www.secure-it.com.my

MXI Products
MXI Stealth Zone
Wednesday, 26 January 2011 08:43
Stealth Zone

 

Many MXI devices can be enabled with MXI Stealth Zone, an innovative platform for deployment of a Secure USB Desktop (SUD) environment on a high-security device.  With MXI Stealth Zone any computer ― including shared systems, home computers or other untrusted computers ― can be instantly transformed into a standard IT-managed system while maintaining both performance and security.

Users simply plug in their MXI Stealth Key M500, M550 or M700 Bio into any computer, then reboot and authenticate their identity. They then have access to their full operating system and desktop applications. When they leave, their desktop leaves with them, and no trace of their presence remains behind on the host.

Deployments are fully manageable with MXI’s ACCESS Enterprise device management system, allowing control of device security policies and usage.  The MXI Stealth Zone appliance, based on MXI’s own proven device manufacturing systems, allows quick, secure and reliable creation of hundreds or thousands of MXI Stealth Zone devices in a short period of time. Administrators and systems integrators have full freedom to configure user environments without having to involve MXI, which removes logistical and security barriers.

Leveraging MXI’s industry-leading strong authentication technologies and hardware-based encryption, MXI Stealth Zone guarantees protection of applications, operating system and data. The on-board MXI Stealth Processor (FIPS 140-2 Level 3 validated) brings advanced features to the MXI Stealth Zone platform:

  • Encrypted Storage - Cryptographically secure lockdown of content shields the desktop from even the worst environments, preventing tampering, intrusion and piracy.
  • Secure Preboot Authentication - Access to the hardware-encrypted desktop requires up to 3-factor authentication, including password, optional biometric, and CAC/PIV in Q1 2011.
  • Host Isolation - Insert your MXI USB drive into the host computer, then reboot and authenticate. The computing environment is now fully isolated from both malware and data leakage.
  • Optional Secure Portable Storage - A separate, secure partition allows exchange of data between the MXI Stealth Zone environment and other computing environments.
  • Optional PKI Token Operation - Secure key and certificate stores, hardware key generation, digital signing, and a range of other user PKI operations are possible within the USB desktop.
  • Traceless Departure - When the user leaves, they take their environment with them and no trace of their presence remains on the host.
Capacities available 8, 16, 32 & 64 GB

MXI Stealth Zone comes in four editions

  • Microsoft Windows® Embedded Standard Edition - Allows direct boot of a full Windows desktop, eliminating any virtualization layer and delivering the best user experience of any portable desktop on the market. Offers a special Adapted Mode, giving users access to the full power of machines they use frequently by dynamically loading the right device drivers. This edition is currently available to government clients worldwide.
  • Virtual Machine Edition (Q1 2011) - Allows booting of a virtual machine environment, giving users the flexibility to run a wide range of operating systems.
  • Platform Edition (Q4 2010) - Provides a Software Development Kit (SDK) and other materials permitting MXI partners to develop their own MXI Stealth Zone solution, with industry-leading bootability, environmental isolation, device provisioning and management.
  • VPN Edition (Q2 2011) - Offers a lightweight, bootable remote access client that is able to leverage the digital identity features of MXI devices.

MXI Stealth Zone offers many benefits, including:

  • Teleworking - Users can work remotely, whether it’s from home, on the road, or the extended offsite of in-theatre soldiers.
  • Disaster Recovery - When normal systems are inaccessible or potentially destroyed as the result of terrorism, weather conditions or health quarantines, preconfigured portable environments can be distributed as easily as a USB device.
  • Temporary Personnel - Temporary workers, such as contractors, can be given an environment to use on their own hardware.
  • Separation of Desktop Environments - When regulatory or security issues demand that users separate work environments for different projects or tasks, MXI Stealth Zone enables deploying of these environments using a single computer.
  • Secure Transactions and Online Banking - Users can combine a portable web browser with a full-featured PKI token for anywhere, anytime certificate-based authentication.

 

Last Updated ( Wednesday, 26 January 2011 09:20 )
 


Page 8 of 13

Did You Know

arrow Identity theft is the top consumer complaint in the USA according to the Federal Trade Commission.

arrow US consumers reported fraud loss totalling more than $1.1 billion in 2006.

arrow Credit card fraud (25%) was the most common form of reported identity theft in the US in 2006.

arrow More than 100 000 people are affected by identity theft each year in the UK

arrow According to Privacy Rights Clearinghouse, more than 350 data loss incidents involving more than 140 million records have occurred since February 2005

arrow Organisations are obliged by law to take take adequate steps to ensure the proper disposal of data


mxi-3devices0

Visitors

mod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_countermod_vvisit_counter
Now: 2024-04-29 13:05

Who's Online

We have 371 guests online
You are here  :