SlideShare a Scribd company logo
1 of 15
IronKey Enterprise with Silver Bullet Service THE WORLD’S MOST SECURE FLASH DRIVE IronKey © 2008, All rights reserved.
Lost & Stolen USB Drives *  Survey of IT Professionals Store confidential data on flash drives Not reporting the lost devices immediately Yes Lost data bearing devices Yes *Ponemon Institute 2007
IronKey Confidential – © 2008, All rights reserved.
IronKey Hardware ,[object Object]
PKI digital certificates
One-Time-Passwords
Tamper resistant
Rugged & waterproof
Fast & reliable
FIPS 140-2  level 3 validated,[object Object]
AES algorithm much faster in hardware
Much more secure than software encryptionStrong Key Protection ,[object Object]
IronKey encryption keys are managed in a chip – not NAND Flash memoryAES encryption mode ,[object Object],Encrypted using  ECB mode Original Encrypted using  CBC mode
Easy to Set Up First-time users:  Just plug it in  and  create a password IronKey © 2008, All rights reserved.
Easy to Use –  No Software to Install All software auto-runs from the device. IronKey © 2008, All rights reserved.

More Related Content

Similar to Ironkey enterprise with silver bullet service

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UKmfoudi
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersVi Tính Hoàng Nam
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile securitySatya Harish
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applicationsSatish b
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherFMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherVerein FM Konferenz
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 

Similar to Ironkey enterprise with silver bullet service (20)

Iron Key Introduction
Iron Key IntroductionIron Key Introduction
Iron Key Introduction
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applications
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Hacking and Securing iOS Applications
Hacking and Securing iOS ApplicationsHacking and Securing iOS Applications
Hacking and Securing iOS Applications
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Diskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive DatasheetDiskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive Datasheet
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherFMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 

Recently uploaded

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Recently uploaded (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

Ironkey enterprise with silver bullet service

  • 1. IronKey Enterprise with Silver Bullet Service THE WORLD’S MOST SECURE FLASH DRIVE IronKey © 2008, All rights reserved.
  • 2. Lost & Stolen USB Drives * Survey of IT Professionals Store confidential data on flash drives Not reporting the lost devices immediately Yes Lost data bearing devices Yes *Ponemon Institute 2007
  • 3. IronKey Confidential – © 2008, All rights reserved.
  • 4.
  • 10.
  • 11. AES algorithm much faster in hardware
  • 12.
  • 13.
  • 14. Easy to Set Up First-time users: Just plug it in and create a password IronKey © 2008, All rights reserved.
  • 15. Easy to Use – No Software to Install All software auto-runs from the device. IronKey © 2008, All rights reserved.
  • 16. IronKey Enterprise Always-On Encryption Eliminates Risk of Lost or Stolen Flash Drives Protects Against “Rogue” Users Remote Administration & Policy Enforcement Portable ID and Strong Authentication
  • 17. IronKey Enterprise Silver Bullet Service:Protection Against Malicious Insiders DENIES access to rogue flash drives DISABLES IronKeys of concern DESTROYS compromised device DELIVERS forensic knowledge of device activities IronKey– © 2008, All rights reserved.
  • 18. IronKey Personal Always-on Encryption Portable Security Software Internet Protection Services Self-Service Device & Password Recovery Rugged & Physically Secure
  • 19. IronKey Basic Hardware Encryption No Software to Install Cross Platform Encrypted Local Back-up
  • 20. An IronKey for Every Need:Business, Individual, Government, and Military For More Information Visit www.IronKey.com or E-mail sales@ironkey.com IronKey © 2008, All rights reserved.
  • 21. The IronKey USB flash drive is one of the most secure devices I've ever worked with, but simultaneously tries to be- and achieves being- among the simplest to interact with in achieving that security. - May 22, 2008: Glen Fleishman on Hardware IronKey– © 2008, All rights reserved. PC World states:
  • 22. IronKey – © 2008, All rights reserved. “This is without a doubt the most secure USB flash drive I've ever tested.” ComputerWorld – February 29, 2008
  • 23. IronKey – © 2008, All rights reserved. For any enquiry, please contact Ironkey Certified VAR - Castleforce on Tel: +44(0)118 907 1600 Tel: +44(0)151 203 1400 Email: info@castleforce.com www. castleforce.co.uk/ironkey Thank You

Editor's Notes

  1. RE-word last chart description?
  2. The key is the custom-designed IronKey CryptochipWe design devlop the Cryptochip ourselvesHardware-based encryption has the encryption algorithm in hardware (the Cryptochip in our case), an approach that is much more secure and runs much faster than software-based encryption, and puts no overhead on the drive itselfAll data is encrypted all the time—There’s no way to accidentally turn it off; you can’t fail to have the driver installed; there’s no way for a user to accidentally transfer a file to the wrong partition and have it not be encrypted; etc. This “always on” encryption is critical for data protection and for compliance in some industries (i.e., where, by regulation, you can’t let the user make a mistake)All Encryption keys are stored hardware and are not subject to “cold boot” attacks—an approach recently proven at Princeton where you take a computer that has software encryption, which is asleep or recently shut down, and spray a compressed-air cleaning spray (available at any office supply store) on the memory chips to cool them down to near freezing, and then extract the decryption keys, which allows you to reboot and get at the entire contents of the diskUnlike competitors, encryption keys are not created or escrowed outside the deviceProtects against password brute-force guessing — IronKey is more secure because all password verification is done in hardware. After 10 tries we lock you out, blow away the encryption keys, and blow away the data. In software there’s no way to prevent you from replaying and testing millions of passwords, and there’s products out there today that can guess 250,000 passwords a secondBoth hardware- and software-based encryption use strong encryption algorithms. However, two key weak links are encryption keys and the method employed for the encryption algorithm—Weak Key Protection in SoftwareMost competitors create their encryption keys outside of the deviceMost competitors store their encryption keys in NAND Flash memoryMade in ChinaSome competitors manufacture the drives and create encryption keys in factories overseas, which means when you leave the encryption keys floating around or escrowed by a foreign entity, you risk compromising the whole production run. So how can you trust a security product made in China?IronKey uses the preferred AES encryption modeMost competitors use ECB (Electronic Code Book) mode, which is not recommended by NIST or NSA. ECB encrypts the blocks to look exactly the sameWe have taken the time to implement the proper CBC (Cyber Block Chain), is the most secure mode and is preferred by both NIST and NSA
  3. IronKey Basic, like all IronKeys, are designed to meet one of the most necessary but yet overlooked features in a secure USB device—ease of use.
  4. IronKey Enterprise extends the IronKey platform’s the strong encryption capabilities, speed, and rugged reliability with remote management and policy enforcement.Features—Always-on encryption provides a fool-proof way to ensure that users protect critical IP and other confidential data, while also enabling compliance with regulation regarding protection of personal data. (Reiterate: All data is encrypted all the time—There’s no way to accidentally turn it off; you can’t fail to have the driver installed; there’s no way for a user to accidentally transfer a file to the wrong partition and have it not be encrypted; etc.)The platform’s unique management as an online service offers a number of advantages— You can manage users remotelyYou don’t have any software to install, no server to install, no database to manage—IronKey manages all that for the customerWe don’t have any of your data on our system (if you choose not have any passwords). All we know is the devices serial number, so it’s a highly secure systemOnboard digital certificate provides simple strong authentication--will soon have capability to import certificates, providing simple authentication for VPNs, firewalls, etc.You can also choose to give users the full privacy and identity protection features of IronKey Personal— A secure onboard Firefox browser and password manager protects the user’s identity and passwords“Secure Session” protects users on insecure WiFi networks and enables them to open a secure, private tunnel through the public InternetSleek waterproof metal case helps shield the chips and critical data
  5. PROTECT YOUR DATA, SECURE YOUR FILESAND IDENTITY WITH IRONKEYENCRYPT YOUR DATAPROTECT YOUR IDENTITYSURF PRIVATELY
  6. You can see the that we have created an IronKey for everybodyFrom Basic with provides the hardware foundation for the entire product lineTo Personal which includes software and services to protect users online includingEnterprise which lets you configure with applications are available to users, remotely manage user devices and recover data if necessaryIronKey comes in three flavors.IronKey Basic—Offers the most secure portable storage device available for organizations that need the highest data security and have restrictions on third-party software—the Military is a good example of this type of customer. Has only one piece of software, which enables local encrypted back-up of the contents of the IronKeyIronKey Personal—Combines the world’s most secure flash drive with Internet and Identity protection services, includingA secure Firefox browser on the device that lets you take computer bookmarks, history, favorites with you and plug in a complete digital life into any computerStores you temp and cache files on the IronKey so they are not available for heisting“Secure Sessions,” which enables encrypted web surfing over any network and protects you against pharming attacks (we run the DNS for you, so if for example somebody has tampered with DNS on a WiFi network and someone has tampered with the DNS they can’t redirect you to a fraud site—we’ll take you to the correct site)A password manager on the device that lets you store and manage all your Internet passwords on the IronKey, which not only adds convenience but protects users from keyloggers because it enters passwords with just one click one of the mouse (you can also optionally store them with us so that if you lose your device you can restore your passwords by answering secret challenge/response questions)IronKey Enterprise,Tailored larger organizations, it extends the high performance and high security of the IronKey platform with remote management, enforcement of configurable policies (e.g., password strength), strong authentication capabilities, etc.It gives you the option of giving users some or all full identity and privacy protection of onboard software and online services available on IronKey Personal