SlideShare a Scribd company logo
1 of 15
IronKey Enterprise with Silver Bullet Service THE WORLD’S MOST SECURE FLASH DRIVE IronKey © 2008, All rights reserved.
Lost & Stolen USB Drives *  Survey of IT Professionals Store confidential data on flash drives Not reporting the lost devices immediately Yes Lost data bearing devices Yes *Ponemon Institute 2007
IronKey Confidential – © 2008, All rights reserved.
IronKey Hardware ,[object Object]
PKI digital certificates
One-Time-Passwords
Tamper resistant
Rugged & waterproof
Fast & reliable
FIPS 140-2  level 3 validated,[object Object]
AES algorithm much faster in hardware
Much more secure than software encryptionStrong Key Protection ,[object Object]
IronKey encryption keys are managed in a chip – not NAND Flash memoryAES encryption mode ,[object Object],Encrypted using  ECB mode Original Encrypted using  CBC mode
Easy to Set Up First-time users:  Just plug it in  and  create a password IronKey © 2008, All rights reserved.
Easy to Use –  No Software to Install All software auto-runs from the device. IronKey © 2008, All rights reserved.

More Related Content

Similar to Ironkey enterprise with silver bullet service

2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UKmfoudi
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersVi Tính Hoàng Nam
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile securitySatya Harish
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applicationsSatish b
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyClubHack
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherFMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherVerein FM Konferenz
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 

Similar to Ironkey enterprise with silver bullet service (20)

Iron Key Introduction
Iron Key IntroductionIron Key Introduction
Iron Key Introduction
 
2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK2016_Integral_Encrypted_USB_SSD_Brochure_UK
2016_Integral_Encrypted_USB_SSD_Brochure_UK
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
UplinQ - the future of mobile security
UplinQ - the future of mobile securityUplinQ - the future of mobile security
UplinQ - the future of mobile security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applications
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Hacking and Securing iOS Applications
Hacking and Securing iOS ApplicationsHacking and Securing iOS Applications
Hacking and Securing iOS Applications
 
Hacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish BomissttyHacking and Securing iOS Applications by Satish Bomisstty
Hacking and Securing iOS Applications by Satish Bomisstty
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Diskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive DatasheetDiskashur Desktop Hard Disk Drive Datasheet
Diskashur Desktop Hard Disk Drive Datasheet
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon ThatcherFMK2014 FileMaker Security and Database Encryption by Jon Thatcher
FMK2014 FileMaker Security and Database Encryption by Jon Thatcher
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 

Recently uploaded

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Ironkey enterprise with silver bullet service

  • 1. IronKey Enterprise with Silver Bullet Service THE WORLD’S MOST SECURE FLASH DRIVE IronKey © 2008, All rights reserved.
  • 2. Lost & Stolen USB Drives * Survey of IT Professionals Store confidential data on flash drives Not reporting the lost devices immediately Yes Lost data bearing devices Yes *Ponemon Institute 2007
  • 3. IronKey Confidential – © 2008, All rights reserved.
  • 4.
  • 10.
  • 11. AES algorithm much faster in hardware
  • 12.
  • 13.
  • 14. Easy to Set Up First-time users: Just plug it in and create a password IronKey © 2008, All rights reserved.
  • 15. Easy to Use – No Software to Install All software auto-runs from the device. IronKey © 2008, All rights reserved.
  • 16. IronKey Enterprise Always-On Encryption Eliminates Risk of Lost or Stolen Flash Drives Protects Against “Rogue” Users Remote Administration & Policy Enforcement Portable ID and Strong Authentication
  • 17. IronKey Enterprise Silver Bullet Service:Protection Against Malicious Insiders DENIES access to rogue flash drives DISABLES IronKeys of concern DESTROYS compromised device DELIVERS forensic knowledge of device activities IronKey– © 2008, All rights reserved.
  • 18. IronKey Personal Always-on Encryption Portable Security Software Internet Protection Services Self-Service Device & Password Recovery Rugged & Physically Secure
  • 19. IronKey Basic Hardware Encryption No Software to Install Cross Platform Encrypted Local Back-up
  • 20. An IronKey for Every Need:Business, Individual, Government, and Military For More Information Visit www.IronKey.com or E-mail sales@ironkey.com IronKey © 2008, All rights reserved.
  • 21. The IronKey USB flash drive is one of the most secure devices I've ever worked with, but simultaneously tries to be- and achieves being- among the simplest to interact with in achieving that security. - May 22, 2008: Glen Fleishman on Hardware IronKey– © 2008, All rights reserved. PC World states:
  • 22. IronKey – © 2008, All rights reserved. “This is without a doubt the most secure USB flash drive I've ever tested.” ComputerWorld – February 29, 2008
  • 23. IronKey – © 2008, All rights reserved. For any enquiry, please contact Ironkey Certified VAR - Castleforce on Tel: +44(0)118 907 1600 Tel: +44(0)151 203 1400 Email: info@castleforce.com www. castleforce.co.uk/ironkey Thank You

Editor's Notes

  1. RE-word last chart description?
  2. The key is the custom-designed IronKey CryptochipWe design devlop the Cryptochip ourselvesHardware-based encryption has the encryption algorithm in hardware (the Cryptochip in our case), an approach that is much more secure and runs much faster than software-based encryption, and puts no overhead on the drive itselfAll data is encrypted all the time—There’s no way to accidentally turn it off; you can’t fail to have the driver installed; there’s no way for a user to accidentally transfer a file to the wrong partition and have it not be encrypted; etc. This “always on” encryption is critical for data protection and for compliance in some industries (i.e., where, by regulation, you can’t let the user make a mistake)All Encryption keys are stored hardware and are not subject to “cold boot” attacks—an approach recently proven at Princeton where you take a computer that has software encryption, which is asleep or recently shut down, and spray a compressed-air cleaning spray (available at any office supply store) on the memory chips to cool them down to near freezing, and then extract the decryption keys, which allows you to reboot and get at the entire contents of the diskUnlike competitors, encryption keys are not created or escrowed outside the deviceProtects against password brute-force guessing — IronKey is more secure because all password verification is done in hardware. After 10 tries we lock you out, blow away the encryption keys, and blow away the data. In software there’s no way to prevent you from replaying and testing millions of passwords, and there’s products out there today that can guess 250,000 passwords a secondBoth hardware- and software-based encryption use strong encryption algorithms. However, two key weak links are encryption keys and the method employed for the encryption algorithm—Weak Key Protection in SoftwareMost competitors create their encryption keys outside of the deviceMost competitors store their encryption keys in NAND Flash memoryMade in ChinaSome competitors manufacture the drives and create encryption keys in factories overseas, which means when you leave the encryption keys floating around or escrowed by a foreign entity, you risk compromising the whole production run. So how can you trust a security product made in China?IronKey uses the preferred AES encryption modeMost competitors use ECB (Electronic Code Book) mode, which is not recommended by NIST or NSA. ECB encrypts the blocks to look exactly the sameWe have taken the time to implement the proper CBC (Cyber Block Chain), is the most secure mode and is preferred by both NIST and NSA
  3. IronKey Basic, like all IronKeys, are designed to meet one of the most necessary but yet overlooked features in a secure USB device—ease of use.
  4. IronKey Enterprise extends the IronKey platform’s the strong encryption capabilities, speed, and rugged reliability with remote management and policy enforcement.Features—Always-on encryption provides a fool-proof way to ensure that users protect critical IP and other confidential data, while also enabling compliance with regulation regarding protection of personal data. (Reiterate: All data is encrypted all the time—There’s no way to accidentally turn it off; you can’t fail to have the driver installed; there’s no way for a user to accidentally transfer a file to the wrong partition and have it not be encrypted; etc.)The platform’s unique management as an online service offers a number of advantages— You can manage users remotelyYou don’t have any software to install, no server to install, no database to manage—IronKey manages all that for the customerWe don’t have any of your data on our system (if you choose not have any passwords). All we know is the devices serial number, so it’s a highly secure systemOnboard digital certificate provides simple strong authentication--will soon have capability to import certificates, providing simple authentication for VPNs, firewalls, etc.You can also choose to give users the full privacy and identity protection features of IronKey Personal— A secure onboard Firefox browser and password manager protects the user’s identity and passwords“Secure Session” protects users on insecure WiFi networks and enables them to open a secure, private tunnel through the public InternetSleek waterproof metal case helps shield the chips and critical data
  5. PROTECT YOUR DATA, SECURE YOUR FILESAND IDENTITY WITH IRONKEYENCRYPT YOUR DATAPROTECT YOUR IDENTITYSURF PRIVATELY
  6. You can see the that we have created an IronKey for everybodyFrom Basic with provides the hardware foundation for the entire product lineTo Personal which includes software and services to protect users online includingEnterprise which lets you configure with applications are available to users, remotely manage user devices and recover data if necessaryIronKey comes in three flavors.IronKey Basic—Offers the most secure portable storage device available for organizations that need the highest data security and have restrictions on third-party software—the Military is a good example of this type of customer. Has only one piece of software, which enables local encrypted back-up of the contents of the IronKeyIronKey Personal—Combines the world’s most secure flash drive with Internet and Identity protection services, includingA secure Firefox browser on the device that lets you take computer bookmarks, history, favorites with you and plug in a complete digital life into any computerStores you temp and cache files on the IronKey so they are not available for heisting“Secure Sessions,” which enables encrypted web surfing over any network and protects you against pharming attacks (we run the DNS for you, so if for example somebody has tampered with DNS on a WiFi network and someone has tampered with the DNS they can’t redirect you to a fraud site—we’ll take you to the correct site)A password manager on the device that lets you store and manage all your Internet passwords on the IronKey, which not only adds convenience but protects users from keyloggers because it enters passwords with just one click one of the mouse (you can also optionally store them with us so that if you lose your device you can restore your passwords by answering secret challenge/response questions)IronKey Enterprise,Tailored larger organizations, it extends the high performance and high security of the IronKey platform with remote management, enforcement of configurable policies (e.g., password strength), strong authentication capabilities, etc.It gives you the option of giving users some or all full identity and privacy protection of onboard software and online services available on IronKey Personal