Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/29/2010
12:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BlockMaster Security Teams With Kingston Digital In Secure USBs

Partnership to expand the range of secure managed devices

Fountain Valley, CA -- June 22, 2010 -- Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced that it will partner with security company BlockMaster and provide greater availability of centrally managed USB drives, which makes it easier to protect information on-the-move. The partnership further strengthens both companies positions in the secure USB Flash drive market.

Kingston has been looking at partnering with a firm that specializes in USB management software as our customers have expressed interest in secure USB management solutions for some time, said John Terpening, business manager, secure USB products, Kingston'. After looking into several companies in that market, Kingston concluded that BlockMaster would be an optimal choice. We are confident that the partnership will facilitate the sharing and development of the necessary technology to provide USB products with advanced secure management to our corporate customers.

BlockMaster' is well known for its USB security solutions, including the centralized USB management software, SafeConsole', which offers organizations the ability to remotely manage USB drives by resetting passwords, configuring password policy and activating audit for compliance procedures. With this partnership, Kingston will be offering its customers a centrally manageable version of its DataTraveler Vault Privacy Edition utilizing BlockMasters technology to provide complete control over USB drives.

BlockMaster has been considering various strategies to extend the reach for our SafeConsole product in all markets and concluded, like Kingston, that partnering would be an effective approach, said Daniel stner, CEO, BlockMaster. Kingston was on top of our list with their strong global presence. We are confident that the joint offering will bring great value and impact to the marketplace as it will make managed secure USB drives available to a greater number of organizations. It will also usher in a new level of awareness of USB security, which is critical as workforces become more mobile and transport more corporate information outside the protection of the corporate network.

Future plans include Kingston rolling out a version of its DataTraveler Vault Privacy Edition that requires management by BlockMasters SafeConsole server software to activate the drive. This product will be able to address the strictest security requirements of the market, ensuring that the drive will not work unless managed. The launch of this product is scheduled for Q3, 2010.

The partnership does not affect current available BlockMaster product offerings. As the partnership develops, BlockMaster will remain focused on the development and distribution of their SafeStick' technology and the management platform SafeConsole; and Kingston will continue to focus on their core competency in this area, the manufacturing and distribution of secure USB drives.

For more information visit www.blockmastersecurity.com or www.kingston.com .

About BlockMaster BlockMaster provides complete control of portable data. Easy to deploy, its unique SafeConsole' allows administrators to track, manage and enforce acceptable use policy for every single secure USB drive, anywhere in the world. SafeStick' enabled devices encrypts and fully password protects all stored data. The solution is available world-wide and trusted to serve the versatile security needs of enterprise and government customers. For more information please visit: www.blockmastersecurity.com

About Kingston Digital, Inc. Kingston Digital, Inc. (KDI) is the Flash memory affiliate of Kingston Technology Company, Inc., the worlds largest independent manufacturer of memory products. Established in 2008, KDI is headquartered in Fountain Valley, California, USA. For more information, please visit www.kingston.com or call 800-337-8410.

Editors Note: For additional information, evaluation units or executive interviews, please contact David Leong, Kingston Digital, Inc. 17600 Newhope Street, Fountain Valley, CA USA 92708, 714-438-1817 (Voice). Press images can be found in Kingstons press room at kingston.com/press/default.asp

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5423
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
CVE-2020-29454
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-7199
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
CVE-2020-14260
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
CVE-2020-14305
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...