Check Point's Abra is an enterprise-grade USB flash drive that comes preinstalled with a suite of security applications. The unique feature of Abra is: pack your office in it and put it in your pocket, with a secure virtual workspace that changes the way mobile users work. Abra instantly turns any PC into your own corporate desktop, allowing users to access files and applications anywhere, anytime – without the weight of bulky laptops or work files. Its plug-and-play USB form factor allows users to easily launch a virtual workspace that keeps mobile data secure by segregating the virtual workspace from the host PC. And, built-in encryption protects data while working or travelling. Users can work offline from the encrypted USB drive or online using Abra’s integrated VPN client.
Based on Check Point’s Endpoint Security, Data Security and Remote Access VPN technologies, Abra provides encrypted USB stick, Access work files and applications anywhere, anytime with integrated VPN connectivity, Secure virtual workspace that segregates data from the host PC, while strictly controlling applications and file transfers, built-in software and hardware encryption protects data and information while working or traveling and Ideal for mobile workers, contractors, partners and disaster recovery plans.
Abra is a leading-edge security device, combining hardware security, endpoint security software and convenient and scalable manageability.
Since Abra writes nothing to the host, no session traces or data are left behind. Even if Abra device is lost or stolen, stored data on the device will not be exposed to attackers because the USB stick is always protected with “always-on” AES 256-bit hardware encryption. When an Abra USB stick is inserted into the host PC, the host memory is automatically scanned to ensure that an antivirus solution from a known good vendor is active on the endpoint.
Abra includes a built-in, easy-to-use VPN client, enabling most applications to connect transparently into the corporate network. Proxy servers between the client and the gateway are automatically detected, authenticated, and replaced when no longer valid. Increases security by routing all traffic, such as traffic to and from the Internet, through the gateway, where the traffic can be inspected for malicious content before being passed to the client.
Support for strong authentication schemes such as:
• User’s name and password (default)
• Certificate – CAPI
• Certificate – P12
• SecurID – Keyfob
• SecurID – PinPad
• SoftID
• Challenge Response