IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior...

Post on 11-Jan-2016

218 views 2 download

Tags:

Transcript of IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior...

IMATION MOBILE SECURITY

MACRO TRENDS

MobileWorkers

Compliance Regulations+Modern Worker

Behavior + IT Landscape

MACRO TRENDS

MobileWorkers

Compliance Regulations+Modern Worker

Behavior + IT LandscapeThe Mobility Gap

W O R K E R S D E M A N D

FlexibilityUsability

Choice

MACRO TREND—WORKING REMOTELY

40% of IBM employeeswork remotely

26.2M U.S. employees worked at home at least one

day per month in 2010

85% of Cisco employeestelecommute

SOURCES: Vancouver Sun, WorldatWork Special Report

MACRO TREND—DATA MOBILITY

91% reported permitting removable storage devices

on company networks

66% do NOT enforce data encryption on company

issued and personal devices

SOURCE: Harris Interactive Survey

MACRO TREND — CHANGING WORKSPACES

69% of organizations have some users working

on their own laptops

82% of IT departments worried about use of

personal devices

SOURCE: Dimensional Research

MACRO TREND—SECURITY DEMANDS

37% of IT decision makers in the U.S. and Canada reported

unintentional exposure of company data in the past two years via

theft or loss of removable storage devices

75% of organizations have suffered data loss from

negligent or malicious insiders

SOURCES: Harris Interactive Survey, Ponemon Institute

CLOSING THE GAP

to letting employees work the way they want to work

Workforce Needs Enterprise Security

to protecting and securing data

SAY YES…

Yes Yes

BEST OF BREED

+ +

MOBILE SECURITY

FIPS 140-2Level 2 validated encrypted USB

device

USB security device with

hardware-based CAC/PIV

authentication

Multifunction USB security

device with PKI functions &

encrypted storage

EncryptedUSB device with hardware-based

biometric authentication

Hardware-encrypted portable

USB hard drive

IMATION INNOVATION

Imation Firsts

USB security device to meet the NIST SP800-56A

secure communications

standard

FIPS 140-2Level 3 validated portable security

processor

CESG CAPS-accredited encrypted USB

flash drive

Liquid metal enclosure on an encrypted USB

device

Thixotropic magnesium

enclosure on an encrypted USB

device

COMPLETE MOBILITY SOLUTION

MOBILE SECURITY

The information users need to do

their jobs

The identities users

use to access systems and communicate

The tools and applications that

make users productive

DATA IN MOTION

Financial Data

Intellectual Property

Legal Data

Customer Data

HR Information

Malware

Unknown Devices

Threats

Military Intelligence Data

Healthcare Patient Data

WHERE WE FIT

HOME

HOT SPOTS

BRANCH OFFICES

ENTERPRISE

CENTRALIZED MANAGEMENT

MOBILITY & PROTECTION

• Safeguard your data with highest security levels available

• Carry files with complete confidence

• Great user experience

• Meet and exceed compliance regulations

• Easy to deploy and use

RUGGED & SECURE…

EASY CLOUD-BASED OR ON-PREMISE MANAGEMENT

• FIPS 140-2 Level 3 certified

• Endpoint application integration

• Remote administration & policy enforcement

• Remotely disable or terminate lost or stolen USB drives

• Administrator device unlock & reset

• Self-service password recovery

• Intuitive user control panel available in eight languages

BIOMETRIC SECURITY…

ON-PREMISE MANAGEMENT

• High capacity portable drives up to 1TB

• Active Directory support

• Self-issue devices

• Remotely block devices or erase data

• Direct device communication allows policies to be updated anytime

• Tailor security policies and device behavior based on user needs

ACCESS Enterprise

EVERYTHING YOU NEED, NOTHING YOU DON’T

• Get renowned IronKey quality

• Affordably comply with storage security mandates that don’t require FIPS certification

• Durable, quality-tested IronKey hardware to reliably keep data private and secure

• Ideal cost-effective complement to many FIPS certified members of the IronKey family

MANAGE DRIVES WITH MCAFEE EPOLICY ORCHESTRATOR®

• Centrally track and manage Imation encrypted USB drives and use policies

• Proven platform managing more than 58 million enterprise desktops worldwide

• Set customized policies for authentication, initialization, revocation and backup

• Remote wipe for lost or stolen devices

TAKE YOUR SECURITY TO THE NEXT LEVEL

• Improve authentication security levels

• Consolidate the number of passwords

• Reduce what users have to carry

• Reduce implementation cost by blending identity into other efforts

• Prevent data breaches & meet compliance regulations

MAKE YOUR EXISTING SECURITY STRONGER

• Hardware-based multifactor authentication

• One device for secure storage & identity

• One password unlocks all onboard identities

• Easy integration other applications

o CRYPTOCard

o RSA SecurID®

o VeriSign® Identity Protection (VIP)

o Email

o Document Management

TRANSFORM ANY COMPUTER INTO AN IT-MANAGED SYSTEM

• Give mobile users full-featured work environments

• Lock down workspaces with high security

• Reduce desktop image support time & cost

• Great user experience

• High user mobility

FULLY-FUNCTIONAL WORKSTATION THAT FITS IN YOUR POCKET

FULL WINDOWS DESKTOP ON A SECURE USB

• Devices act like laptops—images managed like you do today

• Boot-from-USB, full host computer isolation

• No virtualization, fast, full windows desktop

• Fully hardware encrypted

• FIPS 140-2, Level 3 validated

• Centrally-manageable security policies

• Active Directory integration

• Dedicated appliance for mass device imaging

• No install required for end users

Microsoft Windows 7

IRONKEY WORKSPACE

• Provide users with an imaged and fully functioning version of Windows 8

• Take advantage of all the performance improvements offered by USB 3.0

• Protect portable desktops with 128-bit or 256-bit AES full disk encryption and password authentication

• Automatically protect data upon device removal

• Waterproof, dust proof and shock resistant

• Delivers up to five times the minimum read/write performance requirements for WTG devices

• BitLocker encryption to protect data

• Zero client footprint; no network access required

• Full usage of local hardware and resources

WHY IMATION MOBILE SECURITY

• Highest security levels available today

• Rugged solutions deployed in the world’s most demanding organizations

• Unmatched deployment flexibility– On premise– Cloud-based

IMATION MOBILE SECURITY…TO SECURING THE MOBILE WORKFORCE.

Yes