7/25/2019 Ironkey Solution Brochure
1/6
7/25/2019 Ironkey Solution Brochure
2/6
7/25/2019 Ironkey Solution Brochure
3/6
7/25/2019 Ironkey Solution Brochure
4/6
0000000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000 0010 00
02040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e90000050 00e9 6a69 0069 a8a9 00a9 28
003c 88880000080 8888 8888 8888 8888 288e be88 8888 88880000090 3b83 5788 8888 8888 76
88f3 88bd e98800000c0 8a18 880c e841 c988 b328 6871 688e 958b00000d0 a948 5862 5884 7
00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000 0000 0000 0
00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 00
0028 fdfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070 0057 7b7a 007a bab9 00
778e 8828 888800000a0 d61f 7abd 8818 8888 467c 585f 8814 818800000b0 8b06 e8f7 88aa 83
3788 1ab4 5a84 3eec00000e0 3d86 dcb8 5cbb 8888 8888 8888 8888 888800000f0 8888 8888 888
0000 0000 0000 0000 000013e0 0000000 0000 0001 0001 1010 0010 0001 0004 01280000010 00
0000 0000 0010 0000 0000 0000 02040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e900000
0057 7b7a 007a bab9 00b9 3a3c 003c 88880000080 8888 8888 80000f0 8888 8888 8888 8888 88
0000 0000000000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000
Managed Mobile Storage
Consolidating Strong Authentication
on a Single Multifunction Device Many of the hardware-based security
features that defend data stored on IronKey
devices also make the IronKey an ideal
multifunction device. Hardware features
such as key management and secure token storage enable
IronKey to deliver the strength of hardware and the
flexibility of software to both two-factor authentication
and secure mobile storage. These features reduce strong
authentication costs and complexity while improving user
satisfaction and adoption since users can now carry
fewer devices.
IronKey has partnered with RSA, VeriSign and
CRYPTOCard to offer integrated solutions for strong
authentication. Additionally, organizations can use the
digital certificate onboard each IronKey device for simple
strong authentication. This capability provides the
critical hardware component needed to validate usersto cloud-based services and Web-enabled applications.
Strong Authentication
Managing Secure Portable Storage
USB flash driveswith their small formfactors, large storage capacities, and high
transfer rateshave revolutionized
mobile data storage. Enterprise IT organiza-
tions, however, face the challenge of preserving the
productivity benefits of flash drives without compromising
security. IronKey has developed a solution that keeps
critical data from leaking out of the organization while
keeping harmful malware from getting into PCs and
networks. It is the worlds most secure USB flash drive.
Managed IronKey drives combine always-onhardware encryption, remote security policy
enforcement, and an array of physical and
electromagnetic defenses that prevent
intruders from accessing the chips or encryption keys.
The IronKey architecture also verifies the users password
in hardware, which thwarts brute-force password
guessing. Additionally, it overcomes the design flaws
inherent in software-based systems that allow hackers to
access and decrypt data without the password. Active
malware defenses further protect IronKey drivesand the
computers and networks on which they are usedfrombecoming infected with viruses and worms.
7/25/2019 Ironkey Solution Brochure
5/6
00020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 0000 0000
dfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070 0057 7b7a 007a bab9 00b9 3a3c
828 888800000a0 d61f 7abd 8818 8888 467c 585f 8814 818800000b0 8b06 e8f7 88aa 8388 8b3b
1ab4 5a84 3eec00000e0 3d86 dcb8 5cbb 8888 80000f0 8888 8888 8888 8888 8888 8888 8888
00000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000 0010 0000
2040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e90000050 00e9 6a69 0069 a8a9 00a9 2828
03c 88880000080 8888 8888 8888 8888 288e be88 8888 88880000090 3b83 5788 8888 8888 7667
8f3 88bd e98800000c0 8a18 880c e841 c988 b328 6871 688e 958b00000d0 a948 5862 5884 7e81
88 8888 8888 00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000
000 0028 0000 0010 0000 00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000
a69 0069 a8a9 00a9 2828 0028 fdfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070
888 00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000 0000 0000
00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 0000
Trusted Virtual Computing
Enabling Safe Workspaces in Hostile
Environments IronKey Trusted Virtual Computing
mobilizes the many benefits of
virtualizationwhich have reduced cost,
increased security and availability, and
enabled more agile business responses in the datacenter
on an ultra-secure USB device. Cutting ties to the data
center and removing reliance on high-bandwidth network
connections makes it possible to solve a broad range of
problems. These solutions include ensuring business
continuity, enabling mobile workers to safely use their
home computers, and outfitting employees andcontractors with a secure portable workspace to use in
potentially hostile environments.
IronKey encapsulates the latest desktop
virtualization technology in a secure
portable USB device. Once configured, this
solution plugs into an employee's home
computer, or almost any Windows PC, and delivers
everything from a complete PC-on-a-stick to an online
banking application that protects commercial banking
customers from funds transfer fraud.
Hardware-based security, strong authenti-
cation, and remote management capabilities
make IronKey multifunction devices an ideal
platform to carryand defendvirtualized
payloads. Additionally, IronKey KeyOS firmware is
optimized not only to meet the demands of virtualization
security but also the performance requirements ofportable desktops, such as writing many files very quickly.
It also can provide a secure pre-boot environment.
Remote Device Control
All IronKey solutions gain an additional
level of security from enterprise-class central
management. The IronKey Enterprise
Management Service enables complete
lifecycle managementfrom provisioning to device
recovery to policy enforcement.
A single dashboard provides visibility and
control, enabling remote administration of
fleets of devices in real time. This includes
remotely applying, enforcing, and updating
security policies. These policies govern password length
and strength, enforcement of device access rules, and
other parameters.
Advanced features, such as audit trails
and remote policy updates, as well as
terminating and wiping lost or stolen devices
remotely allow administrators to monitorand control device usage and prove compliance.
The result is an increased security profile, streamlined
compliance, and reduced capital expenditures and
operational overhead.
7/25/2019 Ironkey Solution Brochure
6/6