Kingston introduces USB Type-C to IronKey Keypad 200 Series, enhancing security and convenience.


August 14, 2023 by our News Team

Kingston Digital, Inc. has launched a hardware-encrypted USB Type-C drive with military-grade security, XTS-AES 256-bit encryption, Brute Force protection, BadUSB protection, and an alphanumeric keypad for easy PIN access, providing users with the highest level of data protection and convenience.

  • FIPS 140-3 Level 3 (Pending) certified security
  • XTS-AES 256-bit hardware-based encryption
  • Compatible with USB-C equipped devices without the need for adapters


Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, has announced the launch of the Kingston IronKey Keypad 200C. This hardware-encrypted USB Type-C drive offers both security and convenience for users. With the increasing need for data protection, the IronKey Keypad 200C provides military-grade security and compatibility with USB-C equipped devices without the need for adapters.

The KP200C drive features FIPS 140-3 Level 3 (Pending) certified security, ensuring the highest level of protection for valuable data. It incorporates XTS-AES 256-bit hardware-based encryption, Brute Force password attack protection, and BadUSB protection with digitally signed firmware. The alphanumeric keypad allows for easy-to-use PIN access, with the option for an Admin/User mode. The Admin can restore a User PIN if it is forgotten.

Richard Kanadjian, IronKey global business manager at Kingston, highlighted the importance of strong data protection in today’s environment. He emphasized the need for military-grade protection on hardware-encrypted drives that can be physically secured offline while safeguarding data in-transit and at-rest. The addition of the KP200C to the IronKey lineup provides users with more flexibility across various platforms and operating systems.

The Kingston IronKey Keypad 200C is available in capacities up to 256GB and comes with a 3-year warranty and free technical support.

About Our Team

Our team comprises industry insiders with extensive experience in computers, semiconductors, games, and consumer electronics. With decades of collective experience, we’re committed to delivering timely, accurate, and engaging news content to our readers.

Background Information


About Kingston Technology: Kingston Technology, founded in 1987, is a important global manufacturer of memory and storage solutions. The company specializes in producing a wide range of products, including memory modules, solid-state drives (SSDs), USB drives, and more. Known for its reliability and quality, Kingston has established itself as a trusted name in the technology industry. With a focus on providing solutions for both consumers and businesses, Kingston's products cater to various needs, from enhancing system performance to data storage.

Kingston Technology website  Kingston Technology LinkedIn

Technology Explained


AES 256: AES 256, short for Advanced Encryption Standard with a key length of 256 bits, is a widely used symmetric encryption algorithm. It employs a substitution-permutation network to ensure data confidentiality and security. AES comes in different key lengths, including AES-128 and AES-192, where the numbers represent the key size in bits. AES-128 uses a 128-bit key, while AES-192 uses a 192-bit key. These standards are considered secure and are used for various applications to protect sensitive information during data transmission and storage.


FIPS: The Federal Information Processing Standards (FIPS) encryption standard encompasses a set of specifications and guidelines established by the U.S. government to ensure the security and interoperability of cryptographic algorithms and protocols. These standards are crucial for protecting sensitive information and facilitating secure communication across various systems and organizations. FIPS-approved algorithms, such as AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), and SHA (Secure Hash Algorithm), undergo rigorous evaluation and testing to meet stringent security requirements, providing a foundation for secure data handling and transmission in both government and non-government sectors.





Leave a Reply