1 / 31

Imation mobile security

Imation mobile security . Macro Trends. Modern Worker Behavior. Compliance Regulations. IT Landscape. +. +. Mobile Workers. Macro Trends. Modern Worker Behavior. Compliance Regulations. IT Landscape. +. +. The Mobility Gap. Mobile Workers. Workers Demand. Flexibility.

sabina
Télécharger la présentation

Imation mobile security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Imation mobile security

  2. Macro Trends Modern Worker Behavior Compliance Regulations IT Landscape + + Mobile Workers

  3. Macro Trends Modern Worker Behavior Compliance Regulations IT Landscape + + The Mobility Gap Mobile Workers

  4. Workers Demand Flexibility Usability Choice

  5. Macro Trend—Working Remotely 40% of IBM employeeswork remotely 85% of Cisco employeestelecommute 26.2M U.S. employees worked at home at least one day per month in 2010 SOURCES: Vancouver Sun, WorldatWork Special Report

  6. Macro Trend—Data Mobility 91% reported permitting removable storage devices on company networks 66% do NOT enforce data encryption on company issued and personal devices SOURCE: Harris Interactive Survey

  7. Macro Trend — Changing Workspaces 69% of organizations have some users working on their own laptops 82% of IT departments worried about use of personal devices SOURCE: Dimensional Research

  8. Macro Trend—Security Demands 37% of IT decision makers in the U.S. and Canada reported unintentional exposure of company data in the past two years viatheft or loss of removable storage devices 75% of organizations have suffered data loss from negligent or malicious insiders SOURCES: Harris Interactive Survey, Ponemon Institute

  9. Closing the Gap

  10. Say yes… Yes Yes to protecting and securing data to letting employees work the way they want to work Workforce Needs Enterprise Security

  11. Best of Breed MOBILE SECURITY + +

  12. Imation Innovation Hardware-encrypted portable USB hard drive EncryptedUSB device with hardware-based biometric authentication Multifunction USB security device with PKI functions & encrypted storage USB security device with hardware-based CAC/PIV authentication FIPS 140-2Level 2 validated encrypted USB device Imation Firsts Liquid metal enclosure on an encrypted USB device Thixotropic magnesium enclosure on an encrypted USB device CESG CAPS-accredited encrypted USB flash drive USB security device to meet the NIST SP800-56A secure communications standard FIPS 140-2Level 3 validated portable security processor

  13. Complete Mobility Solution

  14. Mobile Security The information users need to do their jobs The identities users use to access systems and communicate The tools and applications that make users productive

  15. Data in Motion Malware Financial Data Intellectual Property Unknown Devices Legal Data Military Intelligence Data Customer Data Healthcare Patient Data HR Information Threats

  16. Where We Fit Centralized Management ENTERPRISE BRANCH OFFICES HOME HOT SPOTS

  17. Mobility & Protection • Safeguard your data with highest security levels available • Carry files with complete confidence • Great user experience • Meet and exceed compliance regulations • Easy to deploy and use

  18. Rugged & Secure…

  19. Easy Cloud-Based or On-Premise Management FIPS 140-2 Level 3 certified Endpoint application integration Remote administration & policy enforcement Remotely disable or terminate lost or stolen USB drives Administrator device unlock & reset Self-service password recovery Intuitive user control panel available in eight languages

  20. Biometric Security…

  21. On-premise Management ACCESSEnterprise High capacity portable drives up to 1TB Active Directory support Self-issue devices Remotely block devices or erase data Direct device communication allows policies to be updated anytime Tailor security policies and device behavior based on user needs

  22. Everything you need, nothing you don’T • Get renowned IronKey quality • Affordably comply with storage security mandates that don’t require FIPS certification • Durable, quality-tested IronKey hardware to reliably keep data private and secure • Ideal cost-effective complement to many FIPS certified members of the IronKey family

  23. Manage Drives with McAfee ePolicy orchestrator® • Centrally track and manage Imation encrypted USB drives and use policies • Proven platform managing more than 58 million enterprise desktops worldwide • Set customized policies for authentication, initialization, revocation and backup • Remote wipe for lost or stolen devices

  24. Take Your Security to the Next Level • Improve authentication security levels • Consolidate the number of passwords • Reduce what users have to carry • Reduce implementation cost by blending identity into other efforts • Prevent data breaches & meet compliance regulations

  25. Make Your Existing Security Stronger • Hardware-based multifactor authentication • One device for secure storage & identity • One password unlocks all onboard identities • Easy integration other applications • CRYPTOCard • RSA SecurID® • VeriSign® Identity Protection (VIP) • Email • Document Management

  26. Transform any Computer into an IT-Managed System • Give mobile users full-featured work environments • Lock down workspaces with high security • Reduce desktop image support time & cost • Great user experience • High user mobility

  27. Fully-functional Workstation that Fits in Your Pocket

  28. Full Windows Desktop on a Secure USB Microsoft Windows 7 Devices act like laptops—images managed like you do today Boot-from-USB, full host computer isolation No virtualization, fast, full windows desktop Fully hardware encrypted FIPS 140-2, Level 3 validated Centrally-manageable security policies Active Directory integration Dedicated appliance for mass device imaging No install required for end users

  29. IronKey Workspace • Provide users with an imaged and fully functioning version of Windows 8 • Take advantage of all the performance improvements offered by USB 3.0 • Protect portable desktops with 128-bit or 256-bit AES full disk encryption and password authentication • Automatically protect data upon device removal • Waterproof, dust proof and shock resistant • Delivers up to five times the minimum read/write performance requirements for WTG devices • BitLocker encryption to protect data • Zero client footprint; no network access required • Full usage of local hardware and resources

  30. Why Imation MOBILE SECURITY • Highest security levels available today • Rugged solutions deployed in the world’s most demanding organizations • Unmatched deployment flexibility • On premise • Cloud-based

  31. Yes …TO SECURING THE MOBILE WORKFORCE. Imation Mobile Security

More Related