IRONKEY is very convenient way to keep your research related data protected and handy.
You can request an IRONKEY by completing our online form
Please NOTE that it is mandatory to return the IRONKEY back to DOM IT at the end of your requirement or before last day of your association with UAB.
Here are few prominent characteristics of IRONKEY as following:
HARDWARE ENCRYPTION ENSURES DATA STAYS SAFE, ALWAYS
The IronKey™ from IMATION Cryptochip protects your critical data by keeping encryption key management on the device, where it’s safe and protected. Only after the user logs in with an authorized password will the drive unlock data and applications.
SAFEGUARD YOUR INTELLECTUAL PROPERTY WITH PROTECTION THAT NEVER SLEEPS
Self-defending IronKey encrypted flash drives provide active protections against the spread of worms, crimeware and other malicious code. You can even set the device to self-destruct after a configurable number of break-in attempts, and a ruggedized, waterproof metal chassis resists physical break-ins and is tamper evident.
EASILY MANAGE ACCESS AND USAGE
Centrally administer access and usage policies across thousands of IronKey Enterprise flash drives with the cloud-based or on-premise IronKey™ Enterprise Management Serviceor Server. Securely recover access to user devices, force a device to be in read-only mode, remotely force password changes, and re-commission devices that are no longer in use.
REMOTELY DISABLE LOST OR STOLEN DEVICES
Administrators can lock out the user completely once the device connects and instruct the IronKey Enterprise drive to initiate the self-destruct sequence.
STREAMLINE USABILITY WITH LOCALIZED CONTROL PANEL
Reduce help desk calls with self-service password reset and an intuitive user control panel available in eight languages.
CONSOLIDATE DEVICES WITH PUBLIC-KEY ENCRYPTION SUPPORT
Take advantage of the device’s strong authentication capabilities to consolidate the devices your users need to carry. For Windows computers, IronKey Enterprise devices support one-time password technology such as RSA SecureID®, VeriSign® Identity Protection (VIP) and Cryptocard, as well as X.509 certificates and passwords.