Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/29/2010
12:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BlockMaster Security Teams With Kingston Digital In Secure USBs

Partnership to expand the range of secure managed devices

Fountain Valley, CA -- June 22, 2010 -- Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced that it will partner with security company BlockMaster and provide greater availability of centrally managed USB drives, which makes it easier to protect information on-the-move. The partnership further strengthens both companies positions in the secure USB Flash drive market.

Kingston has been looking at partnering with a firm that specializes in USB management software as our customers have expressed interest in secure USB management solutions for some time, said John Terpening, business manager, secure USB products, Kingston'. After looking into several companies in that market, Kingston concluded that BlockMaster would be an optimal choice. We are confident that the partnership will facilitate the sharing and development of the necessary technology to provide USB products with advanced secure management to our corporate customers.

BlockMaster' is well known for its USB security solutions, including the centralized USB management software, SafeConsole', which offers organizations the ability to remotely manage USB drives by resetting passwords, configuring password policy and activating audit for compliance procedures. With this partnership, Kingston will be offering its customers a centrally manageable version of its DataTraveler Vault Privacy Edition utilizing BlockMasters technology to provide complete control over USB drives.

BlockMaster has been considering various strategies to extend the reach for our SafeConsole product in all markets and concluded, like Kingston, that partnering would be an effective approach, said Daniel stner, CEO, BlockMaster. Kingston was on top of our list with their strong global presence. We are confident that the joint offering will bring great value and impact to the marketplace as it will make managed secure USB drives available to a greater number of organizations. It will also usher in a new level of awareness of USB security, which is critical as workforces become more mobile and transport more corporate information outside the protection of the corporate network.

Future plans include Kingston rolling out a version of its DataTraveler Vault Privacy Edition that requires management by BlockMasters SafeConsole server software to activate the drive. This product will be able to address the strictest security requirements of the market, ensuring that the drive will not work unless managed. The launch of this product is scheduled for Q3, 2010.

The partnership does not affect current available BlockMaster product offerings. As the partnership develops, BlockMaster will remain focused on the development and distribution of their SafeStick' technology and the management platform SafeConsole; and Kingston will continue to focus on their core competency in this area, the manufacturing and distribution of secure USB drives.

For more information visit www.blockmastersecurity.com or www.kingston.com .

About BlockMaster BlockMaster provides complete control of portable data. Easy to deploy, its unique SafeConsole' allows administrators to track, manage and enforce acceptable use policy for every single secure USB drive, anywhere in the world. SafeStick' enabled devices encrypts and fully password protects all stored data. The solution is available world-wide and trusted to serve the versatile security needs of enterprise and government customers. For more information please visit: www.blockmastersecurity.com

About Kingston Digital, Inc. Kingston Digital, Inc. (KDI) is the Flash memory affiliate of Kingston Technology Company, Inc., the worlds largest independent manufacturer of memory products. Established in 2008, KDI is headquartered in Fountain Valley, California, USA. For more information, please visit www.kingston.com or call 800-337-8410.

Editors Note: For additional information, evaluation units or executive interviews, please contact David Leong, Kingston Digital, Inc. 17600 Newhope Street, Fountain Valley, CA USA 92708, 714-438-1817 (Voice). Press images can be found in Kingstons press room at kingston.com/press/default.asp

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16863
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
CVE-2019-18949
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
CVE-2011-1930
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
CVE-2011-1145
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
CVE-2011-1488
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...