10.01.2015 Views

Download Now - Imation

Download Now - Imation

Download Now - Imation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DATA SECURITY, SECURE IDENTITY,<br />

MOBILE WORKSPACE


IMATION MOBILE SECURITY PRODUCTS<br />

IRONKEY ENTERPRISE<br />

S250<br />

D250<br />

IRONKEY PERSONAL,<br />

IRONKEY BASIC<br />

S250 D250<br />

SLC<br />

Flash<br />

Memory<br />

SLC Flash Memory<br />

MLC<br />

Flash<br />

Memory<br />

MLC Flash Memory<br />

Level 3 Validated<br />

AES 256-bit<br />

Hardware Encryption<br />

Password<br />

Authentication<br />

Biometric<br />

Authentication<br />

Strong<br />

2FA<br />

Authentication<br />

Strong 2FA<br />

Authentication<br />

Malware<br />

Protection<br />

Waterproof and<br />

Dustproof<br />

ZERO<br />

Zero footprint<br />

Centralized<br />

MGMT<br />

Software<br />

2,3 2,3 2,3 2,3<br />

2,3 1 1<br />

Centralized MGMT<br />

Software<br />

= Standard = Optional<br />

1 = IronKey Enterprise Management Service and IronKey Enterprise Server<br />

2 = ACCESS Enterprise 3 = McAfee ePolicy Orchestrator


F100 & F150<br />

FLASH<br />

KEY FEATURES:<br />

• FIPS 140-2 Level 3 Validated<br />

• AES 256-bit Hardware Encryption<br />

• One-factor Authentication<br />

• Tamper-resistant, Waterproof and Dustproof<br />

Plastic or Metal Enclosure<br />

• Capacities: 4GB, 8GB, 16GB, 32GB, 64GB<br />

OPTIONAL<br />

• Antivirus Software<br />

• Central Management Software/ Access Enterprise<br />

IMATION F100<br />

Plastic Enclosure<br />

IMATION F150<br />

Metal Enclosure<br />

F200<br />

BIOMETRIC FLASH<br />

KEY FEATURES:<br />

• FIPS 140-2 Level 3 Validated<br />

• AES 256-bit Hardware Encryption<br />

• Two-factor Authentication<br />

• Biometric (fingerprint) Identification<br />

• Tamper-resistant, Waterproof and Dustproof<br />

Metal Enclosure<br />

• Capacities: 4GB, 8GB, 16GB, 32GB, 64GB<br />

OPTIONAL<br />

• Antivirus Software<br />

• Central Management Software/ Access Enterprise<br />

H100 HDD<br />

KEY FEATURES:<br />

• FIPS 140-2 Level 3 Validated<br />

• AES 256-bit Hardware Encryption<br />

• One-factor Authentication<br />

• Tamper-resistant, Metal Enclosure<br />

• Capacities: 320GB, 500GB, 1TB<br />

OPTIONAL<br />

• Antivirus Software<br />

• Central Management Software/ Access Enterprise


H200<br />

BIOMETRIC HDD<br />

KEY FEATURES:<br />

• FIPS 140-2 Level 3 Validated<br />

• AES 256-bit Hardware Encryption<br />

• Two-factor Authentication<br />

• Biometric (fingerprint) Identification<br />

• Tamper-resistant, Metal Enclosure<br />

• Capacities: 320GB, 500GB, 1TB<br />

OPTIONAL<br />

• Antivirus Software<br />

• Central Management Software/<br />

Access Enterprise<br />

ACCESS<br />

ENTERPRISE<br />

• IP Restriction<br />

• Online Usage<br />

• Centralized Device Provisioning<br />

and Management<br />

• Security Policies<br />

• Key Management (user rescue)<br />

• Report and Auditing<br />

MALWARE PROTECTION<br />

• Antivirus Scanning<br />

ALL IMATION FLASH DRIVES<br />

AND PORTABLE HARD DISKS COME<br />

WITH ACCESS STANDARD SOFTWARE.<br />

SECURITY CERTIFICATES<br />

The Federal Information Processing Standards (FIPS) are U.S. government standards<br />

for information technology and computer security. The FIPS program is run by the<br />

National Institute of Standards (NIST). NIST FIPS 140 is the cryptography standard<br />

program required by the US federal government for protection of sensitive data. All<br />

products using cryptography in use by civilian and military US federal agencies must<br />

comply with FIPS 140. The current FIPS version is 140-2.<br />

FIPS 140-2<br />

LEVEL 3<br />

VALIDATED<br />

Obtaining FIPS 140 validation requires a rigorous testing process by an accredited<br />

testing laboratory. The results are then reviewed by the National Institute of<br />

Standards and Technology (NIST) which issues a FIPS 140 validation certificate.<br />

<strong>Imation</strong> Basic, Personal and Enterprise devices were the first to achieve FIPS 140-2<br />

Level 3 certification for an encrypted USB storage device. <strong>Imation</strong> certifies not only<br />

the Cryptochip used to secure data and protect encryption keys but all electronic<br />

components within these devices. This provides customers the assurance that data<br />

stored on these devices will remain secure.


IRONKEY TM<br />

D250 | S250<br />

ENTERPRISE | PERSONAL | BASIC<br />

PORTABLE APPLICATIONS<br />

Secure Browser<br />

Encrypted Backup<br />

Identity Manager<br />

RSA SecurID ®<br />

ULTRAFAST MEMORY<br />

Dual-channel SLC Flash<br />

ALWAYS-ON AES 256-BIT<br />

HARDWARE ENCRYPTION<br />

FIPS Validated 140-2 Level 3<br />

STRONG AUTHENTICATION<br />

PKI 2048-bit RSA<br />

VeriSign ® Identity Protection<br />

CRYPTOCard Digital Certificates<br />

Compatible with:<br />

RUGGED METAL CASING<br />

Waterproof<br />

Tamper-Resistant<br />

(PKCS#11 Cert.)<br />

ENTERPRISE<br />

MANAGEMENT SERVICE<br />

(SECURE CLOUD MANAGEMENT)<br />

Password<br />

Policy<br />

Remote Kill<br />

• Centrally administer access and usage<br />

policies<br />

• Remotely disable or terminate lost or<br />

stolen USB drives<br />

• Enforce device-specific policies<br />

• Easily manage thousands of IronKey<br />

Enterprise devices<br />

• Securely recover access<br />

to user devices<br />

Password<br />

Recovery<br />

Audit & Track


WHICH IRONKEY DEVICE IS RIGHT FOR YOU<br />

FEATURES<br />

Remote Policy Control and Enforcement<br />

Remote lockout or destruction of lost and stolen drives<br />

ENTERPRISE<br />

X<br />

PERSONAL BASIC<br />

User password rules<br />

X<br />

Authorization controls regarding where devices work<br />

X<br />

Authorization restricting offline use<br />

X<br />

Delegated roles separating policy and user administration<br />

X<br />

Access revocation of terminated employees and admins<br />

X<br />

Lifecycle Management<br />

Automated provisioning of policies, services and software<br />

X<br />

User self-help and remote user assistance<br />

X<br />

Management dashboard<br />

X<br />

Device audit, device location and device status reports<br />

X<br />

Remote policy and firmware updating<br />

X<br />

Device recovery, reset and recycle<br />

X<br />

Strong Authentication Token<br />

Onboard or imported X.509 PKI certificate X X<br />

One-Time passwords: RSA SecurID and CRYPTOCard<br />

X<br />

VeriSign Identity Protection (VIP) X X<br />

Windows Client Security Tools<br />

Secure Web browser and Web privacy service X X<br />

Online password management X X<br />

Encrypted local backup X X X<br />

Virtual keyboard X X X<br />

Easy to Use and Deploy<br />

Customizable Control Panel (Windows ® and Mac ® OS X) X X X<br />

Self initializing X X X<br />

No drivers or software to install X X X<br />

Self-Defending<br />

Anti-virus scanning (Optional)<br />

X<br />

Active USB malware protection X X X<br />

Hardware-level protection from brute force password attacks X X X<br />

Detects and responds to physical tampering X X X<br />

Cross-Platform Hardware Encryption<br />

Automatic AES 256 CBC-mode encryption X X X<br />

Cryptochip generates keys with True Random Number Generator X X X<br />

Keys managed in Cryptochip and never leave the device X X X<br />

XP, Vista and Windows 7 X X X<br />

Mac OS X 10.4 and greater X X X<br />

Linux version 2.6 and greater X X X<br />

Rugged, Fast and Physically Hardened<br />

Tamper-resistant and tamper-evident enclosure X X X<br />

Shielded from electronic scanning X X X<br />

Waterproof, shockproof and dustproof X X X<br />

Ultrafast dual channel architecture X X X


IRONKEY TM<br />

WORKSPACE W300<br />

<strong>Imation</strong> IronKey Workspace is a solution<br />

certified for Windows To Go that delivers<br />

a Windows 8 desktop embedded on a<br />

trusted IronKey USB flash drive.<br />

Windows To Go offers a new way to run<br />

your Windows 8 Enterprise workspace on<br />

almost any PC, even if it’s not managed<br />

by your IT department. <strong>Imation</strong> offers a<br />

certified Windows To Go solution that<br />

takes advantage of our expertise with<br />

Windows mobile workspaces.<br />

KEY FEATURES<br />

MOBILITY<br />

A fast, full workspace that fits a pocket<br />

COMPATIBILITY<br />

Microsoft certified for Window To Go<br />

PERFORMANCE<br />

400 MB/s throughput, up to 5 times the<br />

minimum required performance for<br />

Windows To Go drives<br />

SECURITY<br />

Feature password protection<br />

capabilities and up to 256-bit AES full<br />

disk encryption<br />

DEPENDABILITY<br />

The product of thousands of hours of<br />

rigorous reliability testing<br />

For more details, please visit:<br />

www.ironkey.com<br />

A COMPLETE<br />

SOLUTION SUITE<br />

OFFERING:<br />

Military-grade hardware encryption<br />

Strong user authentication, and<br />

optional central administration via the<br />

cloud-based <strong>Imation</strong> Enterprise<br />

Management Service<br />

<strong>Imation</strong> Hong Kong Ltd | 27th Floor, Yen Sheng Centre, 64 Hoi Yuen Road, Kwun Tong, Kowloon<br />

E-mail: imnhk@imation.com | Tel.: (852) 2161 2888 | Fax: (852) 2571 2121<br />

<strong>Imation</strong> and the <strong>Imation</strong> logo are trademarks of <strong>Imation</strong> Corp. All other trademarks are the property of their respective owners.<br />

Copyright © 2013 <strong>Imation</strong>. All rights reserved.<br />

March 2013 | HKA000439


www.ironkey.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!