Presentation is loading. Please wait.

Presentation is loading. Please wait.

IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape.

Similar presentations


Presentation on theme: "IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape."— Presentation transcript:

1 IMATION MOBILE SECURITY

2 MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape

3 MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape The Mobility Gap

4 WORKERS DEMAND Flexibility Usability Choice

5 MACRO TREND—WORKING REMOTELY 40% of IBM employees work remotely 26.2M U.S. employees worked at home at least one day per month in 2010 85% of Cisco employees telecommute SOURCES: Vancouver Sun, WorldatWork Special Report

6 MACRO TREND—DATA MOBILITY 91% reported permitting removable storage devices on company networks 66% do NOT enforce data encryption on company issued and personal devices SOURCE: Harris Interactive Survey

7 MACRO TREND — CHANGING WORKSPACES 69% of organizations have some users working on their own laptops 82% of IT departments worried about use of personal devices SOURCE: Dimensional Research

8 MACRO TREND—SECURITY DEMANDS 37% of IT decision makers in the U.S. and Canada reported unintentional exposure of company data in the past two years via theft or loss of removable storage devices 75% of organizations have suffered data loss from negligent or malicious insiders SOURCES: Harris Interactive Survey, Ponemon Institute

9 CLOSING THE GAP

10 to letting employees work the way they want to work Workforce Needs Enterprise Security to protecting and securing data SAY YES… Yes

11 BEST OF BREED + + MOBILE SECURITY

12 FIPS 140-2 Level 2 validated encrypted USB device USB security device with hardware-based CAC/PIV authentication Multifunction USB security device with PKI functions & encrypted storage Encrypted USB device with hardware-based biometric authentication Hardware- encrypted portable USB hard drive IMATION INNOVATION Imation Firsts USB security device to meet the NIST SP800-56A secure communications standard FIPS 140-2 Level 3 validated portable security processor CESG CAPS-accredited encrypted USB flash drive Liquid metal enclosure on an encrypted USB device Thixotropic magnesium enclosure on an encrypted USB device

13 COMPLETE MOBILITY SOLUTION

14 MOBILE SECURITY The information users need to do their jobs The identities users use to access systems and communicate The tools and applications that make users productive

15 DATA IN MOTION Financial Data Intellectual Property Legal Data Customer Data HR Information MalwareUnknown Devices Threats Military Intelligence Data Healthcare Patient Data

16 WHERE WE FIT HOME HOT SPOTS BRANCH OFFICES ENTERPRISE CENTRALIZED MANAGEMENT

17 MOBILITY & PROTECTION Safeguard your data with highest security levels available Carry files with complete confidence Great user experience Meet and exceed compliance regulations Easy to deploy and use

18 RUGGED & SECURE…

19 EASY CLOUD-BASED OR ON-PREMISE MANAGEMENT FIPS 140-2 Level 3 certified Endpoint application integration Remote administration & policy enforcement Remotely disable or terminate lost or stolen USB drives Administrator device unlock & reset Self-service password recovery Intuitive user control panel available in eight languages

20 BIOMETRIC SECURITY…

21 ON-PREMISE MANAGEMENT High capacity portable drives up to 1TB Active Directory support Self-issue devices Remotely block devices or erase data Direct device communication allows policies to be updated anytime Tailor security policies and device behavior based on user needs ACCESS Enterprise

22 EVERYTHING YOU NEED, NOTHING YOU DON’T Get renowned IronKey quality Affordably comply with storage security mandates that don’t require FIPS certification Durable, quality-tested IronKey hardware to reliably keep data private and secure Ideal cost-effective complement to many FIPS certified members of the IronKey family

23 MANAGE DRIVES WITH MCAFEE E POLICY ORCHESTRATOR ® Centrally track and manage Imation encrypted USB drives and use policies Proven platform managing more than 58 million enterprise desktops worldwide Set customized policies for authentication, initialization, revocation and backup Remote wipe for lost or stolen devices

24 TAKE YOUR SECURITY TO THE NEXT LEVEL Improve authentication security levels Consolidate the number of passwords Reduce what users have to carry Reduce implementation cost by blending identity into other efforts Prevent data breaches & meet compliance regulations

25 MAKE YOUR EXISTING SECURITY STRONGER Hardware-based multifactor authentication One device for secure storage & identity One password unlocks all onboard identities Easy integration other applications o CRYPTOCard o RSA SecurID ® o VeriSign ® Identity Protection (VIP) o Email o Document Management

26 TRANSFORM ANY COMPUTER INTO AN IT-MANAGED SYSTEM Give mobile users full-featured work environments Lock down workspaces with high security Reduce desktop image support time & cost Great user experience High user mobility

27 FULLY-FUNCTIONAL WORKSTATION THAT FITS IN YOUR POCKET

28 FULL WINDOWS DESKTOP ON A SECURE USB Devices act like laptops—images managed like you do today Boot-from-USB, full host computer isolation No virtualization, fast, full windows desktop Fully hardware encrypted FIPS 140-2, Level 3 validated Centrally-manageable security policies Active Directory integration Dedicated appliance for mass device imaging No install required for end users Microsoft Windows 7

29 IRONKEY WORKSPACE Provide users with an imaged and fully functioning version of Windows 8 Take advantage of all the performance improvements offered by USB 3.0 Protect portable desktops with 128-bit or 256-bit AES full disk encryption and password authentication Automatically protect data upon device removal Waterproof, dust proof and shock resistant Delivers up to five times the minimum read/write performance requirements for WTG devices BitLocker encryption to protect data Zero client footprint; no network access required Full usage of local hardware and resources

30 WHY IMATION MOBILE SECURITY Highest security levels available today Rugged solutions deployed in the world’s most demanding organizations Unmatched deployment flexibility –On premise –Cloud-based

31 IMATION MOBILE SECURITY …TO SECURING THE MOBILE WORKFORCE. Yes


Download ppt "IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape."

Similar presentations


Ads by Google