Ironkey Enterprise Management Service
An Advanced Platform for the Secure Enterprise
Protecting your data, your mobile workforce, and your organization is easy with the IronKey Enterprise Management platform. With this advanced management platform, you can quickly and easily establish a secure storage command center for administering and policing the use of IronKey encrypted Workspace and Enterprise storage drives.
Fast, Flexible Deployment
With IronKey’s secure cloud-based service, you can establish a fully functioning storage command center in as little as 15 minutes, rather than the days or weeks that many other solutions require. Or select IronKey’s secure on-premise platform if your organization prefers to deploy its centralized management systems from inside the firewall. Either lets you efficiently and rapidly support and protect data stored on thousands of hardened, encrypted IronKey Workspace or Enterprise drives via a range of flexible deployment approaches. Provision and initialize devices in ways that fit how your organization works – deploy by workgroups, activate devices by email, or distribute pre-initialized drives directly to employees.
Create a Virtual Command Center
A single console gives your administrators an up-to-the-minute view of all IronKey Workspace and Enterprise devices under their management, no matter where those devices are in the world. Your own dashboard presents easily scanned charts and graphs showing data about all devices under your management including user status, device status, device location and activity, device software version and more.
Ensure Compromised Drives Don't Compromise Data
With the IronKey Enterprise Management platform, administrators can remotely disable lost or stolen devices by locking out users and preventing password access. They can even destroy a device that a departing employee fails to return, erasing every block of data from the compromised device and destroying its on-board Crytopchip, rendering it unusable.
- Simplify compliance with security regulations by giving system administrators control over drives deployed across the enterprise
- Deploy and manage devices easily with this cloud-based or on-premise solution
- Quickly and easily establish and secure a centralized workspace or storage command center
- Efficiently and cost-effectively protect data by administering usage and encryption policies, password restrictions, and more from a central console
- Monitor drives in the field with a powerful, flexible asset tracking system
Windows 8.1/8/7/Vista (Bus. Ent and Home Editions SP2) /XP (Prof. and Home SP3) Mac OS 10.6+ (including MountainLion OS) and Linux 2.6+ or higher
Public Key Cryptography Standard #11 (PKCS-#11)
SUPPORTED OTP PLATFORMS:
VeriSign Identity Protection (VIP)