IRONKEY ENTERPRISE MANAGEMENT

An Advanced Platform for the Secure Enterprise

Protecting your data, your mobile workforce, and your organization is easy with the IronKey Enterprise Management platform. With this advanced management platform, you can quickly and easily establish a secure storage command center for administering and policing the use of IronKey encrypted Workspace and Enterprise storage drives.

Fast, Flexible Deployment

With IronKey’s secure cloud-based service, you can establish a fully functioning storage command center in as little as 15 minutes, rather than the days or weeks that many other solutions require. Or select IronKey’s secure on-premise platform if your organization prefers to deploy its centralized management systems from inside the firewall. Either lets you efficiently and rapidly support and protect data stored on thousands of hardened, encrypted IronKey Workspace or Enterprise drives via a range of flexible deployment approaches. Provision and initialize devices in ways that fit how your organization works – deploy by workgroups, activate devices by email, or distribute pre-initialized drives directly to employees.

Create a Virtual Command Center

A single console gives your administrators an up-to-the-minute view of all IronKey Workspace and Enterprise devices under their management, no matter where those devices are in the world. Your own dashboard presents easily scanned charts and graphs showing data about all devices under your management including user status, device status, device location and activity, device software version and more.

Ensure Compromised Drives Don't Compromise Data

With the IronKey Enterprise Management platform, administrators can remotely disable lost or stolen devices by locking out users and preventing password access. They can even destroy a device that a departing employee fails to return, erasing every block of data from the compromised device and destroying its on-board Crytopchip, rendering it unusable.

Benefits

  • Simplify compliance with security regulations by giving system administrators control over drives deployed across the enterprise
  • Deploy and manage devices easily with this cloud-based or on-premise solution
  • Quickly and easily establish and secure a centralized workspace or storage command center
  • Efficiently and cost-effectively protect data by administering usage and encryption policies, password restrictions, and more from a central console
  • Monitor drives in the field with a powerful, flexible asset tracking system

Specifications

DEVICE COMPATIBILITY:

IronKey™ Enterprise S250, D250 (compatible with S/D 200)
IronKey™ Workspace W500
IronKey™ Workspace W700
IronKey™ Enterprise H300

System Capability:

Windows 8.1/8/7/Vista (Bus. Ent and Home Editions SP2) /XP (Prof. and Home SP3) Mac OS 10.6+ (including MountainLion OS) and Linux 2.6+ or higher

PKI INTERFACE:

Public Key Cryptography Standard #11 (PKCS-#11)

SUPPORTED OTP PLATFORMS:

RSA SecurID
VeriSign Identity Protection (VIP)

Enterprise Managed USB Service

Resources

SUPPORT

For worldwide support of Mobile Security Products, please email us at securityTS@imation.com. We will reply to your submission within 24 business hours, Monday-Friday.