Lacie Rugged Safe User Manual - Page 5

Introduction, Quick Links - review

Page 5 highlights

LaCie rugged SAFE • Design by Neil Poulton User Manual Introduction page 5 1. Introduction Thank you for purchasing the LaCie Rugged Safe. By simply connecting the drive to your computer and walking through a quick and easy software setup, you can ensure that your data is secure from unauthorized users. The LaCie Rugged Safe performs just like a standard external hard drive, but keeps your data secure with a technology known as biometry. This emerging field is devoted to individual identification using biological traits such as fingerprints or voice recognition. Fingerprint scanning, which is the technology used by the Rugged Safe, is one of the most common biometric systems used today. By limiting access via unique fingerprinting, you can keep the data stored on your Rugged Safe secure. LaCie Safe Manager is an intuitive program that easily manages fingerprint recognition and password protection. A software wizard guides the administrator of the LaCie Rugged Safe through the installation process. The LaCie Rugged Safe also safeguards your data from the rigors of daily living. Shock absorbers mounted inside the casing cushion the drive from accidental impacts and an external bumper insulates the attractive exterior from abrasions. Rugged Safe Levels of Security ✦✦ Level 1 Biometric Access: Only authorized users can access the data. ✦✦ Level 2 AES (Advanced Encryption Standard): The Advanced Encryption Standard (AES) is used by the US government and worldwide. The implementation of AES in products intended to protect national security systems and/or information can be reviewed and certified by the NSA prior to their acquisition and use. ✦✦ Level 3 Password Authentication: an administrator creates a password to manage and configure the device. Quick Links Click a topic: ✦✦ Connecting Your LaCie Rugged Safe ✦✦ Setting Up Your LaCie Rugged Safe ✦✦ Using Your LaCie Rugged Safe

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52

LaCie
rugged
SAFE
• D
ESIGN
BY
N
EIL
P
OULTON
Introduction
User Manual
page 5
1. Introduction
Thank you for purchasing the LaCie Rugged Safe. By simply con-
necting the drive to your computer and walking through a quick and
easy software setup, you can ensure that your data is secure from
unauthorized users.
The LaCie Rugged Safe performs just like a standard external hard
drive, but keeps your data secure with a technology known as biom-
etry. This emerging field is devoted to individual identification using
biological traits such as fingerprints or voice recognition. Fingerprint
scanning, which is the technology used by the Rugged Safe, is one
of the most common biometric systems used today. By limiting ac-
cess via unique fingerprinting, you can keep the data stored on your
Rugged Safe secure.
LaCie Safe Manager is an intuitive program that easily manages
fingerprint recognition and password protection. A software wizard
guides the administrator of the LaCie Rugged Safe through the in-
stallation process.
The LaCie Rugged Safe also safeguards your data from the rigors of
daily living. Shock absorbers mounted inside the casing cushion the
drive from accidental impacts and an external bumper insulates the
attractive exterior from abrasions.
Click a topic:
Connecting Your LaCie Rugged Safe
Setting Up Your LaCie Rugged Safe
Using Your LaCie Rugged Safe
Rugged Safe Levels of Security
Level 1
Biometric Access: Only authorized users can
access the data.
Level 2
AES (Advanced Encryption Standard): The
Advanced Encryption Standard (AES) is used by the
US government and worldwide. The implementation
of AES in products intended to protect national secu-
rity systems and/or information can be reviewed and
certified by the NSA prior to their acquisition and use.
Level 3
Password Authentication: an administrator
creates a password to manage and configure the de-
vice.
Quick Links