Access "Product Review: IronKey Enterprise Secure Flash Drive"
This article is part of the February 2009 issue of Improving your network security strategy in a recession
DATA PROTECTION IronKey Enterprise Secure Flash Drive IronKey Price: From $79 to $299 for 1, 2, 4, and 8 GB devices IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives. Administrators can deny access to a flash drive until it verifies status with a management server, disable access to the device entirely, or destroy the contents to counter loss and theft. Capabilities A All IronKey Flash devices are waterproof, and feature tamper-proofing to foil chip extraction techniques, and limited access attempts before flash contents are destroyed. Each device includes a high-speed, military grade crypto chip that operates in AES Cipher-block mode for data encryption, and that supports 2048-bit RSA keys for PKI and 256-bit SHA for hashing (complies with FIPS Validations 140-2 Level, 186-2, and 197). Each device is also assigned a unique digital certificate. IronKey also provides a secure password store and does not permit encryption keys to be copied to other devices. The unit includes support ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
10 tips to improve your network security strategy in a recession
Here are 10 steps you can take to improve your threat management posture that require minimum investment, manpower and give you a fast return on your investment.
-
Recession forces security to measure and prioritize risks
Compliance demands, hacker threats, insider risks and integration concerns brought on by mergers and acquisitions make information security somewhat recession proof.
-
Encryption, DLP, disaster recovery top 2009 priorities
Information Security magazine's annual Priorities 2009 survey identifies data protection and disaster recovery among the top priorities for security managers.
-
Product Review: IronKey Enterprise Secure Flash Drive
by Ed Tittel, Contributor
IronKey Enterprise Secure Flash Drives enable organizations to control access to sensitive information on portable flash drives.
-
10 tips to improve your network security strategy in a recession
-
-
Product Review: PGP Endpoint
PGP Endpoint provides automated whole disk encryption that is centrally managed.
-
Product Review: Rohati TNS 100
Rohati's Transaction Network System brings NAC to the application level, and delivers granular access control for Web-based applications and file shares.
-
Product Review: Astaro Mail Gateway 4000
Astaro Mail Gateway 4000 is an antivirus and antispam appliance that is suitable for a midmarket organizations because of its simple central management capabilities.
-
Product Review: PGP Endpoint
-
Columns
-
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.
-
Shoestring security budgets mean innovation and prioritization
Security managers face a lean economic year in 2009, but that doesn't mean threats and compliance demands will abate.
-
Proactive state privacy laws change security focus to prevention
New data breach notification acts in Nevada and Massachusetts are changing the way that organizations handle data.
-
Schneier, Ranum debate social networking risks
Should companies be concerned about employees' social networking? Bruce Schenier and Marcus Ranum take opposite sides on this issue.
-
Vein-reader biometric authentication for health care, financials
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...