Mobile Data Security Blog

Home  »  Posts tagged "strong passwords"


Introducing IronKey Workspace W200 – Affordable and Secure Windows To Go


W200 – The Basics

This morning we introduced the IronKey™ Workspace W200 – our most affordable Windows To Go device to date. The W200 is a USB 3.0 SuperSpeed Windows To Go device in a new lightweight ruggedized design. The device comes in black, includes the always present IronKey LED that signals when your device is running, and provides a loop so you can add to your keyring or a lanyard. Like all IronKey devices the W200 is waterproof, shockproof and meets MIL-STD-810G test specifications like its siblings. The W200 has excellent performance clocking Max Read speeds of 310MB/second and Max Write of 159MB/second.  I’ve compared this to my everyday W500 and don’t see any noticeable lag. Like all IronKey Windows To Go devices the W200 is Microsoft Certified and Windows 10 Ready and can be used with all IronKey deployment tools including our mass Provisioning Tool or scriptable Command Line Utility. The W200 allows for usage of Bitlocker To Go encryption so you make use of all your Microsoft skills in creating and protecting your mobile workforce.  The IronKey Workspace W200 devices are available now through our partners, starting at $96 for a 32GB device.

Top Use Cases

Where is the volume? The largest deployments of IronKey Windows To Go are coming from two types of customers. The first are those who have been saving money over deploying new hardware to employees and contractors. Telefónica Deutschland recently noted a savings of 2,500 Euros (USD approx. $2800) on hardware over a three-year period – and they’re not alone. We’re seen many organizations find they can buy 10-20 W200 devices for the price of a single laptop.

The second use case we’re seeing in volume is the “secure container” where IT is leveraging Windows To Go for consistency and security. Here how it works with VDI/VPN and Remote Workers – IT creates a Windows image that contains Windows OS, all the software to VPN in, the Citrix Receiver or VMWare Player and any security software they might need and hand those out to employees and contractors. Why? Well, the biggest answer is saving time and money for IT as it reduces support calls from users who have trouble and call in from home machines. In addition employees like it too – no longer are there the hassles of security scans and the perception of IT invading the home machine – just plug-in, boot and go.

What’s Next?

Keep an eye out on our website for some updates that I think you’ll really like.




Savvy Security Users: IronKey USB 3.0 Hard Drives Now Available!


New IronKey™ USB 3.0 SuperSpeed Hard Drive – First to Offer Cloud Management

To all you savvy security users, here’s some great news! The IronKey Enterprise H300 USB 3.0 SuperSpeed external hard drives are now availableThese new devices can be managed in the cloud or on-premise with the same console used to manage IronKey Enterprise S/D 250 flash drives and IronKey Workspace W700/W500 devices for Windows To Go.

What does this mean for existing customers?

This product lets you enjoy the high-performance benefits of USB 3.0 while safeguarding up to 1TB of data on a USB hard drive.  If you want management capabilities, and are already using the IronKey Enterprise Management Console for IronKey Enterprise flash drives or our secure workspace devices, then all you need to do is add this device. Quick and easy! 

What does this mean for new customers?

Looking for an affordable, high-security external hard drive in today’s market? Look no further! New customers can select from two versions of the latest from IronKey: the IronKey Enterprise H300 and the IronKey Basic H300.  Both feature hardware encryption and a Section 508 compliant control panel available in eight languages, but with the IronKey Enterprise H300 hard drive, you’ll also get cloud-based, or on-premise, centralized management capabilities.

What platform is used to manage the IronKey Enterprise H300 drives?

The IronKey Enterprise H300 drives can be managed with the IronKey Enterprise Management Service or Server to establish a secure storage command center for administering the use of IronKey encrypted drives.  Both include advanced management features such as Active Malware Defense and the IronKey Silver Bullet Service so IT professionals can centrally administer policies, re-commission devices that are no longer in use and even remotely wipe, or disable, lost or stolen drives.  All you have to decide is whether you want your management capabilities in the cloud or housed internally. 

And if you happen to lose your password, don’t sweat it! The IronKey Enterprise H300 is the only drive on the market to offer secure password reset when a password is forgotten, without erasing all the content on the drive.

Where can I get an IronKey H300 hard drive?

The IronKey H300 hard drives are immediately available through Imation Mobile Security channel partners. The IronKey Basic H300 can also be purchased on our estore. Pricing is competitive, starting at $199 for 500GB and $249 for 1TB. Enterprise management licensing fees are additional for IronKey Enterprise H300 and start at $24 per year per user for management in the cloud.

What does this mean for you?

IronKey H300 hard drives offer the best value in the market today; enabling you to enjoy the high-performance benefits of USB 3.0 technology, cloud and server management capabilities, and of course, the highest security available.

 IronKey H300_LFT


Bring out the heavy hardware to protect passwords

Use strong passwords, un-guessable security codes and hardware encryption to defeat advanced threats

As long as you have a password in place, your data is protected, right? The number and types of breaches we saw in 2012 challenge this notion. From LinkedIn to eHarmony to Twitter, cyber thieves have been on the hunt to break the barriers of thousands of simple passwords. And what is most chilling? it’s not going to stop.

Passwords have been around since the dawn of the digital age, but they are not well understood. Simple, overused passwords can’t protect data from even low-skilled hackers. And people are people, and even when they are outfitted with The World’s Most Secure Flash Drive, need a reminder that making your password “password” is no longer (if ever) considered clever or safe.

With rising attention to data privacy and increasing risk of data breaches, there will be more encryption across all devices and platforms in 2013. Which means that it is never too soon to revisit the password. Here are four best practices organizations should follow to improve password strength their organization:

  1. Passwords must be longer, stronger and un-guessable
    Passwords protected in software are subject to offline brute force attacks, which is why web service hacks can be so devastating. Attackers can go through a database of passwords they have obtained and crack them at their leisure.  It is remarkable the number of individuals who use the password “password” or “123456”. These passwords are often the first ones breached by cyber-thieves, as can be noted in last years LinkedIn and Twitter breaches.

    • Instead, choose a unique password, with character complexity and a combination of both letters and numbers. A strong password should be at least 12 characters long. The rule is that the longer the password, the longer it will protect you. A good hacker can breach an 8-character password in a few days; a 15 character password might take a year.
    • To make the password even stronger, the character complexity should be at random, as complexity alone is not enough to stop a hacker in today’s digital age. Having a strong password makes offline attacks much more difficult for hackers.
  2. Remember Personal Information is Out There
    With today’s heavy social media presence, the names of your dog or your mother’s maiden name are no longer confidential information. The public has access to the information you post on your social media site, and unwittingly offer clues to clever hackers. When choosing security questions for password recovery, be mindful of the information that is public, and create passwords that revolve around something actually “private.”
  3. Use Hardware Encryption to Combat Advanced Software Threads
    Avoiding the threat of brute force attacks on passwords requires heavier hardware – hardware encryption, that is. A password protected in the right kind of hardware makes security simpler, because this kind of brute force attack to decrypt the password is not possible. The hardware will lock up after a low number of attempts (set by policy), and then the attack stops.

And finally, a bonus point: Remember to set strong policies and educate employees. Cyber-thieves are becoming more sophisticated, and strong passwords are the best defense. Organizations must create stricter guidelines for employee password security in order to keep their employee’s personal and the company’s corporate data secure.