ironkey solution brochure

Upload: kalimax

Post on 13-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/25/2019 Ironkey Solution Brochure

    1/6

  • 7/25/2019 Ironkey Solution Brochure

    2/6

  • 7/25/2019 Ironkey Solution Brochure

    3/6

  • 7/25/2019 Ironkey Solution Brochure

    4/6

    0000000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000 0010 00

    02040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e90000050 00e9 6a69 0069 a8a9 00a9 28

    003c 88880000080 8888 8888 8888 8888 288e be88 8888 88880000090 3b83 5788 8888 8888 76

    88f3 88bd e98800000c0 8a18 880c e841 c988 b328 6871 688e 958b00000d0 a948 5862 5884 7

    00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000 0000 0000 0

    00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 00

    0028 fdfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070 0057 7b7a 007a bab9 00

    778e 8828 888800000a0 d61f 7abd 8818 8888 467c 585f 8814 818800000b0 8b06 e8f7 88aa 83

    3788 1ab4 5a84 3eec00000e0 3d86 dcb8 5cbb 8888 8888 8888 8888 888800000f0 8888 8888 888

    0000 0000 0000 0000 000013e0 0000000 0000 0001 0001 1010 0010 0001 0004 01280000010 00

    0000 0000 0010 0000 0000 0000 02040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e900000

    0057 7b7a 007a bab9 00b9 3a3c 003c 88880000080 8888 8888 80000f0 8888 8888 8888 8888 88

    0000 0000000000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000

    Managed Mobile Storage

    Consolidating Strong Authentication

    on a Single Multifunction Device Many of the hardware-based security

    features that defend data stored on IronKey

    devices also make the IronKey an ideal

    multifunction device. Hardware features

    such as key management and secure token storage enable

    IronKey to deliver the strength of hardware and the

    flexibility of software to both two-factor authentication

    and secure mobile storage. These features reduce strong

    authentication costs and complexity while improving user

    satisfaction and adoption since users can now carry

    fewer devices.

    IronKey has partnered with RSA, VeriSign and

    CRYPTOCard to offer integrated solutions for strong

    authentication. Additionally, organizations can use the

    digital certificate onboard each IronKey device for simple

    strong authentication. This capability provides the

    critical hardware component needed to validate usersto cloud-based services and Web-enabled applications.

    Strong Authentication

    Managing Secure Portable Storage

    USB flash driveswith their small formfactors, large storage capacities, and high

    transfer rateshave revolutionized

    mobile data storage. Enterprise IT organiza-

    tions, however, face the challenge of preserving the

    productivity benefits of flash drives without compromising

    security. IronKey has developed a solution that keeps

    critical data from leaking out of the organization while

    keeping harmful malware from getting into PCs and

    networks. It is the worlds most secure USB flash drive.

    Managed IronKey drives combine always-onhardware encryption, remote security policy

    enforcement, and an array of physical and

    electromagnetic defenses that prevent

    intruders from accessing the chips or encryption keys.

    The IronKey architecture also verifies the users password

    in hardware, which thwarts brute-force password

    guessing. Additionally, it overcomes the design flaws

    inherent in software-based systems that allow hackers to

    access and decrypt data without the password. Active

    malware defenses further protect IronKey drivesand the

    computers and networks on which they are usedfrombecoming infected with viruses and worms.

  • 7/25/2019 Ironkey Solution Brochure

    5/6

    00020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 0000 0000

    dfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070 0057 7b7a 007a bab9 00b9 3a3c

    828 888800000a0 d61f 7abd 8818 8888 467c 585f 8814 818800000b0 8b06 e8f7 88aa 8388 8b3b

    1ab4 5a84 3eec00000e0 3d86 dcb8 5cbb 8888 80000f0 8888 8888 8888 8888 8888 8888 8888

    00000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000 0010 0000

    2040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e90000050 00e9 6a69 0069 a8a9 00a9 2828

    03c 88880000080 8888 8888 8888 8888 288e be88 8888 88880000090 3b83 5788 8888 8888 7667

    8f3 88bd e98800000c0 8a18 880c e841 c988 b328 6871 688e 958b00000d0 a948 5862 5884 7e81

    88 8888 8888 00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000

    000 0028 0000 0010 0000 00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000

    a69 0069 a8a9 00a9 2828 0028 fdfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070

    888 00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000 0000 0000

    00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 0000

    Trusted Virtual Computing

    Enabling Safe Workspaces in Hostile

    Environments IronKey Trusted Virtual Computing

    mobilizes the many benefits of

    virtualizationwhich have reduced cost,

    increased security and availability, and

    enabled more agile business responses in the datacenter

    on an ultra-secure USB device. Cutting ties to the data

    center and removing reliance on high-bandwidth network

    connections makes it possible to solve a broad range of

    problems. These solutions include ensuring business

    continuity, enabling mobile workers to safely use their

    home computers, and outfitting employees andcontractors with a secure portable workspace to use in

    potentially hostile environments.

    IronKey encapsulates the latest desktop

    virtualization technology in a secure

    portable USB device. Once configured, this

    solution plugs into an employee's home

    computer, or almost any Windows PC, and delivers

    everything from a complete PC-on-a-stick to an online

    banking application that protects commercial banking

    customers from funds transfer fraud.

    Hardware-based security, strong authenti-

    cation, and remote management capabilities

    make IronKey multifunction devices an ideal

    platform to carryand defendvirtualized

    payloads. Additionally, IronKey KeyOS firmware is

    optimized not only to meet the demands of virtualization

    security but also the performance requirements ofportable desktops, such as writing many files very quickly.

    It also can provide a secure pre-boot environment.

    Remote Device Control

    All IronKey solutions gain an additional

    level of security from enterprise-class central

    management. The IronKey Enterprise

    Management Service enables complete

    lifecycle managementfrom provisioning to device

    recovery to policy enforcement.

    A single dashboard provides visibility and

    control, enabling remote administration of

    fleets of devices in real time. This includes

    remotely applying, enforcing, and updating

    security policies. These policies govern password length

    and strength, enforcement of device access rules, and

    other parameters.

    Advanced features, such as audit trails

    and remote policy updates, as well as

    terminating and wiping lost or stolen devices

    remotely allow administrators to monitorand control device usage and prove compliance.

    The result is an increased security profile, streamlined

    compliance, and reduced capital expenditures and

    operational overhead.

  • 7/25/2019 Ironkey Solution Brochure

    6/6