Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/21/2010
03:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

IronKey Launches Trusted Virtual Computing Initiative

Solution improves the security of remote access

LOS ALTOS, Calif., Jan. 20, 2010 To help meet growing customer and market demand for a highly secure computing environment for mobile workers, IronKey, the leader in secure and managed portable computing, today launched its Trusted Virtual Computing initiative to enable organizations to realize the cost-effective benefits of virtualization without compromising security.

The new IronKey platform enables IronKey devices to provide a secure, portable computing environment that meets the unique needs of remote workers, corporate banking customers, as well as government and military users. The IronKey solution not only improves the security of remote access, but can also provide the basis for IT cost reduction across the enterprise or agency.

IronKey encapsulates the latest desktop virtualization technology in a managed and secure portable device. By securing the users applications, data and associated workspace resources, IronKey offers a cost effective approach for enterprises to enable mobile workers with a highly secure computing environment. IronKey Trusted Virtual Computing offers an ideal way to provide for business continuity and telework, enabling secure portable virtualization even when network connections are lost, or bandwidth is limited. The solution also addresses some of the hardest security problems, including protection from root kits and commercial banking Trojans.

Virtualization, which has reduced cost, increased security and availability and enabled more agile business responses in the datacenter, is moving to the desktop. Now, IronKey helps to solve the remote desktop challenges of the last decade. By taking desktop virtualization to the next level and cutting the ties to the data center it removes reliance on high-bandwidth network connections.

With the ability to run an entire desktop, including the operating system, specific applications and files directly from an IronKey secure portable computing device, customers can realize the benefits of virtualization with minimal investment, and without compromising security. IronKey delivers the same stringent security as found behind the corporate firewall. IronKey empowers organizations to issue these secure devices in lieu of laptops, and thereby significantly reduce IT costs.

Key Components:

  • IronKey Multifunction Security DeviceIronKey multifunction security device has the look and feel of a USB thumb drive, and is just as easy to use. Underlying this initiative, the IronKey portable multifunction computing device, provides the essential hardware-based security, user authentication, and high-performance architecture that enable secure portable virtualization solutions.
  • Application Validation in HardwareThe IronKey Cryptochip handles application validation using x.509 digital certificates in hardware that is manufactured through a secure supply chain.
  • Optimized Secure StorageIronKey secure portable virtualization protects the virtualization payload, applications, and user data from unauthorized access with strong hardware encryption.
  • IronKey KeyOSIronKey KeyOS firmware is optimized not only to meet the demands of virtualization security but also the performance requirements of portable desktops. IronKey KeyOS also prevents updates from getting on the device unless they are digitally signed by IronKeyensuring that your payload is always what you think it is.
  • Strong Authentication for Network AccessThe IronKey multifunction security devices contain an array of strong two-factor authentication technologies, allowing virtualized applications to authenticate themselves to corporate networks and VPNs.
  • Remote ManagementEnterprise-class remote systems management adds another level of security.

    Trusted Virtual Computing shifts the mobile computing paradigm by delivering workspaces on highly secure, portable devices and eliminating reliance on high bandwidth to deliver the performance todays mobile workforce requires, said David Jevans, CEO at IronKey. We are committed to helping organizations solve security challenges associated with mobile access, data protection and malware threats. Many of our government and enterprise customers have field operatives, as well as workers that regularly telecommute, travel and need access to files and applications without sacrificing performance or security. It is imperative to protect the integrity of the information they carry without inhibiting productivity. We can now provide these mobile workers with secure access to a complete virtual desktop and applications wherever they are in the world.

    IronKey Enterprise Solutions provide smooth integration with existing systems and technologies. It also enables significant opportunities for technology partners, integrators and developers to extend the applications of the IronKey environment. IronKey provides integrated support for virtual desktop software from industry leaders including Moka5 and RingCube. Unique, IronKey-based virtual computing solutions have been developed in partnership with industry leaders, including Lockheed Martin IronClad.

    Social Media Destinations and Resources:

  • Lockheed Martin and IronKey Introduce IronClad: http://www.lockheedmartin.com/news/press_releases/2010/01-18-IronClad.html
  • IronKey CEO Blog: http://blog.ironkey.com/
  • IronKey Forum: https://forum.ironkey.com/
  • Linked In: http://www.linkedin.com/companies/ironkey-inc
  • About FIPS 140-2 validation: https://www.ironkey.com/FIPS140
  • IronKey FIPS Certificate: http://cs-www.ncsl.nist.gov/groups/STM/cmvp/documents/140-1/140crt/140crt114 9.pdf
  • IronKey Security Policy: http://cs-www.ncsl.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1149. pdf

    About IronKey: IronKey is the global leader in providing secure and managed portable storage, authentication, and trusted virtual computing solutions for mobile workers. IronKey multifunction portable security devices, management software and associated services are designed to meet the security, performance, and privacy standards of the most demanding enterprise and government customers. IronKey solutions range from IronKey Basic, the worlds most secure USB flash drive, to the IronKey Enterprise Virtual Desktop solution for carrying a secure operating system and virtual desktop environment on a pocket-sized device. IronKey works with industry leaders in virtualization, storage and security, including Lockheed Martin, McAfee, MokaFive, RSA, RingCube and VeriSign to extend the applications of its secure mobile computing platform. IronKey products are FIPS 140-2, Level 3 validated. Thousands of customers use IronKey, including Fortune 500 companies, enterprise organizations in financial services, healthcare and legal markets, as well as government agencies, including FEMA, NATO and DHS. For more information, please visit www.IronKey.com.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    How to Better Secure Your Microsoft 365 Environment
    Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
    Attackers Leave Stolen Credentials Searchable on Google
    Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-20620
    PUBLISHED: 2021-01-28
    Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
    CVE-2021-20621
    PUBLISHED: 2021-01-28
    Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
    CVE-2021-20622
    PUBLISHED: 2021-01-28
    Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
    CVE-2020-5626
    PUBLISHED: 2021-01-28
    Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
    CVE-2021-3142
    PUBLISHED: 2021-01-28
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...