AirTight Networks offers enterprises the next generation of intelligent edge, secure, and flexible WLAN solutions.Intelligent Edge Wi-Fi
AirTight's purpose-built, plug-and-play Wi-Fi AP/Sensor devices and its controller-less architecture enable a fully functional and fault-tolerant WLAN operation at the edge, and eliminate the cost, complexity and inefficiencies of legacy thin APs managed with controllers.Top-ranked Security
AirTight offers industry's top-ranked and truly automated wireless intrusion prevention system (WIPS), powered with 25+ US and international patents, and certified for FIPS140-2, Common Criteria EAL2+, and DISA UC APL. AirTight WIPS detects all types of wireless threats, eliminates false alarms, and allows its customers to reliably turn on wireless intrusion prevention that can precisely block any Wi-Fi misuse without interfering with legitimate communication. With its WIPS technology built-in, AirTight offers industry's only WLAN solution that is armed to defend enterprise networks from wireless threats 24/7.
IronKey is the brand name for the family of secure portable data storage and mobile workspace solutions offered by Imation Corp.,a global scalable storage and data security company.
Focused on data storage and security
Safeguard your data with highest security levels available
Carry files with complete confidence
Great user experience
Meet and exceed compliance regulations
Easy to deploy and use.
Organized in two strategic business units:
Consumer Storage and Accessories (CSA)
Tiered Storage and Security Solutions (TSS)
IRONKEY FEATURES OVERVIEW
AES256Bit Hardware Encryption
FIPS-140-2 Level 3 Certification
Ruggedised and Water Resistant
Virus and Malware Protection
IRONKEY WORKSPACE PRODUCT SELECTION
Turn most any PC into an IT provisioned, IT managed, IT secure workstation.
Cost approximately 1/10 to 1/5 that of an IT managed, provisioned and secured laptop.
Microsoft Certified / USB 3.0/ Ruggedised / Window to Hardware Encryption.
Centrally administer device access & usage policies
Enforce device-specific polices
Easily manage thousands of storage or workspace devices via an intuitive, secure online interface
Securely recover access to user devices
Prepare for business continuity by mass provisioning
As many as 70% of websites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc.Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities using the compromised site.
Web application attacks, launched on port 80/443, go straight through the firewall, past the operating system and network level security, and right into the heart of your application and corporate data.Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.Find out if your website is secure before hackers download sensitive data, launch criminal activity from your website and endanger your business.Acunetix Web Vulnerability Scanner (WVS) crawls your website, automatically analyzes your web applications and finds perilous SQL injection, Cross-Site Scripting and other vulnerabilities that expose your online business. Concise report sidentify where web applications need to be fixed, thus enabling you to protect your business from impending hacker attacks!