Application Security //

Database Security

3/4/2019
08:25 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Kingston to Highlight Encrypted USB Drives, Enterprise SSDs at RSA

Server Premier memory products also will be on display.

Fountain Valley, CA – March 4, 2019 – Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., a world leader in memory products and technology solutions, today announced it will showcase its line of encrypted USB drives, including the award-winning IronKey™ brand, as well as its enterprise SSDs and Server Premier memory products at RSA Conference 2019 (North Expo Booth #4615), one of the world’s leading information security conferences and expositions.

Kingston will show off the following at RSA Conference 2019:

Encrypted USB Drives
Kingston encrypted USB drives are designed to protect data outside the network firewall that requires high security, promote and maintain a productive and efficient mobile workforce, and serve as an additional element in complying with the strict EU GDPR (General Data Protection Regulation ) and other data privacy regulations. These drives are ideal for government and corporate use to help meet specific agency directives such as Data Encryption, TAA and FIPS certification, as well as other compliance regulations including HIPAA and SOX.

Since 2016, Kingston has been the proud owner of the entire USB technology and assets of IronKey, one of the most iconic brands in encrypted USB Flash drive history. Kingston’s IronKey products deliver FIPS 140-2 Level 3 certified solutions for customers who need the highest level of militarygrade encryption and security. With the IronKey and DataTraveler® brand, Kingston offers a comprehensive portfolio of products, further demonstrating the company’s commitment to be the global leader in trusted encrypted solutions for mobile data.

Enterprise Solid-State Drives (SSD)
Kingston enterprise SATA and U.2 NVMe SSDs offer reliability and power-loss protection features to keep mission-critical environments up and running 24/7. Applications include:

• Server Virtualization – Kingston SSDs are the ideal storage accelerator solution for virtualized workloads and contribute to a fundamental goal of virtualization by doing more with less.

• Cloud Computing – Fast-retrieving capabilities of Kingston SSDs enable Cloud services to operate at peak efficiency for each type of data being processed.

• IT Applications – Kingston SATA 3.0 Enterprise SSDs may be used as direct-attached storage replacements for traditional hard-disk drives in a server or reside in external arrays to speed up storage-bound applications.

Kingston Server Premier Memory
Server Premier modules are manufactured using a locked Bill of Materials (BOM), which is ideal for those who use or build white-box systems and require a consistent brand and revision of DRAM. Server Premier, like all Kingston memory, undergo rigorous testing and are qualified on leading server motherboard / system manufacturers.

“A firewall is essential in protecting organizations against data security threats from known, unknown, and non-trusted networks,” said Richard Kanadjian, encrypted USB manager, Kingston. “Encrypted protection, both inside and outside the firewall is key to a successful data-security plan. Inside the firewall, Kingston SSDs with hardware-based encryption are ideal for protecting company and personal data. While outside the firewall, Kingston encrypted USB drives are powerful tools in closing security gaps and help ensure security and regulation compliance. We are proud to present our suite of solutions to attendees of RSA Conference 2019.”

For more information, visit kingston.com. Kingston can be found on: YouTube:http://www.youtube.com/kingstontechmemory

Facebook: http://www.facebook.com/kingstontechnology

Twitter: https://twitter.com/KingstonTech

Instagram: https://instagram.com/kingstontechnology/

LinkedIn: http://www.linkedin.com/company/kingston

About Kingston Digital, Inc. Kingston Digital, Inc. (“KDI”) is the Flash memory affiliate of Kingston Technology Company, Inc., a world leader in memory products and technology solutions. Established in 2008, KDI is headquartered in Fountain Valley, California, USA.

For more information, please call 877-546-4786 or visit www.kingston.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.