Summary: I bought this for storage of financial info and other related files. Very easy to use on a Windows 8 tablet. Was recognized quickly and very easy to set up. Files are stored and retrieved quickly with no problems. Construction is excellent. Great product.
Summary: It has a very wrong system that if anybody steals the pen drive it can be used very easily, because it has a 1 click option to format it once the data is gone it can be used ...it should be like no one else can use it anyhow.
Summary: Its difficult to judge security until its breached, but its generally a good product and fast write speeds as well. However, the password and hint software bundled is clumsy and flawed and displays just a part of the hint question. The company disowned this problem and said they couldnt help me.
Summary: This drive uses a 256 bit hardware encryption to protect your most sensitive data. I use it to store all my usernames and passwords except the password to unlock the drive itself. It has a self destruct mode that will wipe all the data after a set amount of invalid log in attempts.
Excerpt: If you are obsessive about security like me buy this device. It has own internal software on a read only disk which is virus free. I tried to take it of when 2 tries left for submitting the password. And put it on again to test if it will give 10 more tries. It continued from 2. Amazing securty definitely worths every penny.....
Summary: I have had this drive for a few months now. We were required to start using it at work for security. Several of us have had problems with the drive, mainly with it intermittantly not loading properly on Windows machines. I can't really speak to how well it works on a Mac, but a previous reviewer said it didn't work at all. My own drive now does not load at all, and when I contacted the company they were not helpful in the least.
Summary: From blurb above: "DataTraveler 6000 uses elliptic curve cryptography (ECC), which is recommended by the United States National Security Agency (NSA) as part of the NSA Suite B set of cryptographic algorithms." From Kingston literature: "The strength of AES-256 encryption keys is not defined by the encryption algorithm per se, but by the entropy or randomness of the bits composing the keys and by the strength of the public key algorithms used to communicate and protect...
Summary: If you use and transport confidential data, this data stick will give you a lot more peace of mind. It's worked perfectly for me. When first plugged in, the device acts like a CD-ROM, which apparently can't be modified by a rootkit or other nasty piece of software. It has auto-boot or manual-boot software, where you define a password that's pretty strict, must contain 3 of upper, lower, number, and special characters, and be above about 8 characters.