Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:30 PM
Dark Reading
Dark Reading
Products and Releases

IronKey Launches New Trusted Access Service For Extended Enterprise Management

Secures access to public and private clouds

SUNNYVALE, Calif. – February 23, 2012 – IronKey, the leader in extended enterprise management, today launched a new Trusted Access service, an innovative combination of cloud service and virtualized workspace apps that helps IT transform from a technology operator to dynamic service provider. The new Enterprise Service enables organizations to take advantage of two trends re-shaping IT – Bring Your Own Device (BYOD) and SaaS/cloud applications – to dramatically reduce or eliminate enterprise issued endpoints and supporting infrastructure, operations and maintenance expenses. With the savings gained, IT leaders can shift spending to projects with greater strategic importance and impact on top line growth. IronKey is exhibiting in booth #2241 at the RSA Conference 2012, Feb. 27 - Mar. 1, 2012 at the Moscone Center in San Francisco, California where the company will demonstrate its Trusted Access Enterprise Service.

According to Forrester Research, Inc., 50 percent of the average IT budget is spent on operations and maintenance. At the same time, 61 percent of CIOs are trying to free up budget to spend on new strategic IT initiatives.[1] Remaking IT to maintain its relevancy and strategic importance is what Forrester defines as empowered business transformation: “A technology approach where enabling technology innovation is embedded in the business while IT provides ‘just enough’ centralized coordination and oversight for enterprise wide goals.” [2] While BYOD, SaaS, and cloud service are seen by many as an opportunity to increase agility and reduce costs, 76 percent of enterprises still cannot fully adopt the benefits of the cloud and SaaS services because of concerns over data loss according to a commissioned study conducted by Forrester Consulting on behalf of IronKey.[3]

“An extended enterprise is one for which a business function is rarely, if ever, a self-contained workflow within the infrastructure confines of the company,” wrote Chenxi Wang, vice president and principal analyst at Forrester Research.”[4]

IronKey Trusted Access meets the new challenges of the extended enterprise head-on, giving IT leaders the opportunity to make the transformation to a dynamic service provider that can:

Ø Manage the extended enterprise including contractors, mobile workers, remote offices, customers and supply chain partners

Ø Eliminate spending on endpoint hardware, maintenance, and support

Ø Reduce spending on supporting IT infrastructure, including authentication, data loss prevention (DLP), virtual private networks (VPNs), Web content security and endpoint protection

Ø Enforce a data security policy to prevent data loss no matter where users go

Forrester’s research found that “By moving to the extended enterprise model, IT leaders not only deliver technologies that enable rapid business innovation, but by adopting ‘as-a-service’ offerings and leveraging trends such as BYOD, there is a distinct opportunity for IT to reinvent itself, transforming from the role of managing day-to-day infrastructure operations to a true technology partner and enabler to your business counterparts.”[5]

Virginia Commerce Bank, Northern Virginia’s largest community bank, is the first enterprise to license the new Trusted Access service. The Bank was in the market for a solution that would enable its routinely mobile staff to have anywhere access to cloud and behind-the-firewall applications while ensuring that data remained secure. Originally, the Bank planned to purchase a substantial number of new endpoints and supporting network, management, and security software and services. The scope of such an investment according to Microsoft research including the cost of acquiring, deploying, and supporting endpoints equated to at least $1,500 per device. Instead, Virginia Commerce Bank turned to IronKey Trusted Access to help realize a dramatic cost savings and gain efficiencies that will allow their staff to safely connect remotely to public and private cloud applications from their own personal computers while ensuring that data security policies are enforced.

“IronKey Trusted Access enables the Bank to provide anywhere access for staff at a fraction of the price of other more costly and resource intensive options,” said Sharon Moynihan, senior vice president of IT and Project Management at Virginia Commerce Bank. “Instead of providing staff with laptops to work outside the office, they’ll use Trusted Access with their own personal computers to use the Bank’s public and private cloud apps. This cost savings enables us to focus our IT resources on other strategic projects that will help grow the Bank’s top line revenue.”

New Trusted Access Service

Built on IronKey’s award-winning solutions for online banking security, the service is designed to work with small, medium and large enterprises that have contractors, remote workers, and remote offices, or large cloud applications users. Trusted Access can be used from any computer on any network. Apple iOS and Android OS support is planned for later this year.

IronKey Trusted Access is an on-demand service that delivers enterprise-managed access with integrated software apps and cloud services. Key components are:

Ø Secure Virtualized Workspace: Isolates Web access in a virtualized downloadable application with policy enforced data protection, access controls and automatic updates

Ø Trusted Network: Secures connection to public and private cloud and behind-the-firewall to Cisco VPNs with out-of-band authentication, content controls and integrated network security

Ø Cloud Management and Analytics: Scales deployments quickly with a single point of control and real-time visibility into cloud application and data

Ø Public and Private Cloud Applications: Manages access to public cloud and behind-the-firewall applications with consistent policies wherever users go

“Trusted Access eliminates hardware endpoint costs and reduces the need for expensive IT infrastructure, freeing up staff and budget to focus on innovation,” said Ajay Nigam, senior vice president of Product Management at IronKey. “Using Trusted Access to manage the extended enterprise, CIOs now have the opportunity to leverage the growing BYOD trend and SaaS adoption to make the transformation required to keep their roles and IT relevant to enable business.”

Trusted Access is available directly from IronKey and more information is available online at https://www.ironkey.com/trusted-access-enterprise.

# # #

About IronKey

IronKey is freeing enterprises from the high cost, risk and complexity of managing the extended enterprise. With IronKey Trusted Access, any user – contractor, remote worker, customer, or supply chain partner – can securely access enterprise provisioned public and private clouds, from anywhere. This enables IT leaders to transform IT into a dynamic service provider – unlocking budgets and resources spent on endpoints, management and infrastructure that otherwise weigh down budgets and hold back innovation.

Ranked as the 14th best venture-funded company in The Wall Street Journal's "Next Big Thing," IronKey cloud-based services power Trusted Access and partner solutions, including Imation secure storage devices. IronKey cloud services are used daily by over 3,000 enterprises to manage online access and data for over one million users. More than 70 financial institutions secure their brands and billions in customer online payments with IronKey. Visit www.IronKey.com for more information.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...