imation mobile security. macro trends mobile workers compliance regulations + modern worker behavior...
TRANSCRIPT
IMATION MOBILE SECURITY
MACRO TRENDS
MobileWorkers
Compliance Regulations+Modern Worker
Behavior + IT Landscape
MACRO TRENDS
MobileWorkers
Compliance Regulations+Modern Worker
Behavior + IT LandscapeThe Mobility Gap
W O R K E R S D E M A N D
FlexibilityUsability
Choice
MACRO TREND—WORKING REMOTELY
40% of IBM employeeswork remotely
26.2M U.S. employees worked at home at least one
day per month in 2010
85% of Cisco employeestelecommute
SOURCES: Vancouver Sun, WorldatWork Special Report
MACRO TREND—DATA MOBILITY
91% reported permitting removable storage devices
on company networks
66% do NOT enforce data encryption on company
issued and personal devices
SOURCE: Harris Interactive Survey
MACRO TREND — CHANGING WORKSPACES
69% of organizations have some users working
on their own laptops
82% of IT departments worried about use of
personal devices
SOURCE: Dimensional Research
MACRO TREND—SECURITY DEMANDS
37% of IT decision makers in the U.S. and Canada reported
unintentional exposure of company data in the past two years via
theft or loss of removable storage devices
75% of organizations have suffered data loss from
negligent or malicious insiders
SOURCES: Harris Interactive Survey, Ponemon Institute
CLOSING THE GAP
to letting employees work the way they want to work
Workforce Needs Enterprise Security
to protecting and securing data
SAY YES…
Yes Yes
BEST OF BREED
+ +
MOBILE SECURITY
FIPS 140-2Level 2 validated encrypted USB
device
USB security device with
hardware-based CAC/PIV
authentication
Multifunction USB security
device with PKI functions &
encrypted storage
EncryptedUSB device with hardware-based
biometric authentication
Hardware-encrypted portable
USB hard drive
IMATION INNOVATION
Imation Firsts
USB security device to meet the NIST SP800-56A
secure communications
standard
FIPS 140-2Level 3 validated portable security
processor
CESG CAPS-accredited encrypted USB
flash drive
Liquid metal enclosure on an encrypted USB
device
Thixotropic magnesium
enclosure on an encrypted USB
device
COMPLETE MOBILITY SOLUTION
MOBILE SECURITY
The information users need to do
their jobs
The identities users
use to access systems and communicate
The tools and applications that
make users productive
DATA IN MOTION
Financial Data
Intellectual Property
Legal Data
Customer Data
HR Information
Malware
Unknown Devices
Threats
Military Intelligence Data
Healthcare Patient Data
WHERE WE FIT
HOME
HOT SPOTS
BRANCH OFFICES
ENTERPRISE
CENTRALIZED MANAGEMENT
MOBILITY & PROTECTION
• Safeguard your data with highest security levels available
• Carry files with complete confidence
• Great user experience
• Meet and exceed compliance regulations
• Easy to deploy and use
RUGGED & SECURE…
EASY CLOUD-BASED OR ON-PREMISE MANAGEMENT
• FIPS 140-2 Level 3 certified
• Endpoint application integration
• Remote administration & policy enforcement
• Remotely disable or terminate lost or stolen USB drives
• Administrator device unlock & reset
• Self-service password recovery
• Intuitive user control panel available in eight languages
BIOMETRIC SECURITY…
ON-PREMISE MANAGEMENT
• High capacity portable drives up to 1TB
• Active Directory support
• Self-issue devices
• Remotely block devices or erase data
• Direct device communication allows policies to be updated anytime
• Tailor security policies and device behavior based on user needs
ACCESS Enterprise
EVERYTHING YOU NEED, NOTHING YOU DON’T
• Get renowned IronKey quality
• Affordably comply with storage security mandates that don’t require FIPS certification
• Durable, quality-tested IronKey hardware to reliably keep data private and secure
• Ideal cost-effective complement to many FIPS certified members of the IronKey family
MANAGE DRIVES WITH MCAFEE EPOLICY ORCHESTRATOR®
• Centrally track and manage Imation encrypted USB drives and use policies
• Proven platform managing more than 58 million enterprise desktops worldwide
• Set customized policies for authentication, initialization, revocation and backup
• Remote wipe for lost or stolen devices
TAKE YOUR SECURITY TO THE NEXT LEVEL
• Improve authentication security levels
• Consolidate the number of passwords
• Reduce what users have to carry
• Reduce implementation cost by blending identity into other efforts
• Prevent data breaches & meet compliance regulations
MAKE YOUR EXISTING SECURITY STRONGER
• Hardware-based multifactor authentication
• One device for secure storage & identity
• One password unlocks all onboard identities
• Easy integration other applications
o CRYPTOCard
o RSA SecurID®
o VeriSign® Identity Protection (VIP)
o Email
o Document Management
TRANSFORM ANY COMPUTER INTO AN IT-MANAGED SYSTEM
• Give mobile users full-featured work environments
• Lock down workspaces with high security
• Reduce desktop image support time & cost
• Great user experience
• High user mobility
FULLY-FUNCTIONAL WORKSTATION THAT FITS IN YOUR POCKET
FULL WINDOWS DESKTOP ON A SECURE USB
• Devices act like laptops—images managed like you do today
• Boot-from-USB, full host computer isolation
• No virtualization, fast, full windows desktop
• Fully hardware encrypted
• FIPS 140-2, Level 3 validated
• Centrally-manageable security policies
• Active Directory integration
• Dedicated appliance for mass device imaging
• No install required for end users
Microsoft Windows 7
IRONKEY WORKSPACE
• Provide users with an imaged and fully functioning version of Windows 8
• Take advantage of all the performance improvements offered by USB 3.0
• Protect portable desktops with 128-bit or 256-bit AES full disk encryption and password authentication
• Automatically protect data upon device removal
• Waterproof, dust proof and shock resistant
• Delivers up to five times the minimum read/write performance requirements for WTG devices
• BitLocker encryption to protect data
• Zero client footprint; no network access required
• Full usage of local hardware and resources
WHY IMATION MOBILE SECURITY
• Highest security levels available today
• Rugged solutions deployed in the world’s most demanding organizations
• Unmatched deployment flexibility– On premise– Cloud-based
IMATION MOBILE SECURITY…TO SECURING THE MOBILE WORKFORCE.
Yes