Comparison Review Of Data Copy King And ICS IQ Solo 4
The comparison table will help buyers to compare and make a choice in one single sight between SD Data copy king and ICS IQ Solo 4.
| Data copy king | ICS IQ Solo 4 | |||
Review results | |||||
General | |||||
Picture | | | |||
Time to market | 2010, 4 | 2010 | |||
Price | USD 1,998 | USD3186.99 | |||
Drive connectivity | One to one | One to three | |||
Potable design | OS independent/potable | OS independent | |||
OS supported | Any known operating system | Windows XP | |||
Drive capacity supported | TB-level hard drives( up to 131072TB) | greater than 2TB | |||
HDD port | IDE/SATA/USB with adaptor | SAS/SATA/USB | |||
Host interface | USB 2.0 | 1 Gigabit EtherneT* | |||
Duplication functions | |||||
Coping transfer speed | Real-time 7.0GB/min | 12.0GB/min(as its official claimed) | |||
Control the imaging process | Yes | Yes | |||
Image data areas only | No | Yes | |||
Set number of sectors to skip | Yes(1,32, 256 and 52000) | N/A | |||
Set Read Timeout | Yes | N/A | |||
DD image | Yes | Yes | |||
Unstable HDD with bad sector or/and clicking noise | Yes | No | |||
Smart drive reset/reboot | Yes | Yes | |||
Test, wipe functions | |||||
Erasing transfer speed | 8.0GB/min | 7.5GB/min | |||
Head and media test | Yes | N/A | |||
Data erasing standard | DoD–5220.22 | DoD–5220.22 | |||
Forensic functions | |||||
Access to HPA and doc hidden area | Yes | yes | |||
Write protection | Yes | Yes | |||
Backdoor design | No | N/A | |||
Checksum calculations | CRC32 /MD5 | MD5 or SHA | |||
Log auto generation | Yes | Yes | |||
Drive image encryption | No | Yes | |||
E01 (Encase) image formats | No | Yes | |||
Others | |||||
Touch Screen User Interface | Yes | Yes | |||
User authority | three-level password | No | |||
Multi-language support | Yes | Yes | |||
Upgradable | Free software upgrade | Free software upgrade | |||
Technique support | Free technique support | Limited free support | |||
Warranty | One year with 3 year optional | One year with 2 two year optional |
* A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.
*1 Gigabit Ethernet connection allows the unit to upload images to Network Storage or any attached network share.
Info provided in the review comes from following two websites:
SalvationDATA Technology Data Copy King
ICS IQ Solo 4
没有评论:
发表评论