Managed Portable Security Devices



Similar documents
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

RSA SecurID Two-factor Authentication

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

2 factor + 2. Authentication. way

DriveLock and Windows 8

DriveLock and Windows 7

Secure Data Exchange Solution

PRIME IDENTITY MANAGEMENT CORE

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Entrust IdentityGuard

McAfee Encrypted USB Hard Disk Non-Bio Quick Start Guide

Certification Report

Netop Remote Control Security Server

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Smart Card Two Factor Authentication

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

RSA Digital Certificate Solution

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

CipherShare Features and Benefits

McAfee Encrypted USB Manager 3.1 Deployment and Administration Guide

SafeNet Securing Microsoft Solutions

An Introduction to Entrust PKI. Last updated: September 14, 2004

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Why it s Time to Make the Change Analysis of Current Technologies for Multi-Factor Authentication in Active Directory

Secure Network Communications FIPS Non Proprietary Security Policy

ipad in Business Security

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

How Endpoint Encryption Works

Secure Access Gateway 3000er Serie

Introducing etoken. What is etoken?

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

How To Protect Your Data From Harm With Safenet

Multifactor authentication systems Jiří Sobotka, Radek Doležel

Complying with PCI Data Security

Using BroadSAFE TM Technology 07/18/05

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Secure Web Access Solution

CryptoNET: Security Management Protocols

Research Information Security Guideline

Certification Report

etoken Single Sign-On 3.0

IBM Tivoli Access Manager for Enterprise Single Sign-On

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

How Drive Encryption Works

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

22 nd NISS Conference

The Benefits of an Industry Standard Platform for Enterprise Sign-On

etoken TMS (Token Management System) Frequently Asked Questions

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

SecureAge SecureDs Data Breach Prevention Solution

ADVANCED TWO-FACTOR AUTHENTICATION VIA YOUR MOBILE PHONE

Deploying iphone and ipad Security Overview

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Client side. DESlock + Data Encryption

FEITIAN PKI Authentication Token. epass2003 with FIPS Cer tification

SAP Single Sign-On 2.0 Overview Presentation

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices

The Convergence of IT Security and Physical Access Control

FileCloud Security FAQ

TrustKey Tool User Manual

Innovative Secure Boot System (SBS) with a smartcard.

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

nexus Hybrid Access Gateway

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Secure USB Flash Drive. Biometric & Professional Drives

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

CoSign by ARX for PIV Cards

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

FIPS Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)

IT Networking and Security

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website:

DRAFT Standard Statement Encryption

RSA SecurID Software Token 1.0 for Android Administrator s Guide

iphone in Business Security Overview

How To Secure An Rsa Authentication Agent

API-Security Gateway Dirk Krafzig

VMware Virtual Desktop Manager User Authentication Guide

Ciphire Mail. Abstract

Active Directory Rights Management Services integration (AD RMS)

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Information Technology Solutions. Managed IT Services

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev

Transcription:

Managed Portable Security Devices www.mxisecurity.com

MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of even the most demanding customers. MXI Security solutions combine the power of strong user authentication, digital identity and data encryption to protect access to sensitive information and systems. Easy to manage and transparent to the end user, MXI Security solutions enable organizations to satisfy multiple security needs with a single device, facilitating greater mobility without compromising security.

Table of Contents The MXI Security Family 2 Managed Portable Security Devices 3 Stealth Mini 4 Stealth MXP Passport 5 Stealth MXP 6 Outbacker MXP 7 ACCESS Enterprise Device Lifecycle Management 8 Product Specifications 10 Dimensions, Weights and Environmental Specifications 12 Contact Us 13 1

The MXI Security Family of Portable Security Devices includes Stealth Mini, Stealth MXP Passport, Stealth MXP and Outbacker MXP. Now you can securely store hundreds of gigabytes of confidential information with strong authentication. Not only do MXI Security s devices provide true zero-footprint portability in any environment that supports USB mass storage, but go even further by offering transparent, hardware-based, AES 256-bit encryption. Better yet, MXI Security s MXP devices also offer advanced digital identity features. Secure portability of digital certificates, encryption keys, RSA SecurID soft tokens, and static application credentials as well as SAML for WS-Trust claims-based identity transactions mean that MXP devices are significantly more versatile and secure than standard USB devices. ACCESS Identity, the identity management software suite, allows mission-critical enterprise systems such as single sign-on, remote access, full disk encryption, PKI, and others to be fully secured while allowing for total portability. In control at last. MXI Security s ACCESS Enterprise device management solution provides unmatched control over large deployments of portable security devices. Provisioning is streamlined, security policies are customizable, deploying and managing MXI Security devices across a wide range of network and security environments are made simple. From the Stealth Mini to the Outbacker MXP, there is a solution for each of your portable security needs, all manageable with ACCESS Enterprise. 2

Managed Portable Security Devices Password Authentication Biometric Authentication AES 256-bit Hardware Encryption Digital Identity ACCESS Enterprise Device Management Solution Stealth Mini l l l Stealth MXP Passport l l l l Stealth MXP l l l l l Outbacker MXP l l l l l ACCESS Enterprise Device Management Solution l l l l l 3

Stealth Mini Stealth Mini is ideally suited for organizations looking for highly secure storage solutions that are truly portable and easy to manage. Featuring built in MXI Security hardware-based AES 256-bit encryption and strong password authentication, all data stored on the Stealth Mini is inaccessible without permission. In process of confirming FIPS validation. When it comes to security in a flash, the Stealth Mini TM has got you covered. 4

Stealth MXP Passport Stealth MXP Passport is ideally suited for organizations that prefer a password-based secure encrypted USB flash drive to satisfy the need for secure portable storage, identity, and user authentication. Available in a FIPS 140-2 Level 2 validated version. For superior user authentication and data protection, think Stealth MXP Passport. 5

Stealth MXP Stealth MXP is ideally suited for organizations that require up to 3-factor authentication (biometric, password, or both) to satisfy their needs for secure portable storage, identity and user authentication. Available in a FIPS 140-2 Level 2 validated version. For unsurpassed user authentication and data protection, think Stealth MXP. 6

Outbacker MXP Outbacker MXP is ideally suited for organizations that need high capacities for portable data or portable desktop and OS environments with strong user authentication (biometric, password or both). In process of confirming FIPS validation. The desktop that fits in your pocket. 7

ACCESS Enterprise Device Lifecycle Management Solution ACCESS Enterprise is a full-featured device lifecycle management solution that allows organizations to provision, configure, and support portable security devices. Streamlined workflows reduce overhead for administrators and provide an intuitive and productive experience for end users. The Ultimate in Provisioning l Administrators can tailor security policies and device behavior to different end user needs. l Advanced user credentials such as digital certificates and RSA SecurID soft tokens can be automatically requested from their issuing servers and placed on the device in a single step. l A simple user interface featuring intuitive wizards facilitates self-serve deployments. 8

ACCESS Enterprise Device Lifecycle Management Solution The Ultimate in Manageability l Separable administrative roles provide the granularity required for proper delegation of management duties. l Seamless integration with an organization s corporate directory avoids any duplication of identity stores. l A complete history of administrative activities, security policies, and respective state of each individual device are logged to satisfy audit and compliance requirements. l Queries based on username, device serial number, or certain issuance parameters enhance the administrator s ability to get information about the devices in the system. l Remote administrative device recovery keeps users productive wherever they are. l Optional data destruction after multiple failed authentication attempts keeps sensitive data secure. The Ultimate in Portability l Zero-footprint approach means no software needs to be installed on user workstations. l No administrative rights are necessary on the local system. 9

Product Specifications Stealth Mini Stealth MXP Passport Stealth MXP Outbacker MXP General Zero software footprint l l l l Hardware-based AES 256-bit encryption l l l l MXP Technology l l l Manageable with ACCESS Enterprise l l l l One year warranty l l l l Authentication Strong password l l l l Biometric with hardware fingerprint matching l l Two-factor (biometric + password) l l Three-factor for digital identities (biometric + password + device) l l Usage Policies Password complexity rules l l l l Password lifetime rules l l l l Failed authentication threshold with optional data destruction l l l l Biometric security level l l Cryptographic Services Configurable partition sizes l l l Number of users on a single device 1 5 5 5 Dedicated key containers for symmetric keys, asymmetric keys, and HOTP secret keys l l l OATH one time password generation l l l 256-bit AES encryption/decryption (FIPS Pub 197) l l l SHA-1 and SHA-256 (FIPS Pub 180-1/180-2) l l l Keyed HMAC (FIPS Pub 198) l l l RSA key generation (X9.31 and PKCS #1) l l l 1024/2048/3072 bit RSA Key sizes l l l RSA signature and verification (X9.31 and PKCS #1) l l l RSA encryption/decryption (PKCS #1) l l l Random number generation l l l SAML Token generation for WS-Trust l l l 10

Stealth Mini Stealth MXP Passport Stealth MXP Outbacker MXP Storage Flash memory mass storage l l l Hard-disk mass storage Operating Environments Standards and Certifications Physical and Electrical Encrypted private user partition l l l l Optional unencrypted public partition l l l Microsoft Windows 2000 l l l l Microsoft Windows XP l l l l Microsoft Windows Vista l l l l Macintosh OSX l l l FIPS 140-2 Level 2 certificate # 748 and # 777 l l l l USB 1.1 and 2.0 l l l l FCC l l l l CE l l l l Compact and portable l l l l Retractable USB connector l l Power, data activity, and authentication status LEDs l l l l Uses USB bus power l l l l External power supply included (if host power is insufficient) l l l In process of confirming FIPS validation 11

Dimensions, Weights and Environmental Specifications Stealth Mini l Dimensions (H x W x L): 8.9 x 18.3 x 72.3mm (.35 x.72 x 2.85 ) l Weight: Approximately 9g (.20 lbs) l Operating temperature ~ 0 to 50 C l Non operating temperature ~ -20 to 70 C l Relative humidity ~ 5 to 95% non-condensing Stealth MXP and Stealth MXP Passport l Dimensions when open (H x W x L): 12 x 25.9 x 102 mm (0.475 x 1.02 x 4 ) l Dimensions when closed (H x W x L): 12 x 25.9 x 90.2 mm (0.475 x 1.02 x 3.52 ) l Weight: Approximately 40g (.08 lbs) l Operating temperature ~ 0 to 60 C l Non operating temperature ~ -20 to 70 C l Relative humidity ~ 5 to 95% non-condensing Outbacker MXP l Dimensions (H x W x L): 26.8 x 86.6x 124.6mm (1.06 x 3.41 x 4.91 ) l Weight: Approximately 280g (.62 lbs) l Operating temperature ~ 0 to 50 C l Non operating temperature ~ -20 to 70 C l Relative humidity ~ 5 to 95% non-condensing 12

Contact Us DuraTech USA, Inc. 6765 Westminster Ave #314 Westminster, CA 92683 Call :(714) 898-2171 Fax: 866-704-9132 www.duratechusa.com sales@duratechusa.com 2008 Memory Experts International. Specifications are subject to change without notice. Stealth MXP, Stealth Mini, Outbacker MXP, ACCESS Identity and ACCESS Enterprise are trademarks of Memory Experts International. All other names mentioned herein are trademarks or registered trademarks of their respective owners. TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments. January 1 st, 2008

Managed Portable Security Devices www.mxisecurity.com