Kingston to Highlight Encrypted USB Drives, Enterprise SSDs at RSAKingston to Highlight Encrypted USB Drives, Enterprise SSDs at RSA
Server Premier memory products also will be on display.
March 5, 2019
Fountain Valley, CA – March 4, 2019 – Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., a world leader in memory products and technology solutions, today announced it will showcase its line of encrypted USB drives, including the award-winning IronKey™ brand, as well as its enterprise SSDs and Server Premier memory products at RSA Conference 2019 (North Expo Booth #4615), one of the world’s leading information security conferences and expositions.
Kingston will show off the following at RSA Conference 2019:
Encrypted USB Drives
Kingston encrypted USB drives are designed to protect data outside the network firewall that requires high security, promote and maintain a productive and efficient mobile workforce, and serve as an additional element in complying with the strict EU GDPR (General Data Protection Regulation ) and other data privacy regulations. These drives are ideal for government and corporate use to help meet specific agency directives such as Data Encryption, TAA and FIPS certification, as well as other compliance regulations including HIPAA and SOX.
Since 2016, Kingston has been the proud owner of the entire USB technology and assets of IronKey, one of the most iconic brands in encrypted USB Flash drive history. Kingston’s IronKey products deliver FIPS 140-2 Level 3 certified solutions for customers who need the highest level of militarygrade encryption and security. With the IronKey and DataTraveler® brand, Kingston offers a comprehensive portfolio of products, further demonstrating the company’s commitment to be the global leader in trusted encrypted solutions for mobile data.
Enterprise Solid-State Drives (SSD)
Kingston enterprise SATA and U.2 NVMe SSDs offer reliability and power-loss protection features to keep mission-critical environments up and running 24/7. Applications include:
• Server Virtualization – Kingston SSDs are the ideal storage accelerator solution for virtualized workloads and contribute to a fundamental goal of virtualization by doing more with less.
• Cloud Computing – Fast-retrieving capabilities of Kingston SSDs enable Cloud services to operate at peak efficiency for each type of data being processed.
• IT Applications – Kingston SATA 3.0 Enterprise SSDs may be used as direct-attached storage replacements for traditional hard-disk drives in a server or reside in external arrays to speed up storage-bound applications.
Kingston Server Premier Memory
Server Premier modules are manufactured using a locked Bill of Materials (BOM), which is ideal for those who use or build white-box systems and require a consistent brand and revision of DRAM. Server Premier, like all Kingston memory, undergo rigorous testing and are qualified on leading server motherboard / system manufacturers.
“A firewall is essential in protecting organizations against data security threats from known, unknown, and non-trusted networks,” said Richard Kanadjian, encrypted USB manager, Kingston. “Encrypted protection, both inside and outside the firewall is key to a successful data-security plan. Inside the firewall, Kingston SSDs with hardware-based encryption are ideal for protecting company and personal data. While outside the firewall, Kingston encrypted USB drives are powerful tools in closing security gaps and help ensure security and regulation compliance. We are proud to present our suite of solutions to attendees of RSA Conference 2019.”
For more information, visit kingston.com. Kingston can be found on: YouTube:http://www.youtube.com/kingstontechmemory
About Kingston Digital, Inc. Kingston Digital, Inc. (“KDI”) is the Flash memory affiliate of Kingston Technology Company, Inc., a world leader in memory products and technology solutions. Established in 2008, KDI is headquartered in Fountain Valley, California, USA.
For more information, please call 877-546-4786 or visit www.kingston.com.
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment