MXI Security Stealth Key M700 Bio

Powered by SC Magazine
 

More than just a USB flash drive with a fingerprint reader.

The Stealth Key M700 Bio from MXI Security is more than just a USB flash drive with a fingerprint reader. 
This drive allows fully manageable multifactor authentication, including any combination of fingerprint, PIN and smart card. This provides ultimate security over files without the need of third-party encryption products.
Installation is simple with the software already running on the device. All we had to do was plug it in, enrol and we were ready to go. The ACCESS management interface built into the device allows for simple administration, including user management and access to logs.
However, this interface can be taken to the next level with the ACCESS Enterprise AE Manager. This takes all the functionality of the built-in ACCESS Manager and integrates it into the enterprise environment. With this management interface, administrators can provision and manage many devices throughout the enterprise - leveraging Active Directory and controls. Pair that with auditing and reporting and you have an advanced USB flash drive.
Documentation included a PDF quick-start, standard user and enterprise administrator guides. We found all the documents to be well-organiwed with easy-to-follow, step-by-step instructions.
MXI offers one year of hardware and technical support with the purchase of the solution. After the first year, customers can buy support as part of a yearly maintenance plan. Support runs eight-hours-a-day/five-days-a-week phone and email.
At a price starting at $US125 ($A123) for the 1 GB model, we find this tool to be an excellent value for the money. The Stealth Key M700 Bio offers a lot of manageable functionality with biometric security at a reasonable price.

Copyright © SC Magazine, US edition


MXI Security Stealth Key M700 Bio
 
Overall Rating
Verdict:
An excellent option for a secure USB key.
Product Info
Supplier:
 
Price when reviewed:
125
 
 
 
Top Stories
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
Amazon forced to reboot EC2 to patch Xen bug
Rolling restarts over next week.
 
Vodafone reveals plans to store users' online activity
Says retrieval under Govt proposal will impose massive cost.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1355

Vote