Government, defense and intelligence agencies – and the civilian companies that contract with them – are under intense scrutiny and pressure to comply with a lengthening list of legislative requirements and protocols designed to protect sensitive data in transit and at rest. Working with ever-tighter budgets, these organizations must:
For agencies, the price of non-compliance can range from a loss of public trust and more intense oversight to costly class-action lawsuits. For the thousands of civilian companies whose business relies on working with government agencies at all levels, non-compliance could disqualify them from bidding on government contracts.
That means agencies and contractors with mobile employees carry enormous responsibility for securing data, identities and applications. To operate efficiently in an increasingly mobile world, they must give authorized users anytime access to sensitive data without compromising user identities, core applications or protected networks. To comply with data security requirements, they must be able to monitor and track data access and use no matter where employees carry it – and then document that activity in audits and reports. Meanwhile, organizations are also expected to keep mobile workers productive when severe weather, infrastructure failures or other disasters threaten their ability to do their jobs.
For government sales inquiries email firstname.lastname@example.org
Imation helps you simplify compliance with military-grade and encrypted devices, but we don’t stop there. Our mobile security solutions protect digital identities and applications no matter where employees or contractors take them. Because) our centralized management platforms put you in control of data access and use, you don’t have to rely on the diligence of the hundreds or thousands of mobile workers who carry sensitive data with them every day.
Imation delivers some of the world’s most secure, scalable and reliable mobile storage, identity management and device management solutions, including:
Every one of these offerings was designed to work seamlessly together and create a cost-effective, end-to-end solution that you can use to reduce your potential exposure to non-compliance, drive down operating costs, improve productivity, and maintain operations no matter what happens.
Imation’s IronKey™ family of flash drives and external hard drives, along with the Imation IronKey™ flash drives, lock down sensitive data with an on-board, hardware encryption engine that puts a military-grade, and AES-256 wall between unauthorized users and the drive’s contents
The security protections built into Imation’s encrypted USB drives are formidable. And by choosing from an array of scalable, intuitive platforms for establishing and policing your employees’ use of Imation IronKey flash drives, you can ensure that your employees and contractors are taking the right measures, such as using strong passwords, to take full advantage of those capabilities From a central console, set policies for passwords, application use, recovery, and more – across a handful of drives or thousands of them. Depending on the Imation solution you deploy, you can also manage and update device drivers and applications, administer identity protection features, and create whitelists of approved IP addresses to control where devices and applications can be used. And if a drive is lost or stolen, you can even remotely erase it or destroy it.
When a mobile employee’s digital identity is compromised, your network, your applications, and your data all become vulnerable. That’s why Imation offers strong, multifactor authentication (password, biometric and CAC/PIV) on Imation IronKey drives. And for users of Imation flash drives, Imation offers enterprise-class identity management capabilities – combining PKI crypto services, two-factor authentication and strong password management – to shield identities out in the wild. Only Imation integrates these sophisticated protections with encrypted storage in a single mobile device.
Complying with data security rules doesn’t have to be a headache. Use Imation’s advanced reporting and auditing capabilities to document how, where and when users have accessed, saved or modified confidential data. And for maximum flexibility, Imation offers you both premise-based management solutions (when device management must reside behind your firewall) and cloud-based management solutions (eliminates the need for capital investments in servers and other hardware).
In addition to the combined safeguards of encryption, multi-factor authentication and hardened enclosures, Imation’s enterprise-class mobile storage solutions come with anti-virus and anti-malware protections, either as a standard feature or as an option.
Mobile data security involves more than just locking down data. Workers need the flexibility of working from any PC, and they get it with Imation portable workspace solutions. These solutions, available on Imation encrypted USB flash drives, add another dimension to mobile security by enabling employees and contractors to safely work from any computer – at the office, at home, or on the road – with a fully functioning Microsoft Windows 8.1 desktop environment that goes everywhere they do and features all the applications workers need. Hardware encryption and strong authentication keep confidential data where it belongs, and the portable workspace is fully isolated from malware or other threats that may be present on the host computer, keeping them out of your datacenters and your networks.
There’s no need for employees or contractors to install drivers or other software to securely access their stored data, workspace or applications. Imation drives come pre-loaded with everything users need, and they leave no trace on the host PC.
Power outages, severe storms, earthquakes, fires – any of these might usually impact your ongoing operations. But Imation’s secure mobile storage and portable workspace solutions help keep workers productive even when they can’t make it into the office.
To ensure that our products remain accessible to all users, including people with disabilities, Imation’s software products are compliant with Section 508 of the U.S. Rehabilitation Act, part 1194.21.
Securely Enabling Remote Workers at Lower Cost than Traditional Approaches with IronKey Workspace W500 and W700