Call a Specialist Today! 877-352-0547
Free Shipping! Free Shipping!

Solutions for Government

The Data Security Challenge

government

Overview:

The Data Security Challenge

Government, defense and intelligence agencies – and the civilian companies that contract with them – are under intense scrutiny and pressure to comply with a lengthening list of legislative requirements and protocols designed to protect sensitive data in transit and at rest. Working with ever-tighter budgets, these organizations must:

  • Meet stringent data confidentiality, integrity, availability and authentication requirements for mobile employees, teleworkers and contractors
  • Comply with U.S. legislative requirements such as the Federal Information Security Management Act (FISMA), OMB M06-16 Mandate, Federal Desktop Core Configuration (FDCC) mandates, and Director of Central Intelligence Directive (CDID) 6/3.
  • Show compliance with international data security requirements imposed by the National Information Assurance Partnership (NIAP) Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS)
  • Adhere to Federal Information Processing Standard (FIPS) and CESG Assisted Products Service (CAPS) standards. Federal Information Processing Standard (FIPS) is a publicly announced standardization developed by the United States federal government for use in computer systems by all non-military government agencies and by government contractors, when properly invoked and tailored on a contract. CAPS (CESG Assisted Products Service) is a certification scheme exclusive to the UK Government market. CAPS offers Government and MoD users the assurance their security products have been tested to the highest standards.
  • Meet state data security mandates

The Price of Non Compliance

government

For agencies, the price of non-compliance can range from a loss of public trust and more intense oversight to costly class-action lawsuits. For the thousands of civilian companies whose business relies on working with government agencies at all levels, non-compliance could disqualify them from bidding on government contracts.

That means agencies and contractors with mobile employees carry enormous responsibility for securing data, identities and applications. To operate efficiently in an increasingly mobile world, they must give authorized users anytime access to sensitive data without compromising user identities, core applications or protected networks. To comply with data security requirements, they must be able to monitor and track data access and use no matter where employees carry it – and then document that activity in audits and reports. Meanwhile, organizations are also expected to keep mobile workers productive when severe weather, infrastructure failures or other disasters threaten their ability to do their jobs.

Trust IronKey to ease compliance, protect identities, and more

Kingston helps you simplify compliance with military-grade and encrypted devices, but we don’t stop there. Our mobile security solutions protect digital identities and applications no matter where employees or contractors take them. Because) our centralized management platforms put you in control of data access and use, you don’t have to rely on the diligence of the hundreds or thousands of mobile workers who carry sensitive data with them every day.

Kingston delivers some of the world’s most secure, scalable and reliable mobile storage, identity management and device management solutions, including:

  • encrypted flash drives
  • secure portable workspaces
  • encrypted external hard drives
  • identity management solutions
  • secure storage management solutions

Every one of these offerings was designed to work seamlessly together and create a cost-effective, end-to-end solution that you can use to reduce your potential exposure to non-compliance, drive down operating costs, improve productivity, and maintain operations no matter what happens.

Features:

Deploy mobile storage protection strong enough for Top Secret data

Kingston’s IronKey™ family of flash drives and external hard drives, along with the Kingston IronKey™ flash drives, lock down sensitive data with an on-board, hardware encryption engine that puts a military-grade, and AES-256 wall between unauthorized users and the drive’s contents

Maintain control over data access and use, conveniently and centrally

The security protections built into Kingston’s encrypted USB drives are formidable. And by choosing from an array of scalable, intuitive platforms for establishing and policing your employees’ use of Kingston IronKey flash drives, you can ensure that your employees and contractors are taking the right measures, such as using strong passwords, to take full advantage of those capabilities From a central console, set policies for passwords, application use, recovery, and more – across a handful of drives or thousands of them. Depending on the Kingston solution you deploy, you can also manage and update device drivers and applications, administer identity protection features, and create whitelists of approved IP addresses to control where devices and applications can be used. And if a drive is lost or stolen, you can even remotely erase it or destroy it.

Protect the digital identities of workers in the field

When a mobile employee’s digital identity is compromised, your network, your applications, and your data all become vulnerable. That’s why Kingston offers strong, multifactor authentication (password, biometric and CAC/PIV) on Kingston IronKey drives. And for users of Kingston flash drives, Kingston offers enterprise-class identity management capabilities – combining PKI crypto services, two-factor authentication and strong password management – to shield identities out in the wild. Only Kingston integrates these sophisticated protections with encrypted storage in a single mobile device.

Simplify the burdens of compliance with advanced reporting and auditing.

Complying with data security rules doesn’t have to be a headache. Use Kingston’s advanced reporting and auditing capabilities to document how, where and when users have accessed, saved or modified confidential data. And for maximum flexibility, Kingston offers you both premise-based management solutions (when device management must reside behind your firewall) and cloud-based management solutions (eliminates the need for capital investments in servers and other hardware).

Shield data and applications from malware

In addition to the combined safeguards of encryption, multi-factor authentication and hardened enclosures, Kingston’s enterprise-class mobile storage solutions come with anti-virus and anti-malware protections, either as a standard feature or as an option.

Keep data secure without compromising productivity

Mobile data security involves more than just locking down data. Workers need the flexibility of working from any PC, and they get it with Kingston portable workspace solutions. These solutions, available on Kingston encrypted USB flash drives, add another dimension to mobile security by enabling employees and contractors to safely work from any computer – at the office, at home, or on the road – with a fully functioning Microsoft Windows 8.1 desktop environment that goes everywhere they do and features all the applications workers need. Hardware encryption and strong authentication keep confidential data where it belongs, and the portable workspace is fully isolated from malware or other threats that may be present on the host computer, keeping them out of your datacenters and your networks.

Empower mobile workers with simple, user-friendly solutions

There’s no need for employees or contractors to install drivers or other software to securely access their stored data, workspace or applications. Kingston drives come pre-loaded with everything users need, and they leave no trace on the host PC.

Put mobile security at the heart of your disaster recovery plan

Power outages, severe storms, earthquakes, fires – any of these might usually impact your ongoing operations. But Kingston’s secure mobile storage and portable workspace solutions help keep workers productive even when they can’t make it into the office.

Make data easily accessible to every authorized user

To ensure that our products remain accessible to all users, including people with disabilities, Kingston’s software products are compliant with Section 508 of the U.S. Rehabilitation Act, part 1194.21.

IronKey products are available on the following Federal Contracts:

  • GSA Schedule
  • NASA SEWP IV
  • DHS Blanket Purchase Agreement

Benefits:

Is your mobile work force putting you at risk?

Workforce mobility equates to productivity, efficiency and flexibility. But it also brings risk: You can’t afford to let mobile workers compromise the security of the sensitive data they carry.

No wonder Federal government, military and intelligence agencies are required to meet stringent requirements that cover data confidentiality, integrity, and availability. U.S. legislative mandates, international data security requirements, the Federal Information Processing Standard (FIPS), and various state data security directives have all combined to make protecting sensitive information your responsibility.

Avoid the high cost of non-compliance

Failing to comply with data security mandates can trigger serious problems for agencies, including a loss of public trust, more intense oversight by regulators, and costly class-action lawsuits. And for civilian companies that work with Federal agencies, non-compliance could result in lost contracts, lay-offs and worse.

Get true mobile protection with IronKey

With IronKey, you can simplify compliance by relying on FIPS 140-2 Level 3* validated, military-grade encrypted USB storage devices that put a wall between unauthorized users and the data you need to protect. Choose from an array of IronKey solutions:

  • encrypted USB flash drives
  • encrypted USB external hard drives
  • USB drive management solutions

IronKey devices offer multiple layers of protection, including: strong, multifactor authentication (password and biometric); AES 256-bit hardware encryption; and tamper- and waterproof** enclosures.

Get the IronKey advantage

  • Mobilize employees and contractors by enabling them to safely access agency data from virtually any PC and tablet.
  • Shield government data with a virtually indestructible drive that exceeded military waterproof testing requirements.
  • Lock down sensitive data by putting military-grade encryption and a ruggedized enclosure between unauthorized users and your IronKey drive’s contents.
  • Meet security mandates by relying on FIPS 140-2 Level 3 validated devices and advanced auditing and reporting.
  • Centrally manage data access and use, no matter where employees go.
  • Maintain critical operations during severe weather or other disasters.

With IronKey secure storage drives...

  • Employees can access data from home using virtually any PC.
  • Federal law enforcement personnel can review and update case files in the office or in the field.
  • Scientists, analysts and forecasters can access data sets from any location with a PC or tablet.
  • Contractors can work at agency offices while still having trusted access to data.
  • Agencies can maintain operations during disasters by putting critical data in the hands of key personnel.
  • IT can enforce access and use policies from a central console.

Build your secure mobile storage strategy with IronKey:

Encrypted USB Flash Drives | 2GB-64GB  
Highest Security (FIPS 140-2 Level 3)* + Centralized Management The right choice for...
IronKey Enterprise S250 + D250
Cloud or on-premise centralized management, optional Antivirus, security software, ID MGMT. and VeriSign® Identity Protection (VIP)
  • Auditing and reporting for compliance with widest range of data security mandates
  • Broad deployments
  • High-risk, high-traffic environments
IronKey F200
Biometric Authentication, Optional Centralized Management and antivirus
IronKey F150
Rugged Metal Enclosure, Optional Centralized Management and antivirus
IronKey F100
Durable polymer housing, optional centralized management and antivirus
  • Affordable deployment
  • Compliance with strict data security mandates
Highest Security (FIPS 140-2 Level 3)* The right choice for...
IronKey Personal S250 + D250
ID MGMT, Optional Encrypted Password Backup, secure Web Browser and VeriSign® Identity Protection (VIP)
  • Deployments without the need for centralized management, reporting or auditing
  • High-risk, high-traffic environments
  • Compliance with most data security mandates
IronKey Basic S250 + D250
Self-service password reset
High security The right choice for...
IronKey D80
Built-in AES-256 hardware encryption, password protected
  • Deployments without the need for centralized management, reporting or auditing
  • Compliance with many data security mandates
Encrypted USB Hard Drives | 320GB-1TB  
Highest Security (FIPS 140-2 Level 3)* + Centralized Management The right choice for...
IronKey H200
Biometric, strong password, optional centralized management and antivirus
  • Auditing and reporting for compliance with widest range for data security mandates
  • Large data sets and full or portable applications
IronKey H100
Strong password authentication, multi-user collaboration through safeshare, authentication, optional centralized management and antivirus
High security + Centralized Management The right choice for...
IronKey Enterprise H300 External Hard Drive
USB 3.0 Performance, AES 256-Bit Hardware Encryption
  • Auditing and reporting for compliance with a wide range of data security mandates
  • Performance of USB 3.0 with faster read/write speeds
High security The right choice for...
IronKey Basic H300 External Hard Drive
USB 3.0 performance, AES 256-Bit hardware encryption
  • Deployments without the need for centralized management, reporting or auditing
  • Performance of USB 3.0 with faster read/write speeds
  • Compliance with many data security mandates

Stay in control of devices and data

With the optional cloud-based or on-premise IronKey Enterprise Management Service or Server, you can centrally administer access and usage policies across thousands of IronKey USB drives. Force password changes, re-commission drives no longer in use, even remotely disable or terminate rogue drives. Simplify compliance with advanced reporting and auditing that lets you document how, where and when users have accessed, saved or modified confidential data.

Deploy tough, proven IronKey drives

IronKey USB flash drives undergo thousands of hours of rigorous read/write tests, and we encase each one in a sturdy, tamper-proof chassis that’s water, dust and shock-proof. And our IronKey USB hard drives are protected by high-strength, tamper-proof aluminum enclosures that resist break-ins.

Rely on and end-to-end IronKey solution

IronKey solutions are designed to work seamlessly together and create a cost-effective, end-to-end solution that you can use to reduce your potential exposure to non-compliance, drive down operating costs, improve productivity, and maintain operations no matter what happens.


*What is FIPS 140-2 Level 3? A U.S. government computer standard that defines a high level of cryptographic and physical protection designed to keep sensitive data safe from theft or hacking.

**What is the waterproof standard? MIL-STD-810F, also referred to as US Department of Defense Test Method Standard for Environmental Engineering Considerations and Laboratory Tests, establishes testing standards to evaluate the durability of products, especially in extreme circumstances. IronKey devices are waterproof and dustproof according to MIL-STD-810F standards.