Spyrus

Founded in 1992, SPYRUS, Inc. develops, manufactures, and markets hardware-based encryption, authentication, and digital content security products. Our focus is on government, financial, and health care enterprises, which are regulated by legislation such as the Gramm-Leach-Bliley Act, Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley Act to implement strong data security protections.

Our primary products-Hydra Privacy Card® Series II USB encryption and storage devices, Talisman/DS® Data Security Suite encryption systems, LYNKS™ Hardware Security Modules, Rosetta Series II Smart Card and USB security devices, and identity management products (Signal Identity Manager™ and SPYRUS PKI)-exceed most regulatory requirements for high-assurance security.

We implement the strongest cryptographic algorithms commercially available, designed to exceed the highest standards of security certification such as Common Criteria, FIPS 140-2 Levels 2 through Level 4, HSPD-12, and FIPS 201. Government entities, corporations, systems integrators, and resellers worldwide have deployed SPYRUS solutions.

SPYRUS is a privately held company headquartered in San Jose, California, with offices in Canada and Australia.

1. Hydra Privacy Card® Series II (Hydra PC™)

Hydra PC USB encryption devices implement patented hardware-based encryption that exceeds the Suite B cryptographic algorithm standards. Hydra PC devices are available for purchase on the US DoD ESI/GSA SmartBUY Data at Rest BPA and other government contracts.

1.1. Hydra Privacy Card (Hydra PC) Series II Digital Attaché

Secure Data Storage, Transfer and Sharing
Digital Attaché is designed to secure information, whether it is at rest or in transit from one location to another, and to allow that information to be securely shared in a controlled manner. Its unique operation guarantees information integrity and nonrepudiation. Files encrypted by Digital Attaché can be shared with other authorized users and stored anywhere, including the computer hard drive, Web servers, and even in the cloud.
Brochure >>

1.2. Hydra Privacy Card (Hydra PC) Series II Personal Encryption Device

Secure Data Storage and Transfer
Hydra Privacy Card ® Personal Encryption Device was designed to securely store information and preserve integrity and nonrepudiation while data is moved from one location to another. Hydra PC™ Personal Encryption Device is the first and only commercially available USB flash drive approved by the U.S. Department of Defense to provide confidentiality for tactical data at the SECRET level and below, when operated in accordance with the prescribed security doctrine.
Brochure >>

2. Secure Pocket Drive

Secure Pocket Drive (SPD) from SPYRUS securely boots Windows Embedded Standard 7 optimized for performance and security or a Linux environment containing your applications and data files. When you're done, remove the drive and leave nothing behind.
Brochure >>

3. PocketVault Encrypting USB Drives

Like a Bank Vault in Your Pocket
PocketVault encrypting USB drives deliver high-security, use-anywhere USB encryption built on trusted Secured By SPYRUS™ technology—the same cryptographic base used by the US Government to protect Data at Rest. The cryptographic components in every SPYRUS encryption device are designed, engineered, and manufactured in the United States.

3.1. PocketVault P-3X

PocketVault P-3X combines USB 3.0 performance and solid state drive (SSD) memory for ultra-fast performance. Designed to meet FIPS 140-2 Level 2 and Level 3 specifications.
Brochure >>

3.2. PocketVault P-384

PocketVault P-384 is a USB 2.0 drive that stores your data in an encrypted partition on its internal microSD card. P-384 is a USCYBERCOM-ready and FIPS 140-2 Level 3 validated USB flash drive.
Brochure >>

4. PocketVault SD

For Windows Computers
PocketVault SD is a secure storage system offering both encrypted storage and individual file encryption capability. PocketVault SD combines PocketVault encryption software with a Rosetta SD smartcard services device.
Brochure >>

5. Rosetta® Series II Smart Cards and USB Security Devices

The SPYRUS Rosetta Series II smart card and USB security devices and smart card readers provide strong encryption with authentication, nonrepudiation, and auditing capabilities in a compact form factor. Now available with enhanced algorithm support, the Rosetta Series II security device provides the strongest, most economical, future-proof protection available anywhere for sensitive data.
Brochure >>

5.1. Rosetta Series II Smart Card

The Rosetta Series II Smart Card is an ISO 7816-compliant public key, multi-application smart card. It features high-assurance security techniques to properly separate applications from crypto data, public key cryptographic techniques for industry-standard sign/verify operations, and advanced operating system and chip features.

5.2. Rosetta Series II USB

Rosetta Series II USB is a reader-less smart card that can store authentication information, data, digital identity keys, and certificates. Rosetta USB has plug-and-play capability and moves with the user, providing a secure and encrypted vault for security information such as private keys, passwords and biometric templates.

6. Rosetta SDHC™ Card

Smart Card and Storage in a Micro-Sized Device
The unique design of Rosetta SD combines secure digital (SD) technology with public key infrastructure (PKI) technology in a standard SD form factor. Rosetta SD provides secure flash storage and implements the strongest cryptographic algorithms and key lengths commercially available.

Rosetta SD is ideally suited for both custom and mass-market products that require small size, low power, and high security. It can be released and exported under license exception ENC. It is designed for use with classified applications as a non-CCI (Controlled Cryptographic Item) device. Rosetta SD/microSD uses the FIPS 140-2 Level 3 validated SPYRUS Cryptographic Operating System (SPYCOS®) crypto core, the same as those embedded in the Rosetta Series II Smart Card and USB security devices and the Hydra Privacy Card® Series II USB encryption drives.
Brochure >>

7. Rosetta Micro™ Series II

Cryptographic Security Package for Embedded Applications
Uniquely designed for embedded cryptographic applications, the Rosetta Micro Series II supports the strongest commercially available cryptographic algorithms, including elliptic curve cryptography with AES, SHA-2 algorithms, and EC Diffie-Hellman and ECMQV key establishment. Legacy algorithms such as RSA and SHA-1 are also fully supported.
Brochure >>

8. LYNKS Series II Hardware Security Module

The LYNKS Series II Hardware Security Module (HSM) offers a high-security solution for client, server and embedded security applications. The LYNKS Series II HSM, with upgraded flash memory and FPGA capabilities, supports new, stronger and faster cryptographic algorithms, including elliptic curve cryptography with EC-DH and ECMQV key establishment, AES, and the SHA-2 algorithms that exceed the U.S. Government's Suite B standard. The stackable LYNKS Series II USB HSM provides the strongest and most economical future-proof protection for sensitive data.

The LYNKS Series II HSM provides security-critical capabilities for PKI-based identity management, data security, data integrity, and nonrepudiation. With SPYRUS En-Sign™ security device management software, the LYNKS HSM provides support for standard cryptographic application interfaces such as the Microsoft® Windows® Cryptographic API and the PKCS #11 interface. Custom application integration is enabled through the SPYRUS developer toolkits.
Brochure >>

9. Identity Management and PKI Products

SPYRUS offers a variety of ID management and public key infrastructure (PKI) products tailored to your organization's requirements. All solutions include support for the latest cryptographic algorithms.

9.1. Signal Identity Manager

Signal Identity Manager provides a complete range of identity management, security policy, and security device management functions for enterprises of all sizes. It is fully integrated with Microsoft Windows Server 2003 Certificate Services and Active Directory.
Brochure >>

9.2. SPYRUS PKI System

The SPYRUS PKI System is a configurable, high-assurance digital certificate system for the rapid deployment of electronic business security solutions. Trust in electronic business comes from the proper use of digital certificates within a policy framework that is understood and explicitly invoked by all parties in digital transactions. The SPYRUS PKI System uniquely provides this trust through its risk mitigation "Chain of Trust" architecture, infrastructure and transaction auditability, independent third party security certifications and its customer-specific configurable policy framework for business rule implementation.

10. Smart Card Readers

10.1. PAR MiniUSB Reader

The PAR MiniUSB reader is a compact, high-speed reader for all smart cards, including Subscriber Identity Module (SIM) cards, Personal Identification Verification (PIV) cards, and Common Access Cards (CAC).
Brochure >>

10.2. Personal Access Reader 2

The PAR 2 is one of the most versatile and cost-effective smart card readers available. Compatible with most standard smart cards, including the U. S. Department of Defense Common Access Card (CAC) and the Rosetta Smart Card Series II, it is a practical choice for both small organizations and enterprises.
Brochure >>

11. SPYRUS Crypto Toolbox

The SPYRUS Crypto Toolbox makes it easy to develop cryptographic applications for SPYRUS security devices, using SPYRUS Cryptographic Service Providers (CSPs) and Microsoft® Visual Studio® integrated development environments.
Brochure >>

Crypto Toolbox Components:

  • CSP build environment (headers & library files)
  • En-Sign middleware
  • Five sample source code projects
  • CSP Command/Device test utility
  • One LYNKS Series II HSM
  • Two Rosetta Series II Smart Cards (reader not included)

12. SPYRUS Enterprise Management System (SEMS)

Manage USB Encryption Devices Across Your Domain
The SPYRUS Enterprise Management System (SEMS) enables enterprise-wide management of USB encryption devices. From a central management point, administrators can remotely set and enforce security policies, monitor device transactions, disable and enable logon capability, and destroy the encryption keys and data on devices. Users can initialize and enable devices from any client computer connected to the SEMS domain.
Brochure >>