Centrally administer access and usage policies with the cloud-based or on-premise IronKey Enterprise Management Service or Server. Users can easily self-provision their devices, or you can initialize the devices and deploy them to end users. Minimum quantity is 2. The S protects files with FIPS level 3 validation ensuring compliance with the most stringent government and industry regulations while allowing workers to remain mobile. Enforce device-specific policies , including password strength and retry limits, onboard portable applications, and where devices are allowed to be used. Hard drives that rely on software to enable encryption keys are vulnerable to cold-boot and malware attacks because they export encryption keys to the host PC.
|Date Added:||12 August 2010|
|File Size:||54.88 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
S flash drives feature SLC flash memory for exceptional performance and longevity.
IronKey – Wikipedia
This Microsoft-certified solution comes complete with your applications, security controls and access policies stored on a ruggedized, fully manageable USB flash deivce. Securely recover access to user devices, force a device to be in read-only mode, remotely force password changes, and re-commission devices that are no longer in use.
Securely recover access to user devices, force a device to be in read-only mode, remotely force password changes, and re-commission devices that are no longer in use.
The service uses advanced mutual authentication technology to verify your identity so you can recover your device’s password securely.
Ruggedized, military-grade devices are resistant to dust and shocks and waterproof MIL-STDF Optional cloud-based or on-premises management to centrally administer access and usage policies, force a device to be in read-only mode, re-commission devices no longer in use and even remotely destroy lost or stolen drives.
Related Resources To interact with this component, access the Preview mode.
This allows the users degice use the device as en enterprise desktop on a non-enterprise computer with all evidence of work carried out removed from host computer once it is powered down. Deice an intuitive, secure online interface to apply security policies to their organization’s IronKey Enterprise encrypted flash drives. Deny – prohibits accessing the data on the device until it can verify status Disable – Locks out the user completely the next time the device connects Destroy – Instructs the device ironkeg initiate its self-destruct sequence Whether managed on your premises or in the cloud, the Imation Enterprise solution easily integrates with your existing IT infrastructure.
If all of the IronKey devices are the same model and revision you should only see 2 File exceptions Application Control per drive letter and 2 Application exceptions The hash won’t change with drive letter, however duplicate hashes may be seen if the application was detected in more than one location.
Only after the user logs in with an authorized password will the drive unlock data and applications. Remotely Disable Lost or Stolen Devices Administrators can lock out the user completely once the device connects and iromkey the IronKey Enterprise drive to initiate the self-destruct sequence.
UAB – School of Medicine – Medicine – IRONKEY
This issue occurs only when the View desktop is installed with Windows XP operating system. Anti-Malware Service that scans and protects all onboard files. Software Kit – Media, admin devices, and perpetual server software license.
IronKey Enterprise S and D flash drives are designed specifically for enterprise, government and military customers that require exceptional security, performance and manageability from their mobile storage devices. IronKey Personal S and D are the ideal lash drives for individuals who want to protect the data they care about most.
The H is available in two versions: Not available on Workspace Drives. To disable the consistency check rionkey the IronKey device: Policy settings allow system admins to turn these applications on or off as desired.
You can even set the device to self-destruct after a configurable number of break-in attempts, and a ruggedized, waterproof metal chassis resists physical break-ins and is tamper evident.
VMware Horizon View 5. Designed specifically for enterprise, government and military customers that need high performance and reliability in their USB flash storage devices, IronKey Basic S and D flash drives meet the stringent Security Level 3 requirements of the FIPS standard. D drives balance performance and value for users with average data access needs. Both drives are encased in high-strength aluminum enclosure and feature USB 3. IronKey Basic S and D IronKey Enterprise flash drives are deployed and managed with IronKey Enterprise Management on-premises server or cloud-based service.
Service component only available for IronKey Enterprise devide drive. Whether a device is lost, stolen or in the possession of a user who has been terminated or deemed an insider threat, you can:.