IronKey™ by Imation: The Industry’s Most Comprehensive Mobile Security Suite
Imation created the industry’s most comprehensive mobile security suite in 2011 when it formed Imation Mobile Security (IMS). IMS combined the technology breakthroughs, intellectual property, expertise and thought leadership of three respected industry leaders -- IronKey™, MXI Security™, and ENCRYPTX™ -- and forged them into solutions that secure data, identities and workspaces.
IMS has unified this extraordinary mix of assets under the IronKey by Imation brand. This brand leverages two of the most trusted and recognized names in security and scalable storage, and underscores the emphasis IMS places on innovation.
Between them, IronKey, MXI Security and ENCRYPTX collectively represent a quarter-century of mobile security R&D and technology breakthroughs. They include:
A diverse group of industry pioneers leads the development of Imation's IronKey solutions, including industry leaders and innovators Barbara Nelson, Larry Hamid and Ken Jones. Together, this uniquely qualified team ensures that IronKey by Imation solutions work to stay a step ahead of accelerating change in today's workplace and constantly evolving security threats.
The result of this combined expertise is the IronKey by Imation suite, which offers mobile workforces end-to-end protection via hardware-encrypted USB drives, secure portable Windows desktops, and multi-level identity shields – all unified by cloud- or premise-based enterprise device management platforms. IronKey by Imation solutions benefit from the highest quality controls, including rigorous performance and reliability testing procedures, and Imation’s uniquely secure supply chain.
We have a singular vision at Imation Mobile Security: to safeguard the mobile workforce and the data it depends on, no matter where it goes. In a world where security threats and compliance burdens are constantly moving targets, we'll continue to design IronKey by Imation solutions with even stronger protections to help keep sensitive information, digital identities, portable workspaces and essential enterprise applications safe, intact and uncompromised.