Becrypt and IronKey integrate Trusted Client with secure USB drives

Powered by SC Magazine
 

Becrypt and IronKey have announced a partnership to integrate the Trusted Client solution with secure portable devices.

Becrypt and IronKey have announced a partnership to integrate the Trusted Client solution with secure portable devices.

The combined solution offers a bootable trusted computing platform that provides mobile workers with data protection and secure remote access to corporate networks from managed and unmanaged PCs.

Becrypt's Trusted Client is a secure mobility solution that uses its own hardened and encrypted operating system. If a user inserts the IronKey with Trusted Client into their home PC, it re-boots, authenticates and can access the corporate network, applications and data safely.

Bernard Parsons, CEO of Becrypt, said: “We chose IronKey due to its platform offering security and optimisation for virtualised environments. This partnership provides an extra level of security and peace of mind for CIOs who face increasing pressures of employees requiring extra mobility whilst having continual access to networks. Now remote workers can access networks easily and securely and they can safely store data, by simply carrying the IronKey with them.”

Steve Ryan, SVP of business development at IronKey, said: “IronKey is all about secure portable computing with an open framework for partners to integrate synergistic applications. By partnering with Becrypt, the combined solution brings to the global marketplace a secure centrally managed solution for mobile and teleworkers.”


See original article on scmagazineus.com

Copyright © SC Magazine, US edition


 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 319

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 122

Vote