diskG Logo


• USB 2.0 Portable Hard Drive
• Capacities up to 1TB*
• FIPS PUB 197 certified
• AES 128-bit or 256-bit hardware encryption – no software required
• CESG CCTM Certified
• OS & Platform independent

What is diskG?
Portable encrypted USB 2.0 Hard Drive with real-time AES hardware encryption, software free design and versatile to work on any operating/embedded systems.
A hardware encrypted USB 2.0 portable hard drive with an easy-to-use keypad and software free setup. The versatile iStorage diskG enables you to securely access the drive with your own unique PIN on any operating system including embedded systems and available with capacities up to 1TB.

Why choose diskG?
Did you know that millions of flash drives are lost or stolen every year and this figure is rising? Have you ever considered the impact of losing your non-encrypted USB flash drive? Your data would be at the mercy of anyone who stumbles across it.
Information Commissioner's Office (ICO)
The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB flash drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.
General Data Protection Regulation (GDPR)
The European Union will soon have the power to fine companies €20 million or 4% of their annual turnover if they are found to be in breach of the new General Data Protection Regulation (GDPR). The forthcoming legislation compels anyone who holds data on EU Citizens to implement adequate security measures to protect data from loss or theft.
Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskG can protect you against all of this.

Military strength Hardware Encryption
The encryption chipset incorporated within the diskG encrypts all data using 128-bit or 256-bit AES Hardware Encryption. The diskG is the only USB hard drive to be awarded the CESG CCTM government accreditation. The diskG also utilises FIPS PUB 197 validated Encryption Algorithm. The recommended standard for symmetric encryption is AES (advanced Encryption Standard). The Committee of National Security Systems (CNSS) rates the AES algorithm as acceptable for encrypting top secret data on their AES policy fact sheet, stating “The design and strength of all key lengths of the AES algorithm (i.e. 128,192 and 256) are sufficient to protect classified information up to the SECRET level. TOP Secret information will require use of either the 192 or 256 key lengths.”

Brute Force Hack Defence Mechanism
The diskG uses a three pronged approach to protect against a Brute Force Attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be disconnected and then reconnected. This feature blocks automated attempts to enter PIN numbers. Lastly, after one hundred incorrect PIN attempts, the diskG assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset and reformat to redeploy the diskG.

VTC Technology
The diskG also incorporates Variable Time Circuit (VTC) technology, which thwarts “timing attacks” aimed at accessing the drive by studying the behaviour and infiltrating diskG’s electronics.

What is the difference between software and hardware encryption?
Software encryption:

• Complex passwords can be cracked easily and quickly with a Brute Force Attack
• Simple password cracking software is readily available on the internet, often free of charge
• Software encryption is vulnerable to key loggers – where every key pressed is logged in either a software or hardware key logger
• Software encryption can be corrupted by viruses
• Software encryption is much slower when compared to hardware encryption
• Software encryption needs to be installed on each computer that the external storage device is used on

Hardware encryption:
• The diskG cannot be brute force attacked
• The diskG is not vulnerable to keyloggers as the PIN is entered on the unit rather than the keyboard
• The diskG is not vulnerable to malware or viruses
• Encryption is performed in real-time thus there is no speed degradation
• No software or drivers are required

* Previously known as diskGenie


 diskG 1diskG 2diskG 3diskG 4