Trusted Access for Banking leverages the capabilities of IronKey’s computing environment platform and allows the banks to provide identity protection, authentication and fraud protection at the endpoint for corporate banking customers.

Corporate banking customers can plug it into a computer and enter their device password. Once the IronKey device is unlocked, its virtualized operating system automatically runs, and a secure web browser launches and goes directly to the bank’s website. It incorporates a locked down web browser that is protected against malware from the host PC, and may also be configured to allow users to visit only specific websites.

IronKey prevents the man-in-the-browser attacks and enables a virtualized environment protected from malware-infected host computers. The IronKey system conducts an anti-malware scan of the host computer before enabling the secure environment, and also provides the option to boot a host operating system from the IronKey device to protect against threats on infected host computers.

The IronKey solution is available with an integrated RSA SecurID software token that generates one-time passwords, and as a result, provides a single device that serves as both a secure banking platform and a mechanism for two-factor authentication. IronKey Trusted Access for Banking has a SaaS or software centralized management capabilities for policy control and reporting.

David Jevans, CEO of IronKey, said: “The IronKey solution isolates access to the online corporate banking system from the host PC, creating a trusted virtual computing environment and protecting commercial banking customers from current and next-generation malware and fraud schemes.”

Tom Corn, vice president of product marketing at RSA, the security division of EMC, said: “Corporate resources are at very high risk as fraudsters combine increasingly sophisticated malware and manipulative attack vectors with an evolving ability to monetize stolen information.

“By teaming up with IronKey, we can provide these organizations with increased layers of protection that not only reduce complexity but also increase confidence that identities, information and infrastructure are better protected.”