Access "Product Review: IronKey Enterprise Secure Flash Drive"
This article is part of the February 2009 issue of Improving your network security strategy in a recession
DATA PROTECTION IronKey Enterprise Secure Flash Drive IronKey Price: From $79 to $299 for 1, 2, 4, and 8 GB devices IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives. Administrators can deny access to a flash drive until it verifies status with a management server, disable access to the device entirely, or destroy the contents to counter loss and theft. Capabilities A All IronKey Flash devices are waterproof, and feature tamper-proofing to foil chip extraction techniques, and limited access attempts before flash contents are destroyed. Each device includes a high-speed, military grade crypto chip that operates in AES Cipher-block mode for data encryption, and that supports 2048-bit RSA keys for PKI and 256-bit SHA for hashing (complies with FIPS Validations 140-2 Level, 186-2, and 197). Each device is also assigned a unique digital certificate. IronKey also provides a secure password store and does not permit encryption keys to be copied to other devices. The unit includes support ... Access >>>
Premium Content for Free.
10 tips to improve your network security strategy in a recession
Here are 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
Recession forces security to measure and prioritize risks
Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof.
Encryption, DLP, disaster recovery top 2009 priorities
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the top priorities for security managers.
Product Review: IronKey Enterprise Secure Flash Drive
by Ed Tittel, Contributor
IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives.
- 10 tips to improve your network security strategy in a recession
Product Review: PGP Endpoint
PGP Endpoint provides automated whole disk encryption that is centrally managed.
Product Review: Rohati TNS 100
Rohati's Transaction Network System brings NAC to the application level, and delivers granular access control for Web-based applications and file shares.
Product Review: Astaro Mail Gateway 4000
Astaro Mail Gateway 4000 is an antivirus and antispam appliance that is suitable for a midmarket organizations because of its simple central management capabilities.
- Product Review: PGP Endpoint
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.
Shoestring security budgets mean innovation and prioritization
Security managers face a lean economic year in 2009, but that doesn't mean threats and compliance demands will abate.
Proactive state privacy laws change security focus to prevention
New data breach notification acts in Nevada and Massachusetts are changing the way that organizations handle data.
Schneier, Ranum debate social networking risks
Should companies be concerned about employees' social networking? Bruce Schenier and Marcus Ranum take opposite sides on this issue.
- Vein-reader biometric authentication for health care, financials
More Premium Content Accessible For Free
Compliance and risk modeling
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...
Essentials: Threat detection
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises ...
Managing identities in hybrid worlds
The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based ...