SlideShare a Scribd company logo
1 of 15
IronKey Enterprise with Silver Bullet Service THE WORLD’S MOST SECURE FLASH DRIVE IronKey © 2008, All rights reserved.
Lost & Stolen USB Drives *  Survey of IT Professionals Store confidential data on flash drives Not reporting the lost devices immediately Yes Lost data bearing devices Yes *Ponemon Institute 2007
IronKey Confidential – © 2008, All rights reserved.
IronKey Hardware ,[object Object]
PKI digital certificates
One-Time-Passwords
Tamper resistant
Rugged & waterproof
Fast & reliable
FIPS 140-2  level 3 validated,[object Object]
AES algorithm much faster in hardware
Much more secure than software encryptionStrong Key Protection ,[object Object]
IronKey encryption keys are managed in a chip – not NAND Flash memoryAES encryption mode ,[object Object],Encrypted using  ECB mode Original Encrypted using  CBC mode
Easy to Set Up First-time users:  Just plug it in  and  create a password IronKey © 2008, All rights reserved.
Easy to Use –  No Software to Install All software auto-runs from the device. IronKey © 2008, All rights reserved.

More Related Content

Similar to Ironkey enterprise with silver bullet service

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UKmfoudi
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersVi Tính Hoàng Nam
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile securitySatya Harish
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applicationsSatish b
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherFMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherVerein FM Konferenz
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 

Similar to Ironkey enterprise with silver bullet service (20)

Iron Key Introduction
Iron Key IntroductionIron Key Introduction
Iron Key Introduction
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applications
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Hacking and Securing iOS Applications
Hacking and Securing iOS ApplicationsHacking and Securing iOS Applications
Hacking and Securing iOS Applications
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Diskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive DatasheetDiskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive Datasheet
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherFMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Ironkey enterprise with silver bullet service

  • 1. IronKey Enterprise with Silver Bullet Service THE WORLD’S MOST SECURE FLASH DRIVE IronKey © 2008, All rights reserved.
  • 2. Lost & Stolen USB Drives * Survey of IT Professionals Store confidential data on flash drives Not reporting the lost devices immediately Yes Lost data bearing devices Yes *Ponemon Institute 2007
  • 3. IronKey Confidential – © 2008, All rights reserved.
  • 4.
  • 10.
  • 11. AES algorithm much faster in hardware
  • 12.
  • 13.
  • 14. Easy to Set Up First-time users: Just plug it in and create a password IronKey © 2008, All rights reserved.
  • 15. Easy to Use – No Software to Install All software auto-runs from the device. IronKey © 2008, All rights reserved.
  • 16. IronKey Enterprise Always-On Encryption Eliminates Risk of Lost or Stolen Flash Drives Protects Against “Rogue” Users Remote Administration & Policy Enforcement Portable ID and Strong Authentication
  • 17. IronKey Enterprise Silver Bullet Service:Protection Against Malicious Insiders DENIES access to rogue flash drives DISABLES IronKeys of concern DESTROYS compromised device DELIVERS forensic knowledge of device activities IronKey– © 2008, All rights reserved.
  • 18. IronKey Personal Always-on Encryption Portable Security Software Internet Protection Services Self-Service Device & Password Recovery Rugged & Physically Secure
  • 19. IronKey Basic Hardware Encryption No Software to Install Cross Platform Encrypted Local Back-up
  • 20. An IronKey for Every Need:Business, Individual, Government, and Military For More Information Visit www.IronKey.com or E-mail sales@ironkey.com IronKey © 2008, All rights reserved.
  • 21. The IronKey USB flash drive is one of the most secure devices I've ever worked with, but simultaneously tries to be- and achieves being- among the simplest to interact with in achieving that security. - May 22, 2008: Glen Fleishman on Hardware IronKey– © 2008, All rights reserved. PC World states:
  • 22. IronKey – © 2008, All rights reserved. “This is without a doubt the most secure USB flash drive I've ever tested.” ComputerWorld – February 29, 2008
  • 23. IronKey – © 2008, All rights reserved. For any enquiry, please contact Ironkey Certified VAR - Castleforce on Tel: +44(0)118 907 1600 Tel: +44(0)151 203 1400 Email: info@castleforce.com www. castleforce.co.uk/ironkey Thank You

Editor's Notes

  1. RE-word last chart description?
  2. The key is the custom-designed IronKey CryptochipWe design devlop the Cryptochip ourselvesHardware-based encryption has the encryption algorithm in hardware (the Cryptochip in our case), an approach that is much more secure and runs much faster than software-based encryption, and puts no overhead on the drive itselfAll data is encrypted all the time—There’s no way to accidentally turn it off; you can’t fail to have the driver installed; there’s no way for a user to accidentally transfer a file to the wrong partition and have it not be encrypted; etc. This “always on” encryption is critical for data protection and for compliance in some industries (i.e., where, by regulation, you can’t let the user make a mistake)All Encryption keys are stored hardware and are not subject to “cold boot” attacks—an approach recently proven at Princeton where you take a computer that has software encryption, which is asleep or recently shut down, and spray a compressed-air cleaning spray (available at any office supply store) on the memory chips to cool them down to near freezing, and then extract the decryption keys, which allows you to reboot and get at the entire contents of the diskUnlike competitors, encryption keys are not created or escrowed outside the deviceProtects against password brute-force guessing — IronKey is more secure because all password verification is done in hardware. After 10 tries we lock you out, blow away the encryption keys, and blow away the data. In software there’s no way to prevent you from replaying and testing millions of passwords, and there’s products out there today that can guess 250,000 passwords a secondBoth hardware- and software-based encryption use strong encryption algorithms. However, two key weak links are encryption keys and the method employed for the encryption algorithm—Weak Key Protection in SoftwareMost competitors create their encryption keys outside of the deviceMost competitors store their encryption keys in NAND Flash memoryMade in ChinaSome competitors manufacture the drives and create encryption keys in factories overseas, which means when you leave the encryption keys floating around or escrowed by a foreign entity, you risk compromising the whole production run. So how can you trust a security product made in China?IronKey uses the preferred AES encryption modeMost competitors use ECB (Electronic Code Book) mode, which is not recommended by NIST or NSA. ECB encrypts the blocks to look exactly the sameWe have taken the time to implement the proper CBC (Cyber Block Chain), is the most secure mode and is preferred by both NIST and NSA
  3. IronKey Basic, like all IronKeys, are designed to meet one of the most necessary but yet overlooked features in a secure USB device—ease of use.
  4. IronKey Enterprise extends the IronKey platform’s the strong encryption capabilities, speed, and rugged reliability with remote management and policy enforcement.Features—Always-on encryption provides a fool-proof way to ensure that users protect critical IP and other confidential data, while also enabling compliance with regulation regarding protection of personal data. (Reiterate: All data is encrypted all the time—There’s no way to accidentally turn it off; you can’t fail to have the driver installed; there’s no way for a user to accidentally transfer a file to the wrong partition and have it not be encrypted; etc.)The platform’s unique management as an online service offers a number of advantages— You can manage users remotelyYou don’t have any software to install, no server to install, no database to manage—IronKey manages all that for the customerWe don’t have any of your data on our system (if you choose not have any passwords). All we know is the devices serial number, so it’s a highly secure systemOnboard digital certificate provides simple strong authentication--will soon have capability to import certificates, providing simple authentication for VPNs, firewalls, etc.You can also choose to give users the full privacy and identity protection features of IronKey Personal— A secure onboard Firefox browser and password manager protects the user’s identity and passwords“Secure Session” protects users on insecure WiFi networks and enables them to open a secure, private tunnel through the public InternetSleek waterproof metal case helps shield the chips and critical data
  5. PROTECT YOUR DATA, SECURE YOUR FILESAND IDENTITY WITH IRONKEYENCRYPT YOUR DATAPROTECT YOUR IDENTITYSURF PRIVATELY
  6. You can see the that we have created an IronKey for everybodyFrom Basic with provides the hardware foundation for the entire product lineTo Personal which includes software and services to protect users online includingEnterprise which lets you configure with applications are available to users, remotely manage user devices and recover data if necessaryIronKey comes in three flavors.IronKey Basic—Offers the most secure portable storage device available for organizations that need the highest data security and have restrictions on third-party software—the Military is a good example of this type of customer. Has only one piece of software, which enables local encrypted back-up of the contents of the IronKeyIronKey Personal—Combines the world’s most secure flash drive with Internet and Identity protection services, includingA secure Firefox browser on the device that lets you take computer bookmarks, history, favorites with you and plug in a complete digital life into any computerStores you temp and cache files on the IronKey so they are not available for heisting“Secure Sessions,” which enables encrypted web surfing over any network and protects you against pharming attacks (we run the DNS for you, so if for example somebody has tampered with DNS on a WiFi network and someone has tampered with the DNS they can’t redirect you to a fraud site—we’ll take you to the correct site)A password manager on the device that lets you store and manage all your Internet passwords on the IronKey, which not only adds convenience but protects users from keyloggers because it enters passwords with just one click one of the mouse (you can also optionally store them with us so that if you lose your device you can restore your passwords by answering secret challenge/response questions)IronKey Enterprise,Tailored larger organizations, it extends the high performance and high security of the IronKey platform with remote management, enforcement of configurable policies (e.g., password strength), strong authentication capabilities, etc.It gives you the option of giving users some or all full identity and privacy protection of onboard software and online services available on IronKey Personal