ďAs organisations increasingly allow and even encourage employees to work outside traditional offices, and look to enable Ďbring your own deviceí (BYOD) or contractor access to the organizationís applications, they are in search of solutions that allow authorized users access to information they need without compromising the security of their data,Ē said Lawrence Reusing, Imationís general manager for Mobile Security.
With Imationís mobile workspace solution, IT can issue a full-featured Windows 7 desktop environment on a secure, hardware encrypted USB device that employees or contractors can use both in the office and on computers at home or on the road.
With Imationís new Crossover Storage capability, the Stealth Zone USB device can be plugged into a computerís USB port and booted into a secure Windows 7 desktop environment; or, using a separate, secure storage partition, it can be used as a traditional encrypted secure flash drive, eliminating the need for a second encrypted drive for data transfer.
Imation Stealth Zone 2.1 deploys numerous measures for maximum workspace security, including:
Full host-computer isolation, where, after reboot and authentication, the computing environment is isolated from malware and data leakage.
Hardware encryption, using a FIPS 140-2 Level 3 validated portable security processor to lock down content and shield the desktop, preventing tampering, intrusion and piracy.
Strong user authentication, including optional multifactor authentication using password, biometrics or both.
Advanced centralized deployment and management, that lets an organization broadly deploy USB desktops and police their use with Imationís deployment tools and Imation ACCESS Enterprise management platform.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.