Security threats and compliance requirements are on the rise. With worms like Conficker maliciously winding its way through corporate networks, it is imperative that organizations implement and enforce comprehensive mobile data security polices. IronKey Enterprise with Remote Management Service combines hardware-encrypted IronKey USB flash drives with a powerful tracking and management solution. It allows organizations to remotely administer policies across thousands of IronKey Enterprise devices via the internet. IronKey Enterprise devices provide defenses that deliver layered protection to stop the spread of malware and worms. If a device is lost or stolen, it can be remotely disabled or destroyed. Enterprise requirements for protecting data, identities and online privacy are met by IronKey with this unique solution.
IronKey Enterprise devices offer strong security and help customers achieve the Federal Information Processing Standards (FIPS) 140-2, Level 3 validation. Additionally, if an IronKey is ever lost or stolen, not only is the data protected, but also through its suite of portable security applications, the data can be restored to a new IronKey from an encrypted backup.
The IronKey Enterprise with Remote Management Service works seamlessly with enterprise-level USB endpoint security management products. It provides IT administrators with centralized management and visibility across thousands of devices, ensuring that security policies are enforced. The devices include always-on hardware encryption, while intelligent anti-malware capabilities keep out malicious code. The advantages include powerful, active anti-malware protection; policy enforcement, which includes password strength, password retry limits and onboard portable applications; the ability to remotely disable or terminate lost and stolen USB drives; strong authentication with one-time password technology, such as RSA SecureID, that allows IronKey devices to be used as a two-factor token; endpoint and enterprise application integration; administrator device unlock and rest; and secure platform for virtualization.
The offering is used by commercial enterprises and government agencies and is a proven and reliable solution.
- Check Point Software Technologies for Check Point Media Encryption and Port Protection
- CREDANT Technologies for CREDANT Mobile Guardian
- IronKey for IronKey Enterprise with Remote Management Service
- PGP Corp. for PGP Mobile
- Symantec for Symantec Mobile Security Suite 5.1