top of page
military.png

Military & Defense

Military Laptop & Tablet / Aerospac. / Armored Vehicle

Application Scenario

Application Scenario

Twenty-First century combat happens not only on the physical battleground but also command center, ground-control station or even behind a screen. The old fashion of spycraft has been replaced by information, electronic, and cyber warfare. Therefore, one of the most important strategies is to decide how to protect all the critical data from data theft and cyber hackers with the latest SSD solutions.

Challenges and Requirements

  1. Consumer SSDs cannot survive the extreme environment conditions (ex. Wide temperature, Humidity, Extreme Shock/ Vibrations.)

  2. Consumer SSDs do not have extra security protections against sophisticated hackers.

  3. Once the normal SSD got stolen, it will leave important data at high-risks.

Challenges

Solutions

Destory Erase.png

Destroy Erase

Military Erase

  • Destroy Erase: Erase mapping table, all user data, and firmware

  • Military Erase: Depending on user’s Military erase SPEC

MIL-STD.png

MIL-STD-810G

MIL-STD-810G is a US military specification that guarantees a level of durability for a piece of technology. 

Wide Temperature.png

Wide Temperature -40~85°C

The products are designed and approved for reliable operation over a wide tempe- rature range.

AES Encryption.png

TCG OPAL 2.0

Support AES 256bit hardware-based self-encryption and fully compliant with Trusted Computing Group (TCG) Opal Specification.

Solutions
Low Power Consumption.png

Low Power

Consumption

Electronic devices with low power consumption features (Partial mode, Slumber Mode, and DEVSLP Mode) generally have longer battery

Product Highlight

Product Highlight

PCIe Series

SATA Series

Memory Cards

bottom of page