IMATION MOBILE SECURITY

erosjellySecurity

Feb 23, 2014 (3 years and 7 months ago)

66 views

IMATION MOBILE SECURITY

MACRO TRENDS

Mobile

Workers

Compliance

Regulations

+

Modern Worker

Behavior

+

IT Landscape

MACRO TRENDS

Mobile

Workers

Compliance

Regulations

+

Modern Worker

Behavior

+

IT Landscape

The
Mobility
Gap

WORKERS DEMAND

MACRO TREND

WORKING REMOTELY

40%
of IBM employees

work remotely

26.2M
U.S
. employees
worked at home at least one
day per month in 2010

85%
of Cisco employees

telecommute

SOURCES:
Vancouver Sun, WorldatWork Special Report

MACRO TREND

DATA MOBILITY

91%
reported permitting
removable storage devices
on company networks

66%
do NOT enforce data
encryption on company
issued and personal devices

SOURCE:
Harris Interactive Survey

MACRO TREND


CHANGING WORKSPACES

69%
of
organizations
have some users working
on their own
laptops

82%
of
IT departments
worried about use of
personal devices


SOURCE:
Dimensional Research

MACRO TREND

SECURITY DEMANDS

37%
of
IT decision makers in the
U.S. and Canada reported
unintentional exposure of company
data in the past two years via

theft or loss of removable storage
devices

75%
of organizations have
suffered data loss from
negligent or malicious insiders

SOURCES:
Harris Interactive Survey, Ponemon Institute


CLOSING THE GAP

to letting
employees work

the
way they want to
work

Workforce Needs

Enterprise Security

to protecting and
securing data

SAY YES…

Yes

Yes

BEST OF BREED

+

+

MOBILE SECURITY

FIPS 140
-
2

Level 2 validated
encrypted USB
device

USB security
device with
hardware
-
based
CAC/PIV
authentication

Multifunction

USB security
device with PKI
functions &
encrypted storage

Encrypted

USB device with
hardware
-
based
biometric
authentication

Hardware
-
encrypted portable
USB hard drive

IMATION INNOVATION

Imation Firsts

USB security

device to meet the
NIST SP800
-
56A
secure
communications
standard

FIPS 140
-
2

Level 3 validated
portable security
processor

CESG

CAPS
-
accredited
encrypted USB

flash drive

Liquid metal
enclosure on an
encrypted USB
device

Thixotropic
magnesium
enclosure on an
encrypted USB
device

COMPLETE MOBILITY SOLUTION

MOBILE SECURITY

The information
users need to do
their
jobs

The identities
users

use to access
systems and
communicate

The tools
and
applications that
make users
productive

DATA IN MOTION

Financial Data

Intellectual Property

Legal Data

Customer Data

HR Information

Malware

Unknown Devices

Threats

Military Intelligence Data

Healthcare Patient Data

WHERE WE FIT

HOME

HOT SPOTS

BRANCH OFFICES

ENTERPRISE

CENTRALIZED

MANAGEMENT

MOBILITY & PROTECTION


Safeguard your data with highest security levels
available


Carry files with complete confidence


Great user experience


Meet and exceed compliance regulations


Easy to deploy and use

RUGGED & SECURE…

EASY CLOUD
-
BASED OR ON
-
PREMISE MANAGEMENT


FIPS 140
-
2 Level 3 certified


Endpoint application integration


Remote administration & policy
enforcement


Remotely disable or terminate lost

or stolen USB drives


Administrator device unlock & reset


Self
-
service password recovery


Intuitive user control panel available in
eight languages


BIOMETRIC SECURITY…

ON
-
PREMISE MANAGEMENT


High capacity portable
drives up to 1TB


Active
D
irectory support


S
elf
-
issue devices


Remotely block devices or erase data


Direct device communication allows
policies to be updated anytime


Tailor security policies and device
behavior based on user needs

ACCESS

Enterprise

EVERYTHING YOU NEED, NOTHING YOU
DON’T



Get renowned
IronKey

quality


Affordably comply with storage security
mandates that don’t require FIPS
certification


Durable, quality
-
tested
IronKey

hardware to reliably keep data private
and secure


Ideal cost
-
effective complement to many
FIPS certified members of the
IronKey

family

MANAGE DRIVES WITH MCAFEE
E
POLICY

ORCHESTRATOR
®



Centrally track and manage Imation
encrypted USB drives and use
policies


Proven platform managing more than
58 million enterprise desktops
worldwide


Set customized policies for
authentication, initialization,
revocation and backup


Remote wipe for lost or stolen
devices

TAKE YOUR SECURITY TO THE NEXT LEVEL


Improve authentication security levels


Consolidate the number of passwords


Reduce what users have to carry


Reduce implementation cost by blending identity
into other efforts


Prevent data breaches & meet compliance
regulations

MAKE YOUR EXISTING SECURITY STRONGER


Hardware
-
based multifactor authentication


One device for secure storage & identity


One password unlocks all onboard identities


Easy integration other applications

o
CRYPTOCard

o
RSA SecurID
®

o
VeriSign
®

Identity Protection (VIP)

o
Email

o
Document Management


TRANSFORM ANY COMPUTER INTO AN IT
-
MANAGED SYSTEM


Give mobile users full
-
featured work
environments


Lock down workspaces with high security


Reduce desktop image support time & cost


Great user experience


High user mobility

FULLY
-
FUNCTIONAL WORKSTATION THAT FITS IN YOUR POCKET

FULL WINDOWS DESKTOP ON A SECURE USB


Devices
act like laptops

images managed
like you do
today


Boot
-
from
-
USB, full host computer

isolation


No virtualization, fast, full windows desktop


Fully hardware encrypted


FIPS 140
-
2, Level 3 validated


Centrally
-
manageable security policies


Active Directory integration


Dedicated appliance for mass device
imaging


No install required for end users

Microsoft Windows 7

IRONKEY

WORKSPACE


Provide users with an imaged and fully functioning
version of Windows 8


Take advantage of all the performance
improvements offered by USB 3.0


Protect portable desktops with 128
-
bit or 256
-
bit
AES full disk encryption and password
authentication


Automatically protect data upon device removal


Waterproof, dust proof and shock resistant


Delivers
up to five times the minimum read/write
performance requirements for WTG
devices


BitLocker encryption to protect data


Zero client footprint; no network access required


Full usage of local hardware and resources



WHY IMATION MOBILE SECURITY


Highest security levels available
today


Rugged solutions deployed in the
world’s most demanding
organizations


Unmatched deployment flexibility


On premise


Cloud
-
based


IMATION MOBILE SECURITY

…TO SECURING THE MOBILE WORKFORCE.

Yes