Kingston IronKey ACCESS Enterprise
Configure and enforce policies across compatible IronKey secure USB mobile storage devices
More pricing below, click here!
Overview:
Configure and enforce policies across compatible IronKey secure USB mobile storage devices
With IronKey ACCESS software, you have a wide range of options for configuring and enforcing data security policies across nearly all IronKey™ hardware encrypted flash drives and hard drives. IronKey ACCESS offers the industry’s most comprehensive solution for managing IronKey F100, F150 and F200+Biometric flash drives, and IronKey H100 and H200+ Biometric external hard drives. From the largest enterprises down to individuals and small groups, IronKey ACCESS offers a premise-based option for controlling your portable storage devices:
ACCESS Standard. Perfect for small organizations, it offers the ability to individually manage drives.
ACCESS Enterprise. Centralized management, streamlined provisioning, and the most robust security controls make this an ideal choice for large enterprises.
Control Individual Drives with Access Standard
With factory-installed software preloaded on every device, individuals and small groups can benefit from strong password and authentication rules, zero footprint portability, automatic device wipe, and optional administrative capabilities like pre-configuring or reissuing devices.
Easily Administer Small or Large-scale Deployments with Access Enterprise
Rely on this premise-based solution to centrally configure usage, password and authentication policies once and deploy them to individual devices, use pre-configured reports to simplify audits, and pre-load devices with applications for secure use in the field. Broadly deploy USB devices, including biometric drives, and police their use. You can even revoke user privileges or wipe drives remotely when the need arises.hardware-based identity management capabilities.
Features:
ACCESS Standard Features
Factory-installed tools for configuration and re-issue
Using tools that come pre-installed on your IronKey device, take on the administrator role to individually pre-configure devices for password policy and authentication rules. You can also get more from your portable storage investment by recycling used devices and issuing them to new users.
Strong password and authentication rules
Define rules for password length, special characters, retry attempts, re-use and more. On IronKey biometric devices, set single-factor or multi-factor authentication rules.
Wipe lost or stolen devices
Optionally configure devices to automatically wipe data if unsuccessful password attempts exceed a pre-defined limit.
Flexible biometric authentication
Configure biometric hardware devices (IronKey F200 + Biometric flash drives and IronKey H200 +Biometric hard drives) for one-factor or two-factor authentication: Password only, biometric only, password or biometric, password and biometric.
Zero-footprint portability
Leave no trace behind when you run ACCESS directly from the device on any host PC or Mac, without the need for special drivers or administration rights.
Optional factory-installed malware protection
Order drives with anti-virus protection to safeguard files, applications and host systems.
Scalable management
Managing more than a handful of devices is easy, because you can seamlessly upgrade any device managed by ACCESS Standard to ACCESS Enterprise Manager or ACCESS Enterprise Server.
ACCESS Enterprise Features
(Includes all ACCESS Standard features, plus the following)
Scalable, centralized policy management platform
From a centralized console, maintain control over thousands of devices by configuring policies to govern authentication, password structure, password usage, biometric security levels, retry limits, and device recovery
Efficient configuration
Configure policies once, then deploy those policies across individual devices as they are provisioned. Conveniently and remotely update policies from within your network or over the public Internet. You can also create groups and specify policies through integration with Active Directory.
Simple, portable content management
Drag and drop corporate applications so portable devices can be pre-loaded with approved software.
Streamlined device management
Allow users to self-issue devices right at their desks while maintaining full adherence to predefined security policies. Then update policies at any time, even over the Internet.
Distributed provisioning
Allow newly issued devices to securely connect to the server to obtain policies and updates, without relinquishing control.
User self-rescue
With ACCESS Enterprise Server, ensure that devices remain accessible even if a user forgets their password or damages their fingerprint
Comprehensive data recovery.
Help desk operators can now re-establish access to the device or even permanently erase all of the device’s data when users fail to authenticate their compatible IronKey device. Employ easy-to-implement password and biometric recovery options to rescue blocked users, even if they are away from the corporate network.
Secure device communication
Allow newly issued devices to securely connect to the server to obtain policies and updates, without relinquishing control.
On-premise security
ACCESS Enterprise operates entirely from within your IT environment, so you maintain the utmost control and security.
Malware protection management
Easily deploy on-board virus protection to managed devices, protecting files, applications, and host systems.
Tailored environments
Tailor security policies and device behavior to different user needs via multiple templates and profiles.
Advanced reporting
Make it easier to meet audit and compliance requirements by logging and storing a complete history of administrative activities for each device, along with real-time views into user and device status.
Technical Specifications:
IronKey ACCESS Enterprise Specifications | |
---|---|
Device Compatibility | Compatible with IronKey F-series Flash Drives and H-series Hard Drives. |
System Compatibility of Identity Features |
|
PKI Interface | Public Key Cryptography Standard #11 (PKCS-#11) |
Supported OTP Platforms |
|
Documentation:
Download the IronKey ACCESS Enterprise Datasheet (PDF).
Contact us for pricing!
Contact us for pricing!
Contact us for pricing!
Contact us for pricing!
*Price per License. Single License.
Contact us for pricing!
*Price per License. 100 pack.
Contact us for pricing!
*Price per License. 100 pack.
Contact us for pricing!
*Price per License. 500 pack.
Contact us for pricing!
*Price per License. 500 pack.
Contact us for pricing!
*Price per License. 1000 pack.
Contact us for pricing!
*Price per License. 1000 pack.
Contact us for pricing!
Contact us for pricing!
Contact us for pricing!
Contact us for pricing!
*Price per License. Single License.
Contact us for pricing!
*Price per License. Single License.
Contact us for pricing!
*Price per License. 100 pack.
Contact us for pricing!
*Price per License. 100 pack.
Contact us for pricing!
*Price per License. 500 pack.
Contact us for pricing!
*Price per License. 500 pack.
Contact us for pricing!
*Price per License. 1000 pack.
Contact us for pricing!
*Price per License. 1000 pack.
Contact us for pricing!
For 500 or more Licenses please Get a Quote