Ask an Expert
Planning the right solution requires an understanding of your project’s security goals. Let Kingston’s experts guide you.
Ask an ExpertYour web browser is out of date. Update your browser now for better experience on this site. https://browser-update.org/update-browser.html
Data breaches, hacking and the human element are continuous reminders of threats and risks worldwide. The costs associated with a data breach and the unfortunate exposures can be astronomical. Requirements of advanced cybersecurity and endpoint DLP strategies for data protection all rely on dependable as well as efficient storage and memory.
Kingston & Matrix42 have partnered up to show you how the combination of a hardware encrypted USB with its customisation options & Matrix42's endpoint software provides the optimal Endpoint security solution.
We look at the industry use cases, their challenges & how we solved them in these sectors:
Public Sector
Health Care
Finance
Automotive
Telecommunication
#KingstonIsWithYou
Planning the right solution requires an understanding of your project’s security goals. Let Kingston’s experts guide you.
Ask an ExpertNo products were found matching your selection
Looking for improved data security & need to know what is encryption? Kingston covers the basics.
A look at how the requirement for data encryption can be key to any organisation's security strategy.
Discover why national security agencies trust Kingston IronKey to protect their data.
Kingston’s three key practices for robust DLP for businesses that handle sensitive data.
A brief explaining the purpose and types of data security software available.
Passphrases are superior to complex passwords for keeping data secure, with many powerful benefits.
HIPAA requires healthcare organisations to keep patient data safe at all times, including in transit.
Kingston IronKey encrypted USBs are a security consideration for organisations of all sizes.
We compare unencrypted and encrypted USB drives and explain how to keep data secure!
Learn how Kingston IronKey is protecting the intellectual property with customisation.
Discover why Kingston IronKey is the go-to solution for protecting financial services data.
Learn how Kingston IronKey is securing the military operations’ data.
How can you get your organisation to use encrypted drives and make them part of your security policy? Here are some tips.
Learn how Kingston IronKey is protecting telecoms industry's data using encryption.
Encryption is an incredibly helpful option for creatives to protect their clients’ important files.
Kingston IronKey encrypted USBs: a small but important part of any organisation’s security strategy.
Kingston IronKey can help mitigate data loss due to the rise in lost electronic devices.
In this eBook, we explore how Encrypted USB drives have become a key tool in keeping data secure.
Organisations are considering data security options to protect against private mobile data breaches.
Discover how Kingston IronKey is protecting the sensitive data of the finance sector.
Here is how Kingston IronKey helped protect the sensitive data of the Energy industry.
How to use your IronKey Vault Privacy 80 External SSD: set password, connecting to a PC and more.
We explore our KingstonCognate experts’ thoughts on cyberthreats and cybersecurity challenges.
Invest in encrypted drives so you do not incur expensive legal fees if they are lost or stolen.
We explore Tomasz Surdyk's thoughts on how all entities can stay secure in the digitised world.
Protecting data on the move with superior hardware-based Advanced Encryption Standard (AES) 256.
A company’s IT specialists should be expected to add data security to the PCs of remote workers.
Don’t plug any USB drives into your computer if you don’t know exactly where they came from.
Users can disable software-based encryption, which can lead to legal fees if the drive is lost.
There are benefits to using both cloud storage and hardware-based encryption.
We explore the top 12 tips small and medium size enterprises can take to enhance cybersecurity.
We’ve examined several factors using unique research to identify what may impact markets globally in 2022.
2021 has been a year full of challenges and innovations. But what will 2022 bring?
Prof Sally Eaves shares her thoughts on the SME cybersecurity landscape and the need for education & support.
Bill Mew shares his thoughts how the largest security challenges need commitment from the boardroom.
Rob May shares his thoughts on how close we are to edge computing and the security it requires.
Secure important personal and private information on a PC with a hardware-encrypted SSD.
The pandemic has increased internet traffic, which has placed importance on the role of data centers.
The use of DLP software, VPNs, Encrypted SSDs and USBs, will help mitigate some risks of remote working.
In this whitepaper, Kingston explains how you can enforce a DLP strategy, while allowing USB drive use.
What will 2021 bring in Tech and trends? What do our KingstonCognate members and industry experts predicting for the future?
When selecting storage for your security camera, you must consider the memory card’s capacity, speed and durability.
Cyber security and data privacy are everyone’s responsibility. What are the key considerations?
We show you how selecting the right SSD can upgrade both your performance and your security.
You can read and write to an encrypted USB flash drive with an iPad or iPhone with the right adaptor. Here’s how.
What we learned from Kingston’s experts and tech influencers on work-from-home enablement Twitter chat.
NVMe is now the standard protocol for SSDs to empower data centres and enterprise environments.
The importance of organisations to consider Revenue, Profit & Risk as equal in organisations to ensure they mitigate data security & cyber security risks. Read this article from Industry Expert, Bill Mew & he will provide you with an insight on this topic.
What do industry experts think has changed since the introduction of GDPR?
Find out how Hardwareluxx were able to manage the growth of their web traffic using Kingston's DC500M SSD.
Data centres should be using server SSDs. There are many benefits over client drives and costs have come down.
Choosing the right SSD for your server is important since server SSDs are optimized to perform at a predictable latency level while client (desktop/laptop) SSDs are not. These difference result in better uptime and less lag for critical apps and services.
SDS hasn’t lived up to its hype but now that NVMe is more affordable, the commodity hardware is ready to deliver.
Cloud and on-premise data centre managers can learn a lot from supercomputing.
Cameron Crandall of Kingston helps you decide if you should move to your server storage to NVMe SSDs.
To work from home you need a good workspace for your PC, the right conferencing gear, and a secure connection.
What strategies can organisations use to best secure customers data in a post-GDPR world with the ever-evolving nature of cyber security threats? Kingston pooled the knowledge of some of the UK’s most experienced commentators in cyber security to discuss how data protection has changed since the introduction of GDPR.
Read an infographic explaining the pros and cons of software vs hardware encryption for SSDs and USB Flash Drives.
This whitepaper demonstrates how using Kingston Technology’s Data Centre DC500 SSDs can reduce your overall capital and licence costs by 39%.
You already know that remote working is a business enabler. But the challenges posed to your network security and compliance with GDPR are too big to ignore.
How to enable and disable Microsoft’s BitLocker eDrive feature to leverage hardware encryption on your Kingston SSD.
Some of Kingston and IronKey's Secure USB Flash drives are powered by partners, licensed technology, or services.
This program offers the options most frequently requested by customers, including serial numbering, dual password and custom logos. With a minimum order of 50 pieces, the programme delivers precisely what your organisation needs.
Learn why the future of business depends on SSD-enabled SDS, and how SSD fits into a Software Defined Storage Solutions.
Storage can be the most challenging component for VDI performance.
Kingston datacenter SSDs provide excellent resiliency to protect sensitive data in OLTP workloads.
HPC can require massive amounts of data. SSDs consume a fraction of the power of their spinning disk.
Firmware/hardware PFAIL protection is an highly effective method for preventing data loss in enterprise SSD.
End-to-End Data Protection protects customer’s data as soon as it is transferred by the host system to the SSD, and then from the SSD to the host computer. All Kingston SSDs incorporate this protection.
The differences between SSD classes lies in two components; the processor and the NAND memory.
Everyday working life has changed radically and so have traditional ways of working: thanks to mobile storage media, we can access our data practically at any time from any location, and can work on our data wherever we are.
Data security is a topic close to our hearts. As an industry leader, we are constantly striving to educate and share our knowledge on a number of technology related subjects and Data Security is a major concern for all.
Why do companies need to use Self-Encrypting Drives (SED)? What is TCG Opal 2.0, AES 256-bit Hardware Encryption and what are the benefits for a company, its departments and data protection best practices?
Most IronKey and Kingston secure USB flash drives are FIPS 140-2 Certified.
This requires encryption of sensitive data, appointing a Security Officer, cyber security programmes and policy adoption.
256-bit AES hardware-based XTS block cipher mode encryption is used in DT 4000G2 and DTVP 3.0.
There are many advantages to using a dedicated hardware encryption processor in USB flash drives.
Regulations like GDPR include data protection policies. Encryption can be part of your overall compliance strategy.
Heathrow Airport in London (30 October 2017) uses unencrypted USB drives for its non-cloud storage. Unfortunately, it was not standardized on encrypted USB drives.
Testing is a cornerstone of our commitment to deliver the most reliable products on the market. We perform rigorous tests on all of our products during each stage of production. These tests ensure quality control throughout the entire manufacturing process.