03:53 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

USB-Based Secure Mobile Workspace Provides Secure Microsoft Windows Operating System On Any Computer

Imation Stealth Zone 2.1's new Crossover Storage feature enables secure data transport and secure workspace mobility in a single device

OAKDALE, Minn.--(BUSINESS WIRE)--Imation Corp. (NYSE: IMN), a global scalable storage and data security company, today announced availability of version 2.1 of its Stealth Zone boot-from-USB secure mobile workspace. This newest version of Imation Stealth Zone enhances data security by making it easier and more convenient for business travelers, teleworkers and contractors to carry a secure, managed Microsoft Windows 7 operating system and an encrypted data transfer solution on a single, fully managed USB device.

“Our solution provides a secure PC that you can carry in your pocket. Now, users can get what they’ve requested – a secure form of Windows to go wherever they are, combined with an encrypted flash drive in a single product.”

“As organizations increasingly allow and even encourage employees to work outside traditional offices, and look to enable ‘bring your own device’ (BYOD) or contractor access to the organization’s applications, they are in search of solutions that allow authorized users access to information they need without compromising the security of their data,” said Lawrence Reusing, Imation’s general manager for Mobile Security. “Our solution provides a secure PC that you can carry in your pocket. Now, users can get what they’ve requested – a secure form of Windows to go wherever they are, combined with an encrypted flash drive in a single product.”

“Mobile boot-from-USB Windows workspaces like Imation’s are generating increasing interest as IT departments seek to empower worker mobility while gaining some control over the BYOD trend,” said Michael Osterman, president, Osterman Research, Inc. “Organizations are realizing that mobile workspaces are an extremely convenient and flexible way to provision fully managed, secure Windows desktop environments for employees and contractors, while minimizing the risk of data loss.”

With Imation’s mobile workspace solution, IT can issue a full-featured Windows 7 desktop environment on a secure, hardware encrypted USB device that employees or contractors can use both in the office and on computers at home or on the road.

With Imation’s new Crossover Storage capability, the Stealth Zone USB device can be plugged into a computer’s USB port and booted into a secure Windows 7 desktop environment; or, using a separate, secure storage partition, it can be used as a traditional encrypted secure flash drive, eliminating the need for a second encrypted drive for data transfer.

Imation Stealth Zone 2.1 deploys numerous measures for maximum workspace security, including:

Full host-computer isolation, where, after reboot and authentication, the computing environment is isolated from malware and data leakage. Hardware encryption, using a FIPS 140-2 Level 3 validated* portable security processor to lock down content and shield the desktop, preventing tampering, intrusion and piracy. Strong user authentication, including optional multifactor authentication using password, biometrics or both. Advanced centralized deployment and management, that lets an organization broadly deploy USB desktops and police their use with Imation’s deployment tools and Imation ACCESS™ Enterprise management platform.

Imation’s mobile workspace products are available through Imation’s network of channel partners. For more information, visit Current users of Imation Stealth Zone devices can upgrade their devices to version 2.1 capabilities by contacting their sales representative.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.