You are on page 1of 6

The Worlds Most Secure

Portable Solution for Data,


Desktops and Identity

00
0020
0
0
0
0
40
0010
0000
0
0
4
0
0
0
0
02
00fc
0028
0000
0
0
6
0
0
0
0
0
0
0
00
00
8888
0016
dfc0
0000
f
0
8
0
8
0
8
0
8
1
2
00
00
0 8
10 0
818
0008
0000
2828
0000
0
0
0
bd 8
0
8
9
8
a
0
2
a
8
7
0
1
0
8
0
0
0
8
61f
988
00
a9
3c
004
a0 d
41 c
0 00
9 a8
c 00
01 0
0
8
3
6
3
0
0
e
0
0
a
0
0
0
0
3
00
000
80c
0f0
69
010 VIRTUAL
00b9
8888
TRUSTED
VIRTUAL
0000
8000
18 8
9 6a
9
10 0
8
a
e
b
0
2
8
0
8
0
a
1
8
8
0
0
b
8
88
00
00
0c0
001 COMPUTING
50
007a
778e
0 00
5cbb
0000
0000
0000
01 0
3
a
7
8
0
0
1
7
8
6
8
0
9
0
0
b
b
6
9
0
e
0
7
c
7
e
d
00
e8
00
000
*00
0057
8888
88bd
3d86
0000
6 00
00 0
0000
0048
0
8
1
0
3
0
7
8
0
0
f
4
0
8
e
0
8
0
0
8
0
0
4
0
8
8
00
00
00
47
10
00
000
0000
5788
8b3b
eec0
0001
0000
0 00
0 00
00c8
5857
3
3
0
8
1
8
0
8
0
0
0
8
8
b
4
0
3
0
0
0
c
d
8
00
00
c7
00
5a8
000
0 3
0000
00a9
88aa
9d8
ab4
0128
0009
0000
0
0084
9
d
1
0
0
7
a
0
4
0
0
f
8
4
8
8
8
0
0
0
8
a
8
e
00
00
83
009
378
888
30
00
0069
8b06
e81
898
888
0000
0001
0000
7
9
9
8
0020
0
0
6
0
0
0
b
a
4
9
0
8
0
0
1
0
6
8
0
8
0
0
0
0
8
0
e
0
0
0
0
5
9
001
0
b
00
00
00
62
10
00e
040
10
288e
8188
0001
0 00
8 58
0000
050
1 10
0 00
0
0
4
4
4
0
0
0
0
0
9
1
0
0
0
0
0
0
a
8
2
0
0
0
0
8888
8
0
0
STRONG
90
fc
d0
00
eSTRONG
28
01
585f
0000
8888
0 00
0000
0 00
0 00
8 e8
0 00
6
0
0
c
0
4
0
0
0
b
8
0
7
0
0
0
0
0
8
8
0
6
0
0
0
0
0
5
8
4
0
AUTHENTICATION
AUTHENTICATION
9
8
00
88
04
48
00
016
0000
fdfc
688e
8888
8 88
1 00
8 47
0000
00 0
8
0
c
0
1
0
8
8
0
8
0
0
1
7
0
2
8
0
8
0
0
0
8
0
0
8
0
6
0
0
8
80
18
00
c8
010
0000
2828
0000
8888
0000
d 88
0 00
4 c7
0000
0
b
2
8
0
8
9
8
0
8
a
0
0
0
2
a
8
0
8
7
0
0
0
1
0
8
0
8
0
0
0
8
0
8
000
1f
c988
8384
0004
0000
a8a9
0000
003c
0020
0 d6
1
4
1
a
4
0
0
9
c
0
0
0
0
8
0
3
6
3
0
0
0
0
e
0
0
0
0
0
3a
00
00
0
000
000
40
880c
0010
000f
6a69
00b9
8888
0010
0000
0
0000
8
0
0
8
0
1
9
9
1
8
0
4
a
e
b
0
2
0
8
0
0
8
ba
88
00
02
888
000
c0
01 1
0 00
0000
007a
778e
cbb
0000
000
0000
0005
1 00
0
5
0
0
0
0
3
a
7
8
0
0
0
1
7
8
6
8
0
0
9
0
7b
76
e9
00
8e
000
dcb
000
00
000
8bd
00*0
48 e
d86
0057
8888
8
000
0 00
0
0
3
0
0
0
0
0
8
16 0
0
3
0
7
8
0
0
f
4
0
8
e
0
8
0
0
8
0
0
4
0
0
8
0
8
0
0
MANAGED
MANAGED
7
0
0
0
0
0
4
00
88
010
000
3b
000
0001
0000
00c8
5857
3 57
3eec
00 0
8 8b
10 0
8
0
8
0
0
0
8
8
b
4
0
3
0
0
0
c
d
MOBILE
STORAGE
MOBILE
STORAGE
3
8
8
0
0
0
7
0
0
0
c
0
5a
00
a9
90
000
aa
0128
0000
0084
9 00
d9d8
1ab4
0000
00 0
7 88
a
0
4
0
0
f
8
4
8
8
8
0
0
0
8
a
8
9
8
8
0
0
e
3
0
7
0
0
8
0
3
88
69
00
030
8b06
0000
0001
7e81
9 00
9898
8888
0020
0000
0
6
0
0
0
b
a
4
9
0
8
0
0
1
0
6
8
1
0
8
0
0
0
0
8
0
0
5
00
00
be
e9
0 0
000
40
0000
5862
1010
0 00
0010
288e
0010
8188
0000
5
0
0
8
0
0
1
0
0
8
0
4
4
4
0
0
0
0
8
0
9
1
0
0
0
0
0
0
0
88
88
02
00
000
0 a
00fc
0000
e8e9
000
0028
0001
888
000d
585f
0
8
0
0
0
0
8
0
6
0
0
c
0
4
0
0
0
b
8
0
7
0
0
0
0
0
0
00
46
00
000
958
888
0016
0004
4748
000
dfc0
0000
888
0
f
688e
0
8
0
1
8
0
0
0
c
0
1
0
8
8
0
0
0
1
7
0
0
00
68
000
002
888
0 0
0000
c7c8
000
828
000
888
0001
0
2
0
8
0
0
4
0
2
8
0
8
9
8
0
0
00
000
012
00a
888
000
000
004
8384
000
8a9
000
0200
0
0
a
0
0
4
1
0
0
9
0
0
0
00
00
003
006
000
000
010
0000
0040
a69
0
010
0
0
6
0
0
0
0
0
0
9
1
0
10
204
00
00e
000
00 0
0 00
0001
050
0
0
0
0
0
0
1
0
0
0
00
00
e90
0000
0 00
0000
8 e8
THE KEY TO PORTABLE SECU R I T Y
0
4
0
0
0
0
0
0
0
04
48
0
7
0000
0
4
0c8
0001
c8 0
7
0000
c
0084
8384

An IronKey for Everyone


IRONKEY ENTERPRISE
Secure Multifunction Device for Mobile Workers
Combines AES 256-bit hardware-encrypted IronKey
USB flash drives with central management. Always-on
encryption protects critical data from loss while intelligent
anti-malware keeps out malicious code. You can remotely
enforce security policies across thousands of IronKey
Enterprise devices.

IRONKEY BASIC
The Worlds Most Secure Flash Drive
Provides hardware encryption, anti-malware, and secure
backup. IronKey Basic meets the needs of military,
government, and enterprise users. IronKey products are
the first flash drives validated to meet the Security Level 3
requirements of the FIPS 140-2 standard.

IRONKEY PERSONAL
Personal Security Device
Consolidates data and identity protection. Military-grade
hardware encryption safeguards users personal files
while stealth Web browsing, anti-malware, and
password management protect their privacy and prevent
identity theft.

Intelligent Self-Defending Devices


IronKey devices protect data and networks with active
malware defenses, strong two-factor authentication
(onboard certificate in hardware), onboard security
co-processors, and onboard anti-virus scanning software.
The devices can also receive automated security
and anti-malware updates over the Internet or corporate
networkwith the absolute security provided by authentication in hardware. IronKey malware defenses include:
Anti-worm secure AutoRun protection
Write protectionRead-Only mode prevents infection
from the host PC
Policy-based controls to restrict usage to trusted networks
Anti-virus scanning
Secure manufacturing processesall IronKey devices
are designed and assembled in the USA

Cross Platform and Device Independent


IronKey devices simply plug in and go. They work with
Windows 2000, Windows XP SP2 or later, and Vista
without administrator privileges or installing any software
or drivers. IronKey drives will protect data on Macintosh
computers running Mac OS 10.4 or later, or Linux
computers running Linux 2.6 or later.

Record Losses
Almost all US states, as well
as national governments
around the world, have
passed privacy laws. In
many states, encryption
provides the only safe
harbor from stiff penalties
and public disclosure
requirementsand the
latest legislation mandates
for encrypted data.
A 2009 Ponemon Institute
report reveals that 69% of
the IT professionals surveyed
store confidential data on
USB flash drives. Of this
number, 43% confirmed
that they had lost such a
device. Even more alarming,
72% of those lost databearing devices were not
immediately reported as lost.

Securing the Move to Mobility


The move to mobile workforces has brought with it an array of new risks.
Mobile devices carry everything from sensitive business information to
consumers protected private data. They also can carry malicious code.
Additionally, many organizations need to verify the identity of remote workers
accessing the network, or any users accessing online applications. Further
fueling the need for heightened security, a new breed of cybercriminals
increasingly targets both mobile devices and online activities.
IronKey addresses these diverse security needs with trusted portable
computing solutions for secure storage, mobile authentication, and portable
desktop virtualization.
Underlying all these solutions is a multifunction portable computing device that
protects all stored data with strong hardware encryption. The IronKey device
also protects the user authentication process in hardware. Its highly secure
architecture is based upon years of researchoriginally funded by the US
Department of Homeland Securityin secure storage, portable software,
encryption key management, cryptographic processes, and Cryptochip design.
In addition, to ensure the integrity of the hardware and firmware, we build
these devices using a trusted, US-based supply chain.
The result is a secure portable platform that allows organizations to costeffectively mobilize their computing environments while protecting their
critical data and networks.

TRUSTED VIRTUAL
COMPUTING
STRONG
AUTHENTICATION
MANAGED
MOBILE STORAGE

Managed Mobile Storage

Strong Authentication

Managing Secure Portable Storage

Consolidating Strong Authentication


on a Single Multifunction Device

USB flash driveswith their small form


factors, large storage capacities, and high
transfer rateshave revolutionized
mobile data storage. Enterprise IT organizations, however, face the challenge of preserving the
productivity benefits of flash drives without compromising
security. IronKey has developed a solution that keeps
critical data from leaking out of the organization while
keeping harmful malware from getting into PCs and
networks. It is the worlds most secure USB flash drive.
Managed IronKey drives combine always-on
hardware encryption, remote security policy
enforcement, and an array of physical and
electromagnetic defenses that prevent
intruders from accessing the chips or encryption keys.
The IronKey architecture also verifies the users password
in hardware, which thwarts brute-force password
guessing. Additionally, it overcomes the design flaws
inherent in software-based systems that allow hackers to
access and decrypt data without the password. Active
malware defenses further protect IronKey drivesand the
computers and networks on which they are usedfrom
becoming infected with viruses and worms.

Many of the hardware-based security


features that defend data stored on IronKey
devices also make the IronKey an ideal
multifunction device. Hardware features
such as key management and secure token storage enable
IronKey to deliver the strength of hardware and the
flexibility of software to both two-factor authentication
and secure mobile storage. These features reduce strong
authentication costs and complexity while improving user
satisfaction and adoption since users can now carry
fewer devices.

IronKey has partnered with RSA, VeriSign and


CRYPTOCard to offer integrated solutions for strong
authentication. Additionally, organizations can use the
digital certificate onboard each IronKey device for simple
strong authentication. This capability provides the
critical hardware component needed to validate users
to cloud-based services and Web-enabled applications.

0000000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000 0010 0000 002

02040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e90000050 00e9 6a69 0069 a8a9 00a9 2828 0028

003c 88880000080 8888 8888 8888 8888 288e be88 8888 88880000090 3b83 5788 8888 8888 7667 778e

88f3 88bd e98800000c0 8a18 880c e841 c988 b328 6871 688e 958b00000d0 a948 5862 5884 7e81 37

00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000 0000 0000 0000 000

00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 0000 0000

0028 fdfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070 0057 7b7a 007a bab9 00b9 3a3c

778e 8828 888800000a0 d61f 7abd 8818 8888 467c 585f 8814 818800000b0 8b06 e8f7 88aa 8388 8b3b

3788 1ab4 5a84 3eec00000e0 3d86 dcb8 5cbb 8888 8888 8888 8888 888800000f0 8888 8888 8888 8888

0000 0000 0000 0000 000013e0 0000000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016

0000 0000 0010 0000 0000 0000 02040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e90000050 00e9

0057 7b7a 007a bab9 00b9 3a3c 003c 88880000080 8888 8888 80000f0 8888 8888 8888 8888 8888 8888

0000 0000000000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000 0010 00

Trusted Virtual Computing

Enabling Safe Workspaces in Hostile


Environments
IronKey Trusted Virtual Computing
mobilizes the many benefits of
virtualizationwhich have reduced cost,
increased security and availability, and
enabled more agile business responses in the datacenter
on an ultra-secure USB device. Cutting ties to the data
center and removing reliance on high-bandwidth network
connections makes it possible to solve a broad range of
problems. These solutions include ensuring business
continuity, enabling mobile workers to safely use their
home computers, and outfitting employees and
contractors with a secure portable workspace to use in
potentially hostile environments.
IronKey encapsulates the latest desktop
virtualization technology in a secure
portable USB device. Once configured, this
solution plugs into an employee's home
computer, or almost any Windows PC, and delivers
everything from a complete PC-on-a-stick to an online
banking application that protects commercial banking
customers from funds transfer fraud.
Hardware-based security, strong authentication, and remote management capabilities
make IronKey multifunction devices an ideal
platform to carryand defendvirtualized

payloads. Additionally, IronKey KeyOS firmware is


optimized not only to meet the demands of virtualization
security but also the performance requirements of
portable desktops, such as writing many files very quickly.
It also can provide a secure pre-boot environment.

Remote Device Control


All IronKey solutions gain an additional
level of security from enterprise-class central
management. The IronKey Enterprise
Management Service enables complete
lifecycle managementfrom provisioning to device
recovery to policy enforcement.
A single dashboard provides visibility and
control, enabling remote administration of
fleets of devices in real time. This includes
remotely applying, enforcing, and updating
security policies. These policies govern password length
and strength, enforcement of device access rules, and
other parameters.
Advanced features, such as audit trails
and remote policy updates, as well as
terminating and wiping lost or stolen devices
remotely allow administrators to monitor
and control device usage and prove compliance.
The result is an increased security profile, streamlined
compliance, and reduced capital expenditures and
operational overhead.

200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 0000 0000

8 fdfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070 0057 7b7a 007a bab9 00b9 3a3c

e 8828 888800000a0 d61f 7abd 8818 8888 467c 585f 8814 818800000b0 8b06 e8f7 88aa 8388 8b3b

788 1ab4 5a84 3eec00000e0 3d86 dcb8 5cbb 8888 80000f0 8888 8888 8888 8888 8888 8888 8888

00000000 0000 0001 0001 1010 0010 0001 0004 01280000010 0000 0016 0000 0028 0000 0010 0000

0 02040000040 0004 8384 0084 c7c8 00c8 4748 0048 e8e90000050 00e9 6a69 0069 a8a9 00a9 2828

c 003c 88880000080 8888 8888 8888 8888 288e be88 8888 88880000090 3b83 5788 8888 8888 7667

b 88f3 88bd e98800000c0 8a18 880c e841 c988 b328 6871 688e 958b00000d0 a948 5862 5884 7e81

8 8888 8888 8888 00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000

6 0000 0028 0000 0010 0000 00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000

9 6a69 0069 a8a9 00a9 2828 0028 fdfc0000060 00fc 1819 0019 9898 0098 d9d8 00d8 58570000070

8 8888 00000000100 0000 0000 0000 0000 0000 0000 0000 0000*0000130 0000 0000 0000 0000 0000

000 00200000020 0000 0001 0004 0000 0000 0000 0000 00000000030 0000 0000 0000 0010 0000 0000

Which IronKey is Right for You?


Features and Services

ENTERPRISE

PERSONAL

BASIC

Remote Terminatation for Lost or Stolen Drives


Access Control and Revocation
User Activity and Event Tracking
Device Recovery and Recommissioning
Managed Remotely over the Internet
Enforceable Security Policies
Automatic Anti-Virus Scanning
RSA SecurID, CRYPTOCard, One-Time Password
Web Privacy and Identity Protection*
Built-in Malware Protection
Automatic Hardware Encryption of All Data
Dual-Channel, High-Performance Architecture
Ruggedized, Tamper-Resistant, and Waterproof
*Secure browser, built-in Identity Manager, and VeriSign Identity Protection (VIP)

Who We Are

Who Trusts Us

Founded by security experts, IronKey is the global leader


in converging secure mobile storage, strong authentication,
and secure portable virtualization. IronKey solutions
help enterprises and government agencies to securely
and cost-effectively mobilize their computing environments. The companys flagship encrypted flash drive is
the first flash drive validated by the National Institute of
Standards and Technology to meet the stringent Level 3
criteria of FIPS 140-2.

Healthcare, finance, defense and aerospace,


manufacturing, utilities, and educational organizations,
as well as US and international government agencies
and the military, trust IronKey solutions to provide the
highest levels of security. These agencies include
Lockheed Martin, FEMA, The National Health Service,
US Department of Homeland Security, and NATO.
They rely upon IronKey to mitigate risk of data loss and
leakage and reduce costs, while raising their overall
security profile and ensuring compliance.

0
0
8
0

8
4
6
8
0
0
0

0
0

8
0

8
4

www.ironkey.com
sales@ironkey.com

5150 El Camino Real, Suite C31


Los Altos, CA 94022 USA

Toll-Free 866 645 9847


T 650 492 4055
F 650 967 4650

2010 IronKey, Inc. All rights reserved. IronKey is a trademark of IronKey, Inc. IronKey Basic, IronKey Personal and IronKey Enterprise are registered trademarks of IronKey, Inc. All other names and/or trademarks are the property of their respective owners. 03 2010

6
8
0
0
0

0
0

You might also like