HOW IT WORKS 1. Shut down host computer 2. Insert IronKey Workspace device into USB slot 3. Reboot 4. Authenticate user identity to device 5. You’re now in the Zone Host PC Boot from USB IronKey Workspace SECURE USB DEVICES IronKey Workspace MWES Edition Strong Preboot Authentication Hardware encrypted operating system, applications and data SECURE USB DESKTOP MAKES ANY COMPUTER A FULLY TRUSTED, IT-MANAGED SYSTEM IronKey Workspace Microsoft Windows Embedded Standard (MWES) Edition allows users to transform any computer into a trusted Microsoft Windows environment, with all the security of a standard IT-managed system. When the user disconnects, they take everything with them, and no trace of their presence remains. IronKey Workspace MWES Edition provides Microsoft Windows native boot on a secure USB drive. Virtualization-free, it yields a rich user experience. Unlike competing solutions, integrated provisioning and management components provide quick and secure deployments, even to extremely large user populations. SECURITY IronKey Workspace MWES provides AES-256 bit full disk encryption for the entire operating system and all user data. This encryption is verified in hardware for strong security that meets the regulatory requirements for the Federal Information Processing Standardization (FIPS) 140-2, Level 3 validation. Full isolation of the user environment is provided, preventing transfer of malware or user data to or from the host computer. The IronKey Workspace MWES solution disables the host hard drive sub system. Furthermore, the portable operating system is protected against tampering, with in-hardware prevention of access outside of the boot environment. BENEFITS • Direct-boot, virtualization-free, secure portable Microsoft Windows • Rich user experience and rapid performance • Unique Adaptation™ device driver technology • Optional Crossover Storage partition • Full customer control of desktop image • No reliance on network connectivity WHERE IT’S NEEDED TELEWORKING Users can work remotely or at non-permanent locations, whether the home worker, someone on the road, or a soldier in-theatre. TEMPORARY PERSONNEL Contractors and other temporary workers can be given an environment to use on their own computers, remotely revocable at any time. DISASTER RECOVERY When normal systems are unavailable because of weather conditions, health quarantines, or terrorism, full work environments can be distributed easily. WORKSPACE SEPARATION Allow use of a single computer, even when regulatory or security issues demand that users separate their work environments. SECURING THE MOBILE WORKFORCE IRONKEY WORKSPACE MICROSOFT WINDOWS EMBEDDED STANDARD EDITION