openPR Logo
Press release

CJIS Security Policies Satisfied With GoldKey Flash Tokens

01-24-2013 06:22 PM CET | IT, New Media & Software

Press release from: Goldkey Security Corporation

Users of the FBI Criminal Justice Information System CJIS are facing stiff new regulations for Advanced Authentication and encryption of sensitive data. According to the new Security Policy, all law enforcement organizations will be required to implement enhanced security technology before October of 2013.

Under the new requirements, FBI data accessed by law enforcement officers must now be encrypted whenever it is accessed or carried outside of secure facilities. This new requirement has created a serious challenge for police departments needing to comply with the regulations. Total disk encryption schemes are difficult to deploy, time consuming, and vulnerable to cold boot attacks, whereby encryption keys can be stolen by cold booting a machine already running an operating system.

Furthermore, sensitive data stored on a laptop mounted in a patrol car is difficult to relocate to the police station at the end of a shift. Also, since officers may use a different vehicle on different days, it is hard to keep track of files needed for a particular investigation.

The Marysville, WA Police Department, long known for innovation, was the first in the nation to deploy the new GoldKey flash tokens as the solution to the CJIS requirements. U.S. manufactured GoldKey security tokens provide a secure method of Advanced Authentication as required by the FBI policy. By using the new GoldKey flash tokens, they are able to automatically store encrypted CJIS files inside the token.

This solution has significant advantages as compared to other options. Each officer is issued a personal GoldKey, which can be used to unlock laptop computers, to access the CJIS System, and to store encrypted files. When the GoldKey is removed from the patrol car, the encrypted files are on the token and can be easily carried by the officer into the station. GoldKey is compatible with the Active Directory systems already deployed by most law enforcement organizations.

According to Joseph Finley, IT Admin. for the City of Marysville, the switch over to GoldKey was a smooth process. “From day one, the guys at GoldKey have provided outstanding support. From start to finish it has been excellent. Deployment was very easy. Once it was setup in Active Directory we just enabled interactive login and now the officers are required to use GoldKey. We have been using it for six months with no issues.”
The new GoldKey Tokens with built-in Flash have opened a whole new level of versatility for law enforcement applications. At the Florida Law Enforcement Conference, FBI CJIS Division ISO, George White, was on hand to answer questions about the CJIS encryption specifications. The CJIS Security Policies specifies a minimum 128-bit encryption key for data stored outside of physically secure boundaries. GoldKey with secure internal storage was said to meet the CJIS requirement.
GoldKey Security Corporation has partnered with the International Academy of Science to develop a special training and certification course covering the use of security tokens in law enforcement. The course covers the creation of a hardware-based key management system, the interface with Active Directory, and deployment of encrypted storage both in the key, on a hard drive and in the cloud.
For more information visit http://www.goldkey.com/CJIS
###
About GoldKey Security Corporation

GoldKey Security Corporation is the leading provider of enhanced two-factor authentication which protects sensitive data and resources for government, financial, and other organizations with its hardware and software tokens. Deployed by customers in over 40 countries, GoldKey security tokens offer shared access to secure cloud storage, state-of-the-art data encryption, PIV smart card capabilities, and two-factor authentication to online resources.

GoldKey Security Corporation is located in Independence, Missouri.

For More Information, Contact:
Naomi Billings, Public Relations
naomi_billings@goldkey.com

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release CJIS Security Policies Satisfied With GoldKey Flash Tokens here

News-ID: 249521 • Views:

More Releases from Goldkey Security Corporation

GoldKey Launches “2-Factor Now” Program for Enhanced Security with Microsoft …
GoldKey Security Corporation has announced its “2-Factor Now” Program. It is specifically designed for organizations wanting to add two-factor authentication to Microsoft Active Directory. This program offers a cost effective way to utilize GoldKey allowing a quick and convenient login to Active Directory across multiple computers, while at the same time creating a more robust security system. This all inclusive program provides the hardware, software, training and support needed to
GoldKey Announces Special Problems Security Team
GoldKey Announces Special Problems Security Team
Independence, MO – September 6, 2012 - GoldKey Security Corporation today announced the creation of a GoldKey Special Problems Team. The team was organized to assist enterprise customers with special security challenges. Many security problems facing today’s enterprise are mission-critical and complex. Often, the one-size-fits-all solutions provided by the market do not satisfy the specific requirements of an organization. In an effort to assist organizations in their special security needs, GoldKey
GoldKey Announces Soft-Token App for iPhone, iPad, & Android
New App from GoldKey Provides Two-Factor Authentication for iOS and Android Devices Independence, MO – May 29, 2012 – GoldKey Security Corporation announced today the availability of GoldKey Soft-Tokens for iOS and Android devices. GoldKey’s newly released Soft-Token app transforms a mobile device into a software authenticator that is used in conjunction with a PIN to achieve two-factor authentication. This provides a robust yet cost-effective method for ensuring that only authorized

All 4 Releases


More Releases for CJIS

Advanced Authentication in Public Sector Enterprises Market 2022 Status and Busi …
The Advanced Authentication in Public Sector Enterprises Market report is a compilation of first-hand information, qualitative and quantitative assessment by industry analysts, inputs from industry experts and industry participants across the value chain. The report provides in-depth analysis of parent market trends, macro-economic indicators and governing factors along with market attractiveness as per segments. The report also maps the qualitative impact of various market factors on market segments and geographies. The
GLOBAL ADVANCED AUTHENTICATION MARKET TOP KEY PLAYERS ARE AREORACLE CORPORATION, …
Global Advanced Authentication Market is the provider of solutions to the threats of information breaches and hacking of data due to inefficient data security systems. The loss of data due to stealing of information by hackers and leakages in the information systems of the companies has led to the rapid adoption of this technology across all the sectors. Also with the increasing number of people switching to online transactions, e-banking
Advanced Authentication Market Size, Share, Growth Rate 2017 - 2025 | Fujitsu, R …
Latest Research Study and Overview on "Advanced Authentication Market - Global Industry Analysis, Size, Share, Growth, Trends, and Forecast 2017 - 2025." Security threats in every industry have been growing continuously, with hackers constantly finding different ways to hack data, and viruses being created to hack private information from individual users and enterprises. Today, most users prefer to perform transactions online; hence, it becomes necessary for an organization to put together
Advanced Authentication Market: Verification Solutions Which Help In Secure Acce …
Security threats in every industry have been growing continuously, with hackers constantly finding different ways to hack data, and viruses being created to hack private information from individual users and enterprises. Today, most users prefer to perform transactions online; hence, it becomes necessary for an organization to put together verification solutions which help in secure access. Organizations need a reliable authentication system to confirm the truth of somebody (person) or
Advanced Authentication Market Recommendations to Companies for Strengthening th …
Security threats in every industry have been growing continuously, with hackers constantly finding different ways to hack data, and viruses being created to hack private information from individual users and enterprises. Today, most users prefer to perform transactions online; hence, it becomes necessary for an organization to put together verification solutions which help in secure access. Organizations need a reliable authentication system to confirm the truth of somebody (person) or
IMPROVING SECURITY FOR CRIMINAL JUSTICE AND MUNICIPALITIES
Sequris announces the addition of CJIS to our Critical Control Standards Sequris Group announces the addition of the Criminal Justice Information System (CJIS) Security Standards to our holistic Information Security Management Solution and Controls Dashboard. CJIS adds to an impressive list of Critical Control Standards already implemented and utilized by our clients that have chosen from a wide variety of IT Security Control standards such as 20 Critical Security