Solutions for
Government

The Data Security Challenge

Government, defense and intelligence agencies – and the civilian companies that contract with them – are under intense scrutiny and pressure to comply with a lengthening list of legislative requirements and protocols designed to protect sensitive data in transit and at rest. Working with ever-tighter budgets, these organizations must:

  • Meet stringent data confidentiality, integrity, availability and authentication requirements for mobile employees, teleworkers and contractors
  • Comply with U.S. legislative requirements such as the Federal Information Security Management Act (FISMA), OMB M06-16 Mandate, Federal Desktop Core Configuration (FDCC) mandates, and Director of Central Intelligence Directive (CDID) 6/3.
  • Show compliance with international data security requirements imposed by the National Information Assurance Partnership (NIAP) Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS)
  • Adhere to Federal Information Processing Standard (FIPS) and CESG Assisted Products Service (CAPS) standards. Federal Information Processing Standard (FIPS) is a publicly announced standardization developed by the United States federal government for use in computer systems by all non-military government agencies and by government contractors, when properly invoked and tailored on a contract. CAPS (CESG Assisted Products Service) is a certification scheme exclusive to the UK Government market. CAPS offers Government and MoD users the assurance their security products have been tested to the highest standards.
  • Meet state data security mandates

The Price of Non Compliance

For agencies, the price of non-compliance can range from a loss of public trust and more intense oversight to costly class-action lawsuits. For the thousands of civilian companies whose business relies on working with government agencies at all levels, non-compliance could disqualify them from bidding on government contracts.

That means agencies and contractors with mobile employees carry enormous responsibility for securing data, identities and applications. To operate efficiently in an increasingly mobile world, they must give authorized users anytime access to sensitive data without compromising user identities, core applications or protected networks. To comply with data security requirements, they must be able to monitor and track data access and use no matter where employees carry it – and then document that activity in audits and reports. Meanwhile, organizations are also expected to keep mobile workers productive when severe weather, infrastructure failures or other disasters threaten their ability to do their jobs.

For government sales inquiries email ironkeyfederal@imation.com

Solutions Datasheets

Trust IronKey to ease compliance, protect identities, and more

Imation helps you simplify compliance with military-grade and encrypted devices, but we don’t stop there. Our mobile security solutions protect digital identities and applications no matter where employees or contractors take them. Because) our centralized management platforms put you in control of data access and use, you don’t have to rely on the diligence of the hundreds or thousands of mobile workers who carry sensitive data with them every day.

Imation delivers some of the world’s most secure, scalable and reliable mobile storage, identity management and device management solutions, including:

  • encrypted flash drives
  • secure portable workspaces
  • encrypted external hard drives
  • identity management solutions
  • secure storage management solutions

Every one of these offerings was designed to work seamlessly together and create a cost-effective, end-to-end solution that you can use to reduce your potential exposure to non-compliance, drive down operating costs, improve productivity, and maintain operations no matter what happens.

Features of the IronKey Government Solution

Deploy mobile storage protection strong enough for Top Secret data

Imation’s IronKey™ family of flash drives and external hard drives, along with the Imation IronKey™ flash drives, lock down sensitive data with an on-board, hardware encryption engine that puts a military-grade, and AES-256 wall between unauthorized users and the drive’s contents

Maintain control over data access and use, conveniently and centrally

The security protections built into Imation’s encrypted USB drives are formidable. And by choosing from an array of scalable, intuitive platforms for establishing and policing your employees’ use of Imation IronKey flash drives, you can ensure that your employees and contractors are taking the right measures, such as using strong passwords, to take full advantage of those capabilities From a central console, set policies for passwords, application use, recovery, and more – across a handful of drives or thousands of them. Depending on the Imation solution you deploy, you can also manage and update device drivers and applications, administer identity protection features, and create whitelists of approved IP addresses to control where devices and applications can be used. And if a drive is lost or stolen, you can even remotely erase it or destroy it.

Protect the digital identities of workers in the field

When a mobile employee’s digital identity is compromised, your network, your applications, and your data all become vulnerable. That’s why Imation offers strong, multifactor authentication (password, biometric and CAC/PIV) on Imation IronKey drives. And for users of Imation flash drives, Imation offers enterprise-class identity management capabilities – combining PKI crypto services, two-factor authentication and strong password management – to shield identities out in the wild. Only Imation integrates these sophisticated protections with encrypted storage in a single mobile device.

Simplify the burdens of compliance with advanced reporting and auditing.

Complying with data security rules doesn’t have to be a headache. Use Imation’s advanced reporting and auditing capabilities to document how, where and when users have accessed, saved or modified confidential data. And for maximum flexibility, Imation offers you both premise-based management solutions (when device management must reside behind your firewall) and cloud-based management solutions (eliminates the need for capital investments in servers and other hardware).

Shield data and applications from malware

In addition to the combined safeguards of encryption, multi-factor authentication and hardened enclosures, Imation’s enterprise-class mobile storage solutions come with anti-virus and anti-malware protections, either as a standard feature or as an option.

Keep data secure without compromising productivity

Mobile data security involves more than just locking down data. Workers need the flexibility of working from any PC, and they get it with Imation portable workspace solutions. These solutions, available on Imation encrypted USB flash drives, add another dimension to mobile security by enabling employees and contractors to safely work from any computer – at the office, at home, or on the road – with a fully functioning Microsoft Windows 8.1 desktop environment that goes everywhere they do and features all the applications workers need. Hardware encryption and strong authentication keep confidential data where it belongs, and the portable workspace is fully isolated from malware or other threats that may be present on the host computer, keeping them out of your datacenters and your networks.

Empower mobile workers with simple, user-friendly solutions

There’s no need for employees or contractors to install drivers or other software to securely access their stored data, workspace or applications. Imation drives come pre-loaded with everything users need, and they leave no trace on the host PC.

Put mobile security at the heart of your disaster recovery plan

Power outages, severe storms, earthquakes, fires – any of these might usually impact your ongoing operations. But Imation’s secure mobile storage and portable workspace solutions help keep workers productive even when they can’t make it into the office.

Make data easily accessible to every authorized user

To ensure that our products remain accessible to all users, including people with disabilities, Imation’s software products are compliant with Section 508 of the U.S. Rehabilitation Act, part 1194.21.

IronKey products are available on the following Federal Contracts:

  • GSA Schedule
  • NASA SEWP IV
  • DHS Blanket Purchase Agreement

Featured Resources

White Paper

Windows To Go: Empower and Secure the Mobile Workforce

Download

White Paper

Securely Enabling Remote Workers at Lower Cost than Traditional Approaches with IronKey Workspace W500 and W700

Download

Demo Video

IronKey Product Demonstration “Essential Security for Mobile and Remote Workers”

Watch Now