15
OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADAT ALJAWDAH EST is name which stands for innovation in Saudi Arabia's trading and supplying the material and equipment sector. With a number of highly dedicated and qualified staff, SADAT ALJAWDAH provides services to the customers throughout the Kingdom of Saudi Arabia and abroad. To cope up with the local requirements, SADATALJAWDAH located in Dammam, Saudi Arabia. SADAT ALJAWDAH is highly experienced in handling large, medium and small orders with regard to qualified manpower, infrastructure, facilities, vehicles and equipment's. SADAT ALJAWDAH is built and maintained to meet the day to day requirements in the field. With the expertise, know-how and good association with many reputed companies all over the world. SADAT ALJAWDAH POLICY The goal of SADAT ALJAWDAH EST is to meet client's needs accurately, correctly, first time, every time at the right place, and in the required time, also to carry out work which consistently satisfies the requirement of our clients. Our strategy is to focus on our customer satisfaction (in the field of oil and gas petrochemicals, utilities, and instrumentation, communication and information technology) and improvement in business process including development of Human Resource SADAT AL-JAWDAH EST. Availability Fast Responding Best Offer On Time Delivery Best Brands Best Products => => => => => => OUR VALUES

OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

  • Upload
    others

  • View
    18

  • Download
    0

Embed Size (px)

Citation preview

Page 1: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

OUR PROFILE

SADAT ALJAWDAH PROFILE AND ACTIVITIES

SADAT ALJAWDAH EST is name which stands for innovation in Saudi Arabia's trading and supplying the

material and equipment sector.

With a number of highly dedicated and qualified staff, SADAT ALJAWDAH provides services to the customers

throughout the Kingdom of Saudi Arabia and abroad. To cope up with the local requirements, SADATALJAWDAH

located in Dammam, SaudiArabia.

SADAT ALJAWDAH is highly experienced in handling large, medium and small orders with regard to qualified

manpower, infrastructure, facilities, vehicles and equipment's.

SADAT ALJAWDAH is built and maintained to meet the day to day requirements in the field. With the

expertise, know-how and good association with many reputed companies all over the world.

SADAT ALJAWDAH POLICY

The goal of SADAT ALJAWDAH EST is to meet client's

needs accurately, correctly, first time, every time at the right

place, and in the required time, also to carry out work which

consistently satisfies the requirement of our clients.

Our strategy is to focus on our customer satisfaction

(in the field of oil and gas petrochemicals, utilities, and

instrumentation, communication and information

technology) and improvement in business process

including development of Human Resource

SADAT AL-JAWDAH EST.

Availability

Fast Responding

Best Offer

On Time Delivery

Best Brands

Best Products

=>

=>

=>

=>

=>

=>

OUR VALUES

Page 2: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

MISSION

SADAT Al-JAWDAH’S MISSION IS TO

1. Provide best quality, reliable and safe crane and equipment services.

Consistently satisfy the expectations of customers.

Position "AHEL" in the most attractive market segments with sustainable market share.

Continuously improve organizational capabilities.

Empower, motivate, develop and foster an inclusive workforce to be the most preferred employer of theKingdom Satisfy Stakeholders expectations.

2.

3.

4.

5.

Man Power SupplySadat Al-Jawdah Est is providing a full service of man power supply for industrial services and other specialist andtechnically qualified to various clients in Saudi Arabia. We are a company serving the environmental engineering, andconstruction communities throughout the Kingdom of Saudi Arabia, years of leadership in supplying qualified manpower in various field such as, technical, engineering, document controlling, office administration, combined withskilled equipment operators which makes SadatAl-Jawdah Est the reliable choice for all your projects.

Our experience and unique supply of manpower team and equipment capabilities provide solutions to your projectsunique challenges in a timely and cost effective manner. We provides skilled personnel to ensure that your relatedsupport services exceed your expectations.

Our skilled Man Power approach every customer , project, and job site with respect, positive attitude, careful attentionto detail and sense of pride in our work.

Our Products

OIL & GAS

Page 3: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

ITAG

Valves & Oilfield Products GmbH

With over 500 employees, the ITAG Group is an internationally well-known service company and provides a widerange of services for the oil and gas industry and geothermal energy providers. Founded in 1912 by the German oilpioneer Hermann von Rautenkranz, ITAG is one of the most experienced drilling contractors in Europe.Also, ITAG is aglobal oilfield equipment manufacturer with a large state-of-the-art product range. In 2001 the prominent Qatarbusinessman Dr. Jaber A. Al-Marri - under AIPC holding - purchased the company. With his leadership and vision theITAG Group has developed new markets in the MENA region. One example is the new multi-use facility in Doha Qatarwhere ITAG now can offer a range of services to complement the ITAG Celle operations.

Arjay Engineering has been designing and manufacturing process and environmental controls for over 30 years.

Our main facility is located in Toronto. Support facilities are located in Vancouver and Beijing.Arjay is also supported bya network of product representatives throughout NorthAmerica and in various regions of the world.

In addition to our manufactured products, Arjay is able to provide custom design and engineering services and controlpanel assembly.

ARJAY Engineering Ltd.

Page 4: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

ClampOnClampOn is the leading worldwide supplier of topside and subsea non-invasive ultrasonic intelligent sensorsfor particle, PIG, leak, vibration and corrosion-erosion monitoring and spectrum analysis.

"Uncomplicated technology, modular design, easy installation and little or no calibration are keywordsdescribing our range of instruments. This range includes sand monitors, PIG detectors, vibration monitors,leak monitors, condition monitors and corrosion-erosion monitors – all reasonably priced.

The ClampOn Approach

GovanGovan Industries Pty Ltd. is a privately owned Electrical Engineering Company based in Melbourne,Australia. For over40 years, Govan Industries have used most advanced technology to manufacture explosion protection electricalequipment for installation in hazardous areas.

Page 5: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

Taper-Lok CorporationZero Fugitive Emissions

Taper-Lok® pressure-energized connectors are engineered to provide the safest, most reliable seal of any boltedflange connection and offer unequaled design flexibility and engineering advantages.

Taper-Lok® is a connection specialist, providing a small, lighter weight, high integrity sealing technology. The Taper-Lok® technology excels in extreme conditions, such as: high pressure and temperature, cryogenics, and all hard tohold volatiles and low molecular.

IT & COMMUNICATION

Page 6: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

Security Solutions:

BIT9:- At the core of the Bit9

solution is a policy-driven trust

engine in which you specify the

software that you trust to run in

your enterprise; everything else

by default is suspect or denied.

You define the software you trust

using a policy-based approach

that includes trusted publishers,

software distribution systems,

users, updaters, and more. You

also can use the file trust ratings

in the Bit9 Software Reputation

Service to set thresholds if you

allow users to download and

install their own software. These

trust policies drive the

application control and

whitelisting engine in Bit9 that

detects any untrusted software

that enters your environment

and protects you by stopping its

execution.

Istorage : Military Grade 256 AES

Encrypted PIN Operated Flash

drives and Hard disks with Anti

Hacking. Useful for individuals

and corporates who want they

data secured Visit www.istorage-

uk.com

NetSweeper: Net sweeper

solutions are well-suited to

the needs of today's

enterprises. The fastest web

content filtering and access

management solution in the

market that operates 'in-the-

core' of your network

without resulting in latency

and lagging performance

issues. Centralized web-

based administration tools

empower IT Managers to

control Internet access and

activity on a global, group or

per user level while also

delegating access controls to

other named staff. Detailed

reporting on Internet use

and activity to ensure usage

is in line with corporate

acceptable use

policies.Scalable, flexible and

reliable solution that will

integrate with your existing

infrastructure and will

support your business now

and in the future, without

the need for extensive

investment in hardware.

Provide zero-hour network

protection against web-

borne viruses, malware and

phishing threats to ensure

network reliability to

students and teachers.

Advanced web-based

IT SOLUTIONS & DISTRIBUTION

Summary

Our objective is to attain high

level of satisfaction for all the

stake holders namely

- CUSTOMER

- CHANNEL PARTNER &

- VENDOR

Partners deal with a dedicated

point of contact - their ‘Account

Manager’ who is well supported

by teams from different

departments and assists the

customer in every step of the

process.

Why us ?

- Focus on Network Security,

Enterprise Monitoring and

BuRRA technologies

- Knowledge of upcoming and

next generation technologies

- Strong partnerships with

leading product manufacturers

- Unique Value Added

Programs for customer/partner

engagement

On-going Relationships: We @

Page 7: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

administration console,

enabling IT management

complete operational control

over application, including:

policy management,

reporting, administration

access, etc. Ability to better

manage network bandwidth

by controlling access to high

bandwidth resources. For

more info

visit www.netsweeper.com

Monitoring

Solutions:

Plixer International: NetFlow

monitoring solutions for IT

professionals Scrutinizer NetFlow

& sFlow traffic analysis and IPFIX

reporting solution for all types

and versions of flow analysis

including but not limited to:

Cisco Routers and Switches, Cisco

ASA NetFlow Juniper Jflow and

Juniper IPFIX SonicWALL Net

Flow and SonicWALL IPFIX

Checkpoint NetFlow Vyatta

NetFlow Riverbed NetFlow

nBox NetFlow and nBox IPFIX

Adtran NetFlow Enterasys

Netflow Citrix AppFlow

vSphere NetFlow Softflowd

NetFlow Palo Alto Net Flow .

Visit www.plixer.com

NETFORT-Know your network:

LANGuardian captures and

analyzes the traffic flowing

through your network switch,

stores it in a database, and

displays the details in a web

browser. Offering a depth of

insight into network activity that

is unmatched by products costing

ten times as much, LANGuardian

helps network administrators

troubleshoot bandwidth issues

right across the network,

perform network forensics on

past events, investigate activity

on Windows file shares, and keep

track of user activity on the

Internet .Visit www.netfort.com

ZYRION: Zyrion Traverse is a

breakthrough Cloud Monitoring,

Network Performance

Monitoring, Server Monitoring

and Systems Monitoring software

solution, with integrated

Business Service Management

(BSM) functionality. Traverse

provides real-time visibility into

the performance of IT

infrastructure and services, and is

an integrated platform with a

wide range of core, advanced

and innovative features.

Traverse’s innovative Business

Container technology and pre-

integrated IT monitoring

software capabilities enable

organizations to create flexible

and logical service-oriented

monitoring views, and makes the

alignment of infrastructure

technology with business

outcomes a reality. Traverse

facilitates decentralized network

monitoring, server monitoring

and cloud monitoring that is pro-

active and preventive rather than

reactive, giving all employee-

levels the control and

information they require based

on their specific responsibilities

and permissions. Traverse

network performance monitoring

software provides an intuitive

web-based user interface and is a

distributed, scalable, real-time,

and easy-to-manage platform.

www.zyrion.com

SANSENTINEL: Sentinel Navigator

is an agentless and non intrusive

reporting solution based on

native manufacturer API. This

mean that no third-party

software is needed to gather

array configuration information.

Data are correlated into a

relational database (Sentinel

Repository) and pushed to « pre-

defined » Dashboards and

Reports. Client/Server model :

Sentinel Navigator offer an

Page 8: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

universal access to storage

information. Centralized

repository : All configuration

information are stored/updated

into a single point. Webstart

client : Any client on the network

can access Repository without

software installation.

www.sansentinel.com

Back Up,Restore,Recovery And

Archival Solutions:

Cryoserver :Email Archiving

Software Cryoserver a

permanent, email archiving

solution,Cryoserver allows your

organization to collect, secure

and catalog every e-mail and

instant message. The archive can

be searched rapidly and easily;

emails and attachments can be

retrieved in the same way they

were sent. Securely stored and

never removed, the Cryoserver

data permits forensic discovery

of a business’s whole email

history. The records are available

for any need in any legal

procedure – dispute resolutions,

HR investigations, subject access

requests, regulatory compliance,

or data protection. A sealed

email archiving appliance or

software package, Cryoserver

provides a thorough, audited,

tamper-evident repository of

emails sent to, from and within a

company. Cryoserver combines a

search-engine like investigatory

capacity with the ability to

preserve electronic

communications in a way similar

to a "black box" flight

recorder. Visit

www.cryoserver.com

Unitrends :Unitrends, the #1 all-

in-one backup appliance for

virtual, physical and cloud, is a

leader in enterpriselevel data

protection. Building on over 20

years of industry firsts, Unitrends

continues to lead the market.

Unitrends is used by IT

professionals for backup of their

virtual and physical servers and

for performing disaster recovery

to remote locations or to private

or public cloud. Unitrends not

only continues to set the

standard in virtual and physical

server data protection, but its

US-based support team boasts a

99% customer satisfaction rate,

further reinforcing its reputation

for quality Appliance Family

Finally: everything you need for

backup and disaster recovery, in

one appliance. No need to stitch

together hardware and software

solutions. No need for specific

products to protect your

applications or your virtual

infrastructure. Unitrends

Recovery Series provide one

solution, with one easy-to-use

interface. .10 sizes available: Use

our Appliance Selector to choose

the appliance or set of appliances

that fit your environment.

Appliances start at 1TB capacity

and go up to 31TB

capacity .Complete Unitrends

feature set: Every Recovery

appliance is equipped with our

entire set of features, from

Incremental Forever to No-Limits

Licensing .Fit your network:

Optional LVD/SAS SCI, 10GB

Ethernet, or 8GB Fibre

Channel Visit www.unitrends.com

Page 9: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation
Page 10: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation
Page 11: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

SecureUSB 3.0

Portable Drive

“With real-time AES hardware encryption, software free design and a super speed

USB 3.0 connection, you can secure your data faster than ever

before.”

[email protected]

iStorage Limited, Research House, Fraser Road, Greenford, Middlesex. UB6 7AQ, EnglandTel: +44 (0) 20 8537-3435 – Fax: +44 (0) 20 8537-3438

®

Looking for an effortless way to secure your data while taking advantage of the fastest USB 3.0 speeds? Look no further than the diskAshur, the latest and fastest of iStorage’s secure drive line. With the same easy-to-use keypad design and software free setup, the diskAshur enables you to access the drive with your own unique pin but now at data transfer speeds of up to 5Gbps.

Military Grade FIPS PUB 197 Validated Encryption: Using your choice of 128-bit or 256-bit AES-XTS hardware encryption, the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.

Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the iStorage diskAshur provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool.

Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface, you can now access your files faster than ever before. The diskAshur is also backwards compatible with USB 2.0 and 1.1 ports.

Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After six incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur.

Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing attacks” aimed at accessing the drive by studying the behavior and infiltrating the diskAshur’s electronics.

Drive Reset Feature: The diskAshur also employs a useful drive reset feature, which can be implemented with a unique command. This clears all PINs and data, and creates a new randomly generated encryption key, enabling the drive to be reset and redeployed as many times as needed.

Auto-lock Feature: The unattended diskAshur can be configured to lock after a pre-determined amount of time of your choosing. Ideal for protecting your data when you’re away from your desk.

Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys.

Data at Rest Protection: All data, PINs, and encryption keys are always encrypted while at rest.

Compact, Rugged Design: Perfect for taking your data on the road, the diskAshur‘s low powered design is perfect for using with notebooks and taking

your data on the road. Perfectly pocketable, the diskAshur’s compact, robust design features a 16-point omni-directional shock mounting system and rubberised paint, protecting the drive from drops and knocks. The convenient integrated USB 3.0 cable eliminates the need to carry around cords with you and allows you to be connected at the flick of a fingertip.

Page 12: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

Why choose diskAshur?

Did you know that millions of external data storage devices are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non-encrypted USB hard drive? Your data would be at the mercy of anyone who stumbles across it.

The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB hard drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.

Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskAshur can protect you against all of this.

All trademarks and brand names are the property of their respective owners

RoHS

Works with

Technical Specifications Capacity 250GB, 320GB, 500GB, 640GB, 750GB,1TB Interface USB 3.0 - Up to 5Gbps Dimensions 19 mm x 84.5 mm x 120 mm Buffer size 8MB Approvals FCC CE, RoHS RPM 5400 Hardware

USB 3.0 super speed - compatibleAlso compatible with USB 2.0 and 1.1

Operating System compatibility Windows, MAC OS, LinuxHardware Data Encryption AES XTS Encryption Keys 128-bit or 256-bit AES iStorage Part Numbers IS-DG3-256-XXXX | IS-DG3-128-XXXX

[email protected]

iStorage Limited, Research House, Fraser Road, Greenford, Middlesex. UB6 7AQ, EnglandTel: +44 (0) 20 8537-3435 – Fax: +44 (0) 20 8537-3438 – Email: [email protected] – web: www.istorage-uk.com

Features at a glance:

• Military Grade FIPS PUB 197 Validated Encryption

• PIN activated 6-16 digits - Alphanumeric keypad use a memorable number or word for your PIN

• Hardware Encrypted Drive - Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from it’s casing

• Super Speed USB 3.0 Connection

• Administrator Password Feature - Ideal for IT departments looking to secure their mobile users, by allowing setup of administrator access to the drive before being distributed to their user(s)

• Brute Force Self Destruct Feature

• Auto Lock Feature

• Drive Reset Feature

• Variable Time Circuit Technology

• OS and Platform Independent – Compatible with Windows, Mac, Linux and embedded systems

• No software or drivers required

• Wear Resistant Key Pad

• Brute Force Hack Defence Mechanism

• Customisation service available – Contact iStorage for further information

• 1-Year warranty

Power Supply Bus Powered

®

(X = Capacity)

Page 13: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

Looking for a fast and effortless way to secure your data? The iStorage diskAshur DT is the ultimate desktop hard drive and secure storage system. Sporting a super fast USB 3.0 interface, you can access your data faster than ever before. With an easy-to-use keypad design and software free setup, the iStorage diskAshur DT enables you to access the drive with your own unique pin.

Military Grade FIPS PUB 197 Validated Encryption: Using AES-256-bit hardware encryption, the iStorage diskAshur seamlessly encrypts all data on the drive in real-time, keeping your data safe even if the hard drive is removed from its enclosure.

Software Free Design: With no software installation required for setup or operation and the ability to run on any platform, the iStorage diskAshur DT provides stress free deployment in corporate environments. Its Administrator Feature allows enrollment of up to five unique user ID’s and one administrator, making it a useful business collaboration tool.

Super fast USB 3.0 Connection: Data transfer speeds up to 10X faster than USB 2.0: With a super speed USB 3.0 interface, you can now access your files faster than ever before. The iStorage diskAshur DT is also backwards compatible with USB 2.0 and 1.1 ports.

Brute Force Self Destruct Feature: The iStorage diskAshur uses a three pronged approach to protect against a Brute Force attack. The first step is to deny access to the drive until the drive can verify the user PIN. After several incorrect attempts the drive will lock itself, requiring the drive to be plugged in again to input a PIN. This feature blocks automated attempts to enter PIN numbers. Lastly, after a predetermined number of failed PIN entries, the diskAshur assumes it is being attacked and will destroy the encryption key and lock itself, rendering the data useless and requiring a total reset to redeploy the diskAshur.

Variable Timing Circuit Technology: Protection against hacker attempts doesn’t stop with Brute Force. Incorporated into the iStorage diskAshur’s electronics is iStorage’s Variable Time Circuit (VTC) technology, working to thwart “timing attacks” aimed at accessing the drive by studying the behavior and infiltrating the diskAshur’s electronics.

Sealed from Physical Attacks by Tough Epoxy Coating: In addition to

encrypting all of the PINs, data and the encryption key itself, the iStorage diskAshur DT adds another barrier between a between your data and a hacker. The encryption chip and circuitry of the iStorage diskAshur DT

are completely protected by a super tough epoxy compound, which is virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks.

Wear Resistant Key Pad: Designed with protection in mind, the entire iStorage diskAshur family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys.

Data at Rest Protection: All data, PINs, and encryption keys are always encrypted while at rest.

Auto Lock feature: Set the unattended drive to lock after a

pre-determined amount of time.

High quality aluminum, heat dissipating enclosure

[email protected]

iStorage Limited, Research House, Fraser Road, Greenford, Middlesex. UB6 7AQ, EnglandTel: +44 (0) 20 8537-3435 – Fax: +44 (0) 20 8537-3438

SecureUSB 3.0

Desktop Drive

“The world’s first PIN operated portable

hard drive with built-in hardware encryption and

capacities of up to 3TB”

Page 14: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

Why choose diskAshur?

Did you know that millions of external data storage devices are lost or stolen every year and this figure is rising. Have you ever considered the impact of losing your non-encrypted USB hard drive? Your data would be at the mercy of anyone who stumbles across it.

The Information Commissioner’s Office (ICO) now has the power to fine businesses and government bodies up to £500,000 for serious breaches of the Data Protection Act. This includes the loss of an unencrypted USB hard drive that contains client data. The ICO has been very clear in advising businesses and government bodies to encrypt all data that workers access, they also recognise that data which is encrypted and lost or stolen is not vulnerable to compromise.

Loss of confidential data can have a devastating effect on both businesses and consumers. It could lead to a hefty fine, the downfall of a business, embarrassment, job losses and adverse media attention. The iStorage diskAshur can protect you against all of this.

All trademarks and brand names are the property of their respective owners

RoHS

Works with

Technical Specifications Capacity 1TB, 2TB and 3TB Interface USB 3.0 - Up to 5Gbps Dimensions 114.3 mm x 182.88 mm x 38.1 mm Buffer size 8MB Approvals FC CE, RoHS RPM 7200 Hardware

USB 3.0 super speed - compatibleAlso compatible with USB 2.0 and 1.1

Operating System compatibility Windows, MAC OS, LinuxHardware Data Encryption AES XTS Encryption Keys 256-bit Hardware iStorage Part Numbers ISA-DA-256-XXXX (X = Capacity)

[email protected]

PRELIMINARY SPECIFICATION SHEETiStorage Limited, Research House, Fraser Road, Greenford, Middlesex. UB6 7AQ, EnglandTel: +44 (0) 20 8537-3435 – Fax: +44 (0) 20 8537-3438 – Email: [email protected] – web: www.istorage-uk.com

Features at a glance:

• Military Grade FIPS PUB 197 Validated Encryption

• PIN activated 6-16 digits - Alphanumeric keypad use a memorable number or word for your PIN

• Hardware Encrypted Drive - Real-time 256-bit AES encryption seamlessly encrypts all data on the drive, protecting the drive even if it is removed from it’s casing

• Super Speed USB 3.0 Connection

• Administrator Password feature - Ideal for IT departments looking to secure their mobile users, by allowing setup of administrator access to the drive before being distributed to their user(s)

• Sealed from Physical Attacks by Tough Epoxy Coating

• Brute Force Self Destruct Feature

• Auto Lock Feature

• Variable Time Circuit Technology

• OS and platform independent – compatible with Windows, Mac, Linux and embedded systems

• No software or drivers required

• Wear Resistant Key Pad

• Brute Force Hack Defence Mechanism

• Customisation service available – contact iStorage for further information

• 3-Year warranty

Power Supply 12V AC Adapter

Page 15: OUR PROFILE - Sadat Aljawdahaljawdah.com.sa/pdf/aljawdah.pdf · 2015-02-19 · OUR PROFILE SADAT ALJAWDAH PROFILE AND ACTIVITIES SADATALJAWDAH EST is name which stands for innovation

SADAT AL-JAWDAH EST.

Always at your service