SlideShare a Scribd company logo
1 of 18
IRONKEY AND OUR CHANNEL PARTNERS
Winning with IronKey Workspace
MultiPoint Ltd.
THE IRONKEY FAMILY

IRONKEY WORKSPACE

IRONKEY F100 & F150 FLASH DRIVES

IRONKEY H100 EXTERNAL HDD

IRONKEY SECURE S250 AND D250 DRIVES

IRONKEY F200 BIOMETRIC FLASH DRIVES

IRONKEY H200 BIOMETRIC EXTERNAL HDD

IRONKEY D80 FLASH DRIVES

IRONKEY H80 EXTERNAL HDD
BYOD… FROM PROBLEM TO OPPORTUNITY

TEN YEARS AGO IT WAS MOBILE
PHONES…
•

•

Ten years ago if your employer wanted
you to use a cell phone, they gave you a
phone!
Today if your employer wants you to use
a cell phone, they say “use your own.”

“

NOW IT’S COMPUTERS…
•

Until now if your employer has
wanted you to use a PC, they’ve
given you a PC – now they want to
say “use your own.”

Deloitte predicts that more than half of all
Fortune 500 companies will maintain a
bring-your-own-computer (BYOC) policy by 2015.

http://deloitte.wsj.com/cio/2013/03/28/two-variations-of-bring-your-own-computer/

”
BYOD SUCCESS IN THE ENTERPRISE

SIMPLE

SECURE

MANAGABLE

A solution that is
easy for endusers to use so
they will embrace
it and require
minimal training

A solution that is
highly secure to
protect
confidential
information and
enable regulatory
compliance

A solution that is
centrally
manageable and
mass-deployable to
suit the needs of
enterprise and
government

SUCCESS REQUIRES ALL THREE ELEMENTS
IRONKEY WORKSPACE:
SIMPLE, SECURE, MANAGEABLE BYOD SOLUTION

IronKey Workspace leverages Windows To Go, a
new feature for enterprise users of Windows 8 that
enables users to boot a full version of Windows
from external USB drives on host PCs.
JUST BOOT AND SCOOT
How it works….
1. Shut down host computer
2. Insert Workspace device into USB slot

3. Reboot
4. Authenticate user identity to device
5. You’re up and running

• ENABLING BOOT FROM USB
• HIGH PERFORMANCE
• RESILIENT TO UNINTENDED REMOVAL
• REDEFINE MOBILITY – WORKS ACROSS
MULTIPLE PC’S AND FIRMWARE
IT MANAGED, IT PROVISIONED WINDOWS WORKSPACE
•

Turn most any PC into an IT
provisioned, IT managed, IT secure
workstation

•

Cost approximately 1/10 to 1/5 that of
an IT managed, provisioned and
secured laptop
PAY $200, NOT $2,000
Running Windows To Go on an
IronKey Workspace transforms any
computer into an IT-secured
workstation for $200, not $2,000.

A FULLY-FUNCTIONAL WORKSTATION THAT FITS IN YOUR POCKET
EASY TO USE: IRONKEY WORKSPACE USE CASES

Contractors

Travel Light / Work from Home

Bring Your Own Device
(BYOD)

Continuity of Operations

Shared-PC

MANY USE CASES ACROSS INDUSTRY VERTICALS
HIGHLY SECURE: IRONKEY MEANS SECURITY

WHY IRONKEY?
•
•

•

•
•

Designed to be (and recognized as) the
world’s most secure mobile storage
Trusted by government, enterprise
healthcare, education, financial and
consumer segments
Security enforced by centralized
management
Working side-by-side with Microsoft to
address BYOD
History of innovation in secure mobile
solutions
HIGHLY SECURE: HARDENS VM OR VDI ENDPOINTS

VM or VDI runs inside the
Windows 8.1 OS

Virtual Machine
or
VDI
Windows 8.1 hosts the VM
or VDI
Windows 8.1
WTG Device
WTG Device hosts the
environment to run the OS
CENTRALLY MANAGEABLE:
IRONKEY WORKSPACE GIVES IT INSIGHT AND CONTROL
•

IronKey Workspace W500 Integrates
with existing IT infrastructure
o

•

Easy to deploy and administer end user
drives and to remotely enforce policies

Efficiently manage device
inventory, lifecycle and maintenance
o

Manage thousands of IronKey Workspace
devices, enforcing device-specific
policies, including password
strength, password aging, password retry
limits

o

Modify and update policies to permit and
revoke user or administrative
authorization.
CENTRALLY MANAGEABLE:
CONTROL WHO IS DOING WHAT AND WHERE
STOP THE BAD GUYS
• Geographically locate IronKey
Workspace devices
• Remotely wipe or destroy errant
drives

HELP THE GOOD GUYS
• Remote password reset
assistance
• Policy management down to
the individual
MASS PROVISIONING: ENTERPRISE-CLASS DEPLOYMENT

• IronKey Provisioning Tool is an Imation exclusive
tool that allows mass provisioning of W500

IronKey Provisioning Tool





One step operation
64 bit / 32 bit
Managed / non-managed
W300 / W500 / W700
IRONKEY WORKSPACE:
AN ENTIRE “PC ON A STICK” FAMILY
• Marshal some of the most advanced
authentication and encryption
technologies available today
• Competitive advantage in security,
rugged design, compact size,
performance and management

W500

W300
• Simple and affordable
• IronKey dependability
• Automatically protect
data upon removal
• Microsoft BitLocker
encryption

•
•

•

•

Adds
Hardware encryption
Expandable via custom
add-ons including
Crossover Storage and
Identity
Optional mass
provisioning and device
management
Metal case

W700
Government
Pack
Adds
• FIPS 140-2 Level 3
validated
• Advanced add-on
features including
CAC/PIV
authentication
SAMPLE OPPORTUNITIES
• Enterprise and government (central and local authorities) looking to
decrease cost and increase flexibility of computer
deployment/management without compromising security
• Streamline and secure management of consultant computing and
data access
• Meeting teleworking mandates, complying with regulation
• Education, affordable alternative to issuing laptops

• Financial institutions, enabling and
securing high-value customers
• Healthcare, highly mobile workforce even
inside own walls
• Military, highly survivable mobile computing
2013 - 2014 WORKSPACE PRODUCT ROADMAP

Q4 2013

Today

Workspace W300

Workspace W500

On-Premise
Management

Workspace Mass
Provisioning Tool

Q1 2014

Workspace
CAC/PIV Support

Workspace
Console
localization

Workspace
508
compliance

FIPS certification
IRONKEY WORKSPACE: INDUSTRY BUZZ

“

With IronKey's W300 excellent
security and a slim design… our new
Editors' Choice for Windows To Go
devices.

Overall, I really like the IronKey
Workspace USB drive. It's made by a
reputable company and offers great
security features and quality
construction. If you have need of such
a device, I'd recommend this one.
Computerworld

ZDNet

”

Editor rating: Excellent.
PC Magazine

“

“

Imation has taken its
already rugged IronKey
USB flash drives, which
already featured
hardware-based AES
256-bit full disk
encryption, and added
super-fast USB 3.0
support and flash
memory to create a
drive that offers five
times the minimum
average read and write
speeds needed for
Windows to Go.

”

”
THANK YOU!

More Related Content

Similar to IRONKEY AND OUR CHANNEL PARTNERS WIN WITH WORKSPACE

Intermedia Unite – Brochure
Intermedia Unite – BrochureIntermedia Unite – Brochure
Intermedia Unite – BrochureIdeacomcentral
 
Why Unified Communications
Why Unified CommunicationsWhy Unified Communications
Why Unified CommunicationsManuel Bernal
 
Why cisco unified_communications
Why  cisco unified_communicationsWhy  cisco unified_communications
Why cisco unified_communicationsMuhammad Shahzad
 
Introducing Cisco Voice and Unified Communications
Introducing Cisco Voice and Unified CommunicationsIntroducing Cisco Voice and Unified Communications
Introducing Cisco Voice and Unified CommunicationsArchana Parameshwari
 
VMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid ITVMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid ITBenjamin Shrive
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Marco Dal Pino
 
ITC Capabilities Brief 2014
ITC Capabilities Brief 2014ITC Capabilities Brief 2014
ITC Capabilities Brief 2014Jeffrey Strobach
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Desktone
 
S-Cloud Online Meeting-SVV 03122016
S-Cloud Online Meeting-SVV 03122016S-Cloud Online Meeting-SVV 03122016
S-Cloud Online Meeting-SVV 03122016Cuong Media
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Callon Campbell
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAnnie Thomas
 
ITsavvy Corporate Brochure
ITsavvy Corporate BrochureITsavvy Corporate Brochure
ITsavvy Corporate BrochureJohn Skeffington
 
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsOptimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsSecureDocs
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10
 
Toshiba Cloud Storage Products 2014
Toshiba Cloud Storage Products 2014Toshiba Cloud Storage Products 2014
Toshiba Cloud Storage Products 2014Mustafa Kuğu
 

Similar to IRONKEY AND OUR CHANNEL PARTNERS WIN WITH WORKSPACE (20)

Intermedia Unite – Brochure
Intermedia Unite – BrochureIntermedia Unite – Brochure
Intermedia Unite – Brochure
 
Why Unified Communications
Why Unified CommunicationsWhy Unified Communications
Why Unified Communications
 
Why cisco unified_communications
Why  cisco unified_communicationsWhy  cisco unified_communications
Why cisco unified_communications
 
Introducing Cisco Voice and Unified Communications
Introducing Cisco Voice and Unified CommunicationsIntroducing Cisco Voice and Unified Communications
Introducing Cisco Voice and Unified Communications
 
VMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid ITVMWare and SoftLayer Hybrid IT
VMWare and SoftLayer Hybrid IT
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
 
ITC Capabilities Brief 2014
ITC Capabilities Brief 2014ITC Capabilities Brief 2014
ITC Capabilities Brief 2014
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
 
S-Cloud Online Meeting-SVV 03122016
S-Cloud Online Meeting-SVV 03122016S-Cloud Online Meeting-SVV 03122016
S-Cloud Online Meeting-SVV 03122016
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
Build embedded and IoT solutions with Microsoft Windows IoT Core (BRK30077)
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Build Your Own Cloud Server
Build Your Own Cloud ServerBuild Your Own Cloud Server
Build Your Own Cloud Server
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
ITsavvy Corporate Brochure
ITsavvy Corporate BrochureITsavvy Corporate Brochure
ITsavvy Corporate Brochure
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsOptimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
Toshiba Cloud Storage Products 2014
Toshiba Cloud Storage Products 2014Toshiba Cloud Storage Products 2014
Toshiba Cloud Storage Products 2014
 

More from Ricardo Resnik

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014Ricardo Resnik
 
Whatsnew gfi languard2014partners_en_gen
Whatsnew gfi languard2014partners_en_genWhatsnew gfi languard2014partners_en_gen
Whatsnew gfi languard2014partners_en_genRicardo Resnik
 
Two factor Authentication
Two factor AuthenticationTwo factor Authentication
Two factor AuthenticationRicardo Resnik
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014Ricardo Resnik
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version Ricardo Resnik
 
Gfi corporate presentation_en_gen
Gfi corporate presentation_en_genGfi corporate presentation_en_gen
Gfi corporate presentation_en_genRicardo Resnik
 

More from Ricardo Resnik (8)

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Whatsnew gfi languard2014partners_en_gen
Whatsnew gfi languard2014partners_en_genWhatsnew gfi languard2014partners_en_gen
Whatsnew gfi languard2014partners_en_gen
 
Two factor Authentication
Two factor AuthenticationTwo factor Authentication
Two factor Authentication
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version MultPoint Ltd.company overview 2014 3214 short version
MultPoint Ltd.company overview 2014 3214 short version
 
Gfi corporate presentation_en_gen
Gfi corporate presentation_en_genGfi corporate presentation_en_gen
Gfi corporate presentation_en_gen
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

IRONKEY AND OUR CHANNEL PARTNERS WIN WITH WORKSPACE

  • 1. IRONKEY AND OUR CHANNEL PARTNERS Winning with IronKey Workspace MultiPoint Ltd.
  • 2. THE IRONKEY FAMILY IRONKEY WORKSPACE IRONKEY F100 & F150 FLASH DRIVES IRONKEY H100 EXTERNAL HDD IRONKEY SECURE S250 AND D250 DRIVES IRONKEY F200 BIOMETRIC FLASH DRIVES IRONKEY H200 BIOMETRIC EXTERNAL HDD IRONKEY D80 FLASH DRIVES IRONKEY H80 EXTERNAL HDD
  • 3. BYOD… FROM PROBLEM TO OPPORTUNITY TEN YEARS AGO IT WAS MOBILE PHONES… • • Ten years ago if your employer wanted you to use a cell phone, they gave you a phone! Today if your employer wants you to use a cell phone, they say “use your own.” “ NOW IT’S COMPUTERS… • Until now if your employer has wanted you to use a PC, they’ve given you a PC – now they want to say “use your own.” Deloitte predicts that more than half of all Fortune 500 companies will maintain a bring-your-own-computer (BYOC) policy by 2015. http://deloitte.wsj.com/cio/2013/03/28/two-variations-of-bring-your-own-computer/ ”
  • 4. BYOD SUCCESS IN THE ENTERPRISE SIMPLE SECURE MANAGABLE A solution that is easy for endusers to use so they will embrace it and require minimal training A solution that is highly secure to protect confidential information and enable regulatory compliance A solution that is centrally manageable and mass-deployable to suit the needs of enterprise and government SUCCESS REQUIRES ALL THREE ELEMENTS
  • 5. IRONKEY WORKSPACE: SIMPLE, SECURE, MANAGEABLE BYOD SOLUTION IronKey Workspace leverages Windows To Go, a new feature for enterprise users of Windows 8 that enables users to boot a full version of Windows from external USB drives on host PCs.
  • 6. JUST BOOT AND SCOOT How it works…. 1. Shut down host computer 2. Insert Workspace device into USB slot 3. Reboot 4. Authenticate user identity to device 5. You’re up and running • ENABLING BOOT FROM USB • HIGH PERFORMANCE • RESILIENT TO UNINTENDED REMOVAL • REDEFINE MOBILITY – WORKS ACROSS MULTIPLE PC’S AND FIRMWARE
  • 7. IT MANAGED, IT PROVISIONED WINDOWS WORKSPACE • Turn most any PC into an IT provisioned, IT managed, IT secure workstation • Cost approximately 1/10 to 1/5 that of an IT managed, provisioned and secured laptop PAY $200, NOT $2,000 Running Windows To Go on an IronKey Workspace transforms any computer into an IT-secured workstation for $200, not $2,000. A FULLY-FUNCTIONAL WORKSTATION THAT FITS IN YOUR POCKET
  • 8. EASY TO USE: IRONKEY WORKSPACE USE CASES Contractors Travel Light / Work from Home Bring Your Own Device (BYOD) Continuity of Operations Shared-PC MANY USE CASES ACROSS INDUSTRY VERTICALS
  • 9. HIGHLY SECURE: IRONKEY MEANS SECURITY WHY IRONKEY? • • • • • Designed to be (and recognized as) the world’s most secure mobile storage Trusted by government, enterprise healthcare, education, financial and consumer segments Security enforced by centralized management Working side-by-side with Microsoft to address BYOD History of innovation in secure mobile solutions
  • 10. HIGHLY SECURE: HARDENS VM OR VDI ENDPOINTS VM or VDI runs inside the Windows 8.1 OS Virtual Machine or VDI Windows 8.1 hosts the VM or VDI Windows 8.1 WTG Device WTG Device hosts the environment to run the OS
  • 11. CENTRALLY MANAGEABLE: IRONKEY WORKSPACE GIVES IT INSIGHT AND CONTROL • IronKey Workspace W500 Integrates with existing IT infrastructure o • Easy to deploy and administer end user drives and to remotely enforce policies Efficiently manage device inventory, lifecycle and maintenance o Manage thousands of IronKey Workspace devices, enforcing device-specific policies, including password strength, password aging, password retry limits o Modify and update policies to permit and revoke user or administrative authorization.
  • 12. CENTRALLY MANAGEABLE: CONTROL WHO IS DOING WHAT AND WHERE STOP THE BAD GUYS • Geographically locate IronKey Workspace devices • Remotely wipe or destroy errant drives HELP THE GOOD GUYS • Remote password reset assistance • Policy management down to the individual
  • 13. MASS PROVISIONING: ENTERPRISE-CLASS DEPLOYMENT • IronKey Provisioning Tool is an Imation exclusive tool that allows mass provisioning of W500 IronKey Provisioning Tool     One step operation 64 bit / 32 bit Managed / non-managed W300 / W500 / W700
  • 14. IRONKEY WORKSPACE: AN ENTIRE “PC ON A STICK” FAMILY • Marshal some of the most advanced authentication and encryption technologies available today • Competitive advantage in security, rugged design, compact size, performance and management W500 W300 • Simple and affordable • IronKey dependability • Automatically protect data upon removal • Microsoft BitLocker encryption • • • • Adds Hardware encryption Expandable via custom add-ons including Crossover Storage and Identity Optional mass provisioning and device management Metal case W700 Government Pack Adds • FIPS 140-2 Level 3 validated • Advanced add-on features including CAC/PIV authentication
  • 15. SAMPLE OPPORTUNITIES • Enterprise and government (central and local authorities) looking to decrease cost and increase flexibility of computer deployment/management without compromising security • Streamline and secure management of consultant computing and data access • Meeting teleworking mandates, complying with regulation • Education, affordable alternative to issuing laptops • Financial institutions, enabling and securing high-value customers • Healthcare, highly mobile workforce even inside own walls • Military, highly survivable mobile computing
  • 16. 2013 - 2014 WORKSPACE PRODUCT ROADMAP Q4 2013 Today Workspace W300 Workspace W500 On-Premise Management Workspace Mass Provisioning Tool Q1 2014 Workspace CAC/PIV Support Workspace Console localization Workspace 508 compliance FIPS certification
  • 17. IRONKEY WORKSPACE: INDUSTRY BUZZ “ With IronKey's W300 excellent security and a slim design… our new Editors' Choice for Windows To Go devices. Overall, I really like the IronKey Workspace USB drive. It's made by a reputable company and offers great security features and quality construction. If you have need of such a device, I'd recommend this one. Computerworld ZDNet ” Editor rating: Excellent. PC Magazine “ “ Imation has taken its already rugged IronKey USB flash drives, which already featured hardware-based AES 256-bit full disk encryption, and added super-fast USB 3.0 support and flash memory to create a drive that offers five times the minimum average read and write speeds needed for Windows to Go. ” ”

Editor's Notes

  1. Ten years ago if your employer wanted you to use a cell phone, they gave you a phone!Wanted the benefits of you having a phoneAccepted the costs, overhead and inflexibilityToday if your employer wants you to use a cell phone, they say “use your own”They know you have one so they get the benefitBut with no cost, no overhead, greater flexibility – and happier user (get to use the phone they want to use)Now it’s laptops:Until now if your employer has wanted you to use a PC, they’ve given you a PCWanted the benefits of you having a PCAccepted the costs, overhead and inflexibilityBut now employers want to be able to say, “use your own”They know you have one so they’d get the benefitBut gain dramatically lower cost, greater flexibility – and happier user (get to use the PC they want to use)
  2. WTG allows administrators to provide users with a complete Windows 8 image on a supported USB drive. Users simply insert the drive into any hardware that supports Windows 7 or Windows 8, boot the system and find themselves up and running in the familiar corporate computing environment. When they are finished, they just remove the drive and reboot the computer; the system will return to its normal use, with no trace of the user’s computing activity left behind. Enabling boot from USB – Allows host PCs to automatically boot from SUB High performance – full native hardware access on host machine Resilient to unintended removalRedefines mobility
  3. TeleworkingUsers can work remotely or at non-permanent locations.Temporary PersonnelContractors and other temporary workers can be given an environment to use on their own computers, remotely revocable at any time.Continuity of Operations When normal systems are unavailable, full work environments can be distributed easily.Bring Your Own Device (BYOD)Allow employees to use their preferred laptops into the workplace, and have them boot and work from the workspace device. Shared-PC WorkplaceIf your employees work from shared PCs, then provisioning a workspace device to employees allows them to carry their full work environment and data with them and boot securely from any PC.
  4. Centrally administer device access and usage policies with the on-premise IronKey Enterprise Management Server (coming in 2013) .Enforce device-specific policies, including password strength and retry limits, onboard portable applications, and where devices are allowed to be used.Easily manage thousands of IronKey Workspace W500 devices via an intuitive, secure online interface.Securely recover access to user devices and repurpose devices that are no longer in use.Keep up with organizational growth or prepare for business continuity by mass provisioning IronKey Workspace W500 drives with IronKey’s optional provisioning appliance (coming in 2013) .
  5. Provided as software that runs on any Windows 8 PC with one or more USB 3.0 portsThe PC can provision multiple devices by attaching a USB hub, and scale by adding additional hubsSolution performance depends on the hardware underneath – IronKey will recommend configurations for both large and small shopsChose from predefined device profilesConfigures preboot and installs Windows To GoOS in one step (typically ~ 15 minutes per batch)Devices emerge with the OS secured (it is on a locked partition  even though not yet personalized).