipher Z drive enclosure is equipped with the CipherChain ES which is a full disk encryption solution. This means that the boot sector, partition table and all the information in the drive are encrypted. If the Cipher Z drive enclosure is stolen and the SATA drive inside is removed from the enclosure to connect to a computer, the drive will appear as a brand new drive with no trace of any data. The AES 256-bit encryption provided by the CipherChain ES is considered as the highest level of encryption standard, secure enough to protect classified information designated as “Top Secret”.

Performance
Inside the Cipher Z drive enclosure, data stored in the hard drive is encrypted and decrypted on the fly using a FIPS certified AES 256-bit crypto engine. Unlike software encryption product which depends on the system CPU to encrypt and decrypt the data, the encryption in the Cipher Z drive enclosure has no impact to CPU utilization.. This leaves the system CPU to perform all its computing task at normal speed. There is also no measurable impact to the performance on the hard drive.

Cipher key
The AES 256-bit Cipher key used for the encryption/decryption in the Cipher Z drive enclosure is the same Cipher key as used in the Addonics Diamond Cipher drive kit, Ruby Cipher drive kit, CipherChain and CipherChain-ES. As a result, you can share the same encryption key to operate on the storage device that has been encrypted by either the CipherChain, Diamond Cipher or Ruby Cipher drive kit. You may also order Cipher keys with the same key codes when you order multiple Cipher Z drive enclosures or Cipher keys. You may also re-programmed the Cipher keys to other codes using the optional key management system or sending the keys to Addonics for the re-programming service at no charge.


Key Features

  • Install any SATA I / II / III 3.5" or 2.5" hard drive / SSD
  • FIPS 140-2 certified Crypto Module.
  • Full disk encryption. No traceable data when the encrypted drive is connected to any system.
  • Simple to use - no software to run or any password to remember
  • No training required. Encryption / Decryption via a hardware key  , just like using a regular key to open a door.
  • High speed eSATA connection - up to 150 MB/sec
  • Connect to USB 3.0 or 2.0 port using optional USB 3.0 - eSATA adapter (model: ADU3ESA)
  • Install any IDE hard drives with optional Addonics IDE - SATA converter.
  • OS independent - can be used on any system

Note on Cipher key code
Each Cipher Z drive enclosure comes with a pair of Cipher keys have a unique key code.  When ordering multiple Cipher Z drive enclosure and you can request to have all the keys be set to the same key code by leaving instructions at the final checkout when placing the order at our online store.  Customers may also e-mail the instructions with reference to the sales order number after final checkout.  When ordering from an Addonics reseller or distributor, be sure to let the reseller know how you want the keys to be coded when placing the order.  Keys can be sent back to Addonics at any time if re-coding is desired. There is no charge for re-coding keys, the only charge is the return shipping of the newly re-coded keys.

Model and Pricing

Model
Description and Package Content
Click shopping cart to check price and order online
ZESAES256

Cipher Z enclosure with AES 256-bit encryption, eSATA connection

Package content:
Cipher Z enclosure, a pair of AES 256-bit cipher keys, 110/220V power adapter, 3-foot eSATA cable

Cart

ZSAES256EU

Cipher Z enclosure with AES 256-bit encryption, eSATA / USB 3.0 connection

Package content:
Cipher Z enclosure, a pair of AES 256-bit cipher keys, 110/220V power adapter, 3-foot eSATA cable, USB 3.0 to eSATA adapter

Cart

 

Accessories

Model
Description
Click shopping cart to check price and order online
CKEYEX6
Cipher key socket extension cable Cart
AAENKEY256
Blank AES 256-bit Cipher key Cart



Specifications

  • Onboard AES 256-bit crypto engine
  • SATA I / II / III compliant
  • Connectors on back of unit:
    • eSATA
    • Cipher key socket
    • mini DIN 6 power input jack
  • LEDs:
    • in the front: green for power
    • in the rear - green for presence of Cipher code, yellow for drive activity
  • RESET at the back: To clear cipher key code and reset the CipherChain. This also remove the drive icon when the storage device is removed from the Cipher Z enclosure connecting to hot swappable eSATA port.
  • Maximum throughput - 150 MB/sec
  • Dimension: 10.16 x 6.61 x 2.4 in (258 x 168 x 60 mm)
  • Weight: 2.27lb (1029 grams)
  • Operating temperature and humidity: 0 °C to + 70 °C, 5% - 95% (non condensing)
  • Storage temperature and humidity: -40 °C to + 85 °C, 5% - 90% humidity

There is no back door for the CipherChain encrypted hard drive if the Cipher key is lost or stolen. To ensure there is a spare key, every CipherChain kit comes with one pair of Cipher keys. One of these keys should be kept in a safe and secure location and can be sent back to Addonics for duplicating additional keys. If you are down to the last key, be sure to make a back up of all the data stored inside your encrypted hard drive prior to sending the last key to Addonics. Addonics is not responsible for the key lost in the mail or the retrieval of the data inside the encrypted hard drive.

Cipher Key management system

For organization with large deployment, you may consider managing your own keys by investing into a Addonics Cipher key duplicating system.

 

All specifications are subject to change without notice. All other products are trademarks of their respective owners.







Printable Version
 
Cipher Z-Drive Enclosure