1 1 IronKey Features Mapped to Market Segments. 2 2 IronKey Solutions Data protection for compliance Consolidate strong authentication Disaster recovery.

Slides:



Advertisements
Similar presentations
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Advertisements

Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
John Whaley Founder and CTO MokaFive Desktop Complexity Challenge System rollouts/ updates/ upgrades Application management PC/Mac/ BYOC Mobility & Remote.
EarthLink Business IT Services. EarthLink Business IT Services Comprehensive IT and network services portfolio −Data center, virtualization, security,
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
New Data Regulation Law 201 CMR TJX Video.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IMATION MOBILE SECURITY. MACRO TRENDS Mobile Workers Compliance Regulations + Modern Worker Behavior + IT Landscape.
Unify and Simplify: Security Management
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Dell Connected Security Solutions Simplify & unify.
·
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Easily Organize Common Templates, Phrases, Statements and More to Quickly Reuse Within Microsoft Office 365 Using Dolphin Compose WHAT WE OFFER Replace.
Take Control of Your Contracts with Dolphin 365, a Companion Product to Microsoft Office 365 That Leverages Your Investment and Reduces Risk OFFICE 365.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
ANNELIES BULKENS UNIFIED COMMUNICATIONS PRODUCT MARKETING MANAGER ILSE VAN CRIEKINGE TECHNOLOGY ADVISOR CORE UNIFIED COMMUNICATIONS.
Kaspersky Small Office Security INTRODUCING New for 2014!
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Total Enterprise Mobility Comprehensive Management and Security
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
OFFICE 365 APP BUILDER PROFILE: Druva
10/16/2017 7:22 AM © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
Lucidchart Extends Collaborative, Cross-Platform Diagramming Solution for Individuals, SMBs, and Enterprises with New Microsoft Office 365 Add-Ins OFFICE.
Information Security Program
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
Utilize Internal Data via Mobile Business Apps
Password Escrow Service
Customized Solutions to your needs
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Secure & Unified Identity
Introduction to Soonr by ….
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Which is right for your business, Office 365 or Microsoft 365?
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
ForceManager Integrates with Office 365 Outlook Mail, Calendar, Contacts, Word, and Excel for a Smart, Fast, Intuitive Mobile CRM Sales Solution OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Which is right for your business, Office 365 or Microsoft 365?
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
The Jamespot for Office 365 Application Attaches Business Processes to Docs and Syncs Them to OneDrive to Simplify Collaboration and Sharing OFFICE 365.
Agolo Summarization Platform Integrates with Microsoft OneDrive to Relate Enterprise Cloud Documents with Real-Time News Summaries OFFICE 365 APP BUILDER.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
MICROSOFT AZURE ISV PROFILE: ONEBE
CompTIA Security+ Study Guide (SY0-401)
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Anyshare solution.
Life Sciences Solutions
Modern benefits administration and HR software, supported by us.
Information Technology Organization Overview RFP #220-05
Presentation transcript:

1 1 IronKey Features Mapped to Market Segments

2 2 IronKey Solutions Data protection for compliance Consolidate strong authentication Disaster recovery preparedness Security-as-a-service for faster time to value FIPS Level 3 Validation Always-on Data Encryption Cross Platform Easy to Use Secure and Self- Defending FIPS Level 3 Validation Integrated password management for simplified access Onboard Anti-Virus for mobile protection Intellectual property protection FIPS Level 3 Validation IronKey Enterprise IronKey BasicIronKey Personal

3 3 Targeting The Right Solution Problem To SolveCritical Functionality# UsersBuyers Enterprise > 10IT Security, Desktop Mgr Data protection compliance, intellectual property protection Centralized management & reporting, anti- malware Basic < 10Project Mgr, IT Security Intellectual property protection for team or department Easy-to-use, hardware encryption Personal 1Individual Professionals Personal data protection, identity theft protection Easy-to-use, always-on encryption, password backup

4 4 Targeting The Right Device LifetimeApplicationsPerformanceTechnology SLC flashBest Data-in-use, virtual machines, video, backups IronKey S200 MLC flashGood Infrequent use, small files IronKey D200

5 5 Additional Resources Feature Comparison Hardware Comparison

6 6 IronKey Industry Solutions Financial / Banking PCI, GLBA, SB 1386 Value: Safeguard customer financial data securely; data availability for mobile workers (US Bank, Wells Fargo) Financial / Banking PCI, GLBA, SB 1386 Value: Safeguard customer financial data securely; data availability for mobile workers (US Bank, Wells Fargo) Government FISMA, FIPS, NIST Value: Protect sensitive defense info from data loss and compliance risks; ensures users are authenticated; track devices globally (FEMA, DoD) Government FISMA, FIPS, NIST Value: Protect sensitive defense info from data loss and compliance risks; ensures users are authenticated; track devices globally (FEMA, DoD) Healthcare HITECH/HIPAA, PCI, SB 1386 Value: Protect Patient health information securely; allows physicians to be mobile and have the ability to access patient data anywhere (Kaiser, Well Point, VA, Baxter) Healthcare HITECH/HIPAA, PCI, SB 1386 Value: Protect Patient health information securely; allows physicians to be mobile and have the ability to access patient data anywhere (Kaiser, Well Point, VA, Baxter) Education FERPA Value: Safeguard student records; Protect University Research info securely; allow teachers to access data anywhere (Harvard, MIT, Kent State U) Education FERPA Value: Safeguard student records; Protect University Research info securely; allow teachers to access data anywhere (Harvard, MIT, Kent State U) Power & Energy FERC Value: Secure highly regulated data (Data at Rest) such as Power Grid plans, national infrastructure plans; prevent introduction of Stuxnet virus (Chevron, Texaco) Power & Energy FERC Value: Secure highly regulated data (Data at Rest) such as Power Grid plans, national infrastructure plans; prevent introduction of Stuxnet virus (Chevron, Texaco) Public Sector State Data Privacy Value: Safeguard personally identifiable information (PII) data securely on remote storage devices; Law Enforcement Agencies (CJIS) (SJ Police Dept, Counties) Public Sector State Data Privacy Value: Safeguard personally identifiable information (PII) data securely on remote storage devices; Law Enforcement Agencies (CJIS) (SJ Police Dept, Counties) IronKey Enterprise fits the portable data security requirements of these market segments

7 7 Sizing an Opportunity “Mobile” Workers 70% of an Enterprise Understand the personas Understand “Data Flow” IT Execs & HR Dev &QA Finance Sales & Mrktg Research Product Plans Qtrly Statements Budgets Annual Report s Customer Data Launch Plans Corp IP Employee Info IT (Director, CIO, CSO) Business enabler (productivity, data flow) Mitigating risk (data protection) Reducing budget (TCO)

8 8 Key Questions 1.Number of Employees / Users 2.Storage Size 3.Years of mgmt service and support Add-ons: Enterprise Anti-Malware service Simplified Pricing Model 1, 2, 4, 8, 16GB to 32GB $59 to $299 USD 1 yr, 2 yr, 3 yr $24, $44, $60 per device

9 9 More Information Review IronKey Solution Info: Become an IronKey partner: Questions? Contact Mark Stack: