Ask an Expert
Planning the right solution requires an understanding of your project and system requirements. Let Kingston's experts guide you.
Ask an ExpertWe notice you are currently visiting the UK site. Would you like to visit our main site instead?
Your web browser is out of date. Update your browser now for better experience on this site. https://browser-update.org/update-browser.html
2021 has been a year full of challenges and innovations in technology, impacting all aspects of our lives, from the office, to entertainment, to how we communicate with each other. To get a better understanding of how technology will evolve next year - and what its impact will look like - we asked our community of experts to share their insights and predictions for technology trends in 2022.
The global lockdowns during the Covid-19 pandemic have highlighted the importance of effectively integrating technology into workplace operations. Roland Broch (@rolandbroch) suggests that video conferencing, now a necessity for teams working and collaborating remotely, will see significant developments: “Bigger screens. Immersive 3D experience. More convenience.”
But these innovative experiences won’t be limited to the workplace - consumers may also see the benefits of immersive technologies in their interactions with brands: “With improvements in #hardware capabilities and #software advancements reached in #AI & #VirtualReality, providing immersive experiences for consumers will only become more and more used by brands”, predicts Elena Carstoiu (@elenacarstoiu); “Engaging with your customers has never been so techy.”
The past two years have seen technology become even more integral to people’s daily lives, with 37% of UK adults doing at least some work from home as of May 2021, according to the Office for National Statistics. Of course, this comes with its own risks, especially around data privacy and security - “There is a need of secure remote work, use of home devices, VPN, and IoT unity. Again, secure storage and data sharing are needed,” says Tara Taubman-Bassirian (@clarinette02).
Rafael Bloom (@rafibloom73) stresses the importance of putting people first as technology becomes increasingly prevalent: “I hope that tech now evolves to help us, whether that is direct assistance from an AI or something simpler like the new ‘focus modes’ on Apple devices.”
Artificial Intelligence (AI) has made some great strides in the past few years, allowing for more complex uses in several areas. AI could have applications in sustainability, using “sophisticated sensors on vehicles and connected infrastructure which will allow our cities to become less congested and less polluted” according to Rob May (@robmay70). And of course, we may also see the impact of AI in more mundane aspects of day-to-day life: David Clarke predicts “more #AI in cars to assist drivers and home devices”, while the Dutch Cloud Community (@dutchcloudcomm) had a more jovial view, explaining that “your AI fridge telling you that last beer is a bad idea”.
Cybersecurity in particular has been a rising concern this past year, with the number of reported data breaches already surpassing 2020 figures according to the Identity Theft Research Center. To combat this growing threat, Nigel Tozer (@NigelTozer) predicts that AI “will be a #cybersecurity given in ’22,” as well as the emergence of “Cybersecurity-as-a-Service offerings”.
On the other hand, Ellie Hurst (@Advent_IM_Comms) emphasises that cybersecurity tech must support the people using it: “We know most successful breaches are caused by people, so support them through technology. Whatever is proportionate though because invasive tech can lose people and enable shadow IT”, with Rafael Bloom adding that “#Cybersecurity should be about people, process, and proper governance first, rather than relying on tech to provide a panacea.”
Server memory and storage products will be crucial in supporting emerging technologies in 2022, from AI to 5G to cybersecurity. Kate Sukhanova (@ThisIsKateS) foresees “more organisations embracing the #Cloud over physical servers & more #VPN providers for consumers'' in response to growing concerns around data security and cybercrime. Bill Mew (@BillMew) adds that “There will need to be more of a move towards encrypted storage as cybercrime becomes more pervasive - not just on the #cloud, but on ALL devices.”
Logistical and supply chain issues will be significant challenges for the technology industry in the coming year. Geoffrey Petit (@Kingston_GPetit) notes that “One of the major challenges in 2022 could be the global shortage of components which could delay new innovations and the development of new infrastructures.”
While working from home has become more widespread, organisations will still need to solve problems that arise with remote or hybrid working: “The continuing need for remote means that organisations may reap the whirlwind if they are configured and trained poorly and so we cannot think that the danger from newly remote is passed,” warns Ellie Hurst.
Cybersecurity will continue to be a hot topic in 2022, as technology trends reflect growing awareness of cyber-threats; Rob May predicts the top 2022 IT trends will be “Cybersecurity Mesh Architecture #CSMA. Privacy Enhancing Computation #PEC for privacy & data protection.”
Sustainability in tech will also be a major point of discussion. Roland Broch predicts that “sustainable and resource efficient hardware and green coding are the upcoming trends for 2022”; ‘green coding’ refers to programming code written to produce algorithms with minimal energy consumption, both in terms of structure and behaviour. As global awareness of climate change and environmental risks grows it will be interesting to see the role technological innovation will play in improving sustainability.
At Kingston Technology, we consider ourselves trusted advisors and technology enablers who support AI, Cybersecurity, and advances in technology. Kingston Is With You, no matter what you do, working to support your business needs. While 2022 may be full of unexpected challenges and opportunities for organisations, we are confident that our solutions can support businesses in any of their technology challenges.
#KingstonIsWithYou #KingstonIronKey
Planning the right solution requires an understanding of your project and system requirements. Let Kingston's experts guide you.
Ask an Expert
When you start with Kingston, choosing memory is easy.
With over 35 years of expertise, Kingston has the knowledge and resources you need to choose memory with confidence.
Simply enter the make and model number or system part number of the computer system or digital device to find the Kingston products you need.
Search by either the Kingston part number, distributor part number or manufacturer equivalent part number.
No products were found matching your selection
The differences between SSD classes lies in two components; the processor and the NAND memory.
We discuss NIS2 and DORA, and how organisations can turn compliance into an opportunity.
We discuss the shifts in how organisations are storing and encrypting sensitive data.
Kingston examines how to secure sensitive files with the increasing vulnerability of email.
Learn how Kingston IronKey hardware-encrypted solutions supports NIS2 Directive compliance.
Kingston IronKey has hardware options to protect small and medium businesses against cybercrime.
FIPS 140-3 Level 3 is certified by the world-leading agency NIST as the apex of encryption.
Questions to ask when seeking the right SSD for your organisation’s data center.
Our infographic showcases the differences between software and hardware-based encryption.
Hardware, not software-based password protection, is the best way to protect files and drives.
2023 has been a year full of challenges and innovations. But what will 2024 bring?
Learn about two methods that give SMBs superior resilience vs ransomware: encryption and backups.
In this whitepaper, we explain how to enforce a DLP strategy, while allowing USB drive use.
Enterprise-grade and military-grade digital security: two high standards with different requirements.
Learn how hardware encryption can protect a travelling lawyer’s confidentiality with secure file storage.
How is pen testing ensuring Kingston IronKey USB drives lead the way in trusted data security?
Hardware encrypted Kingston IronKey drives protects organisations’ data on the move.
Bring your own device (BYOD) policy is tricky for employers. How to balance security & convenience?
How do encrypted drives improve cybersecurity and compliance for finance companies? Kingston explains.
DLP offers tools for network admins to protect sensitive data from cybercrime and negligence.
A look at how the requirement for data encryption can be key to any organisation's security strategy.
How can we bolster network security with remote working and international travel so common now?
Invest in encrypted drives so you do not incur expensive legal fees if they are lost or stolen.
Looking for improved data security & need to know what is encryption? Kingston covers the basics.
Discover why national security agencies trust Kingston IronKey to protect their data.
A company’s IT specialists should be expected to add data security to the PCs of remote workers.
Kingston’s three key practices for robust DLP for businesses that handle sensitive data.
You can read and write to an encrypted USB flash drive with an iPad or iPhone with the right adaptor. Here’s how.
Learn why hardware encryption beats software encryption for law firm data protection.
A brief explaining the purpose and types of data security software available.
Passphrases are superior to complex passwords for keeping data secure, with many powerful benefits.
HIPAA requires healthcare organisations to keep patient data safe at all times, including in transit.
This requires encryption of sensitive data, appointing a Security Officer, cyber security programmes and policy adoption.
Kingston IronKey encrypted USBs are a security consideration for organisations of all sizes.
We compare unencrypted and encrypted USB drives and explain how to keep data secure!
Learn how Kingston IronKey is protecting the intellectual property with customisation.
Discover why Kingston IronKey is the go-to solution for protecting financial services data.
Learn how Kingston IronKey is securing the military operations’ data.
How can you get your organisation to use encrypted drives and make them part of your security policy? Here are some tips.
Learn how Kingston IronKey is protecting telecoms industry's data using encryption.
Encryption is an incredibly helpful option for creatives to protect their clients’ important files.
Kingston IronKey encrypted USBs: a small but important part of any organisation’s security strategy.
Kingston IronKey can help mitigate data loss due to the rise in lost electronic devices.
In this eBook, we explore how Encrypted USB drives have become a key tool in keeping data secure.
How to use your IronKey Vault Privacy 80 External SSD: set password, connecting to a PC and more.
Organisations are considering data security options to protect against private mobile data breaches.
Discover how Kingston IronKey is protecting the sensitive data of the finance sector.
Here is how Kingston IronKey helped protect the sensitive data of the Energy industry.
We explore our KingstonCognate experts’ thoughts on cyberthreats and cybersecurity challenges.
Protecting data on the move with superior hardware-based Advanced Encryption Standard (AES) 256.
Users can disable software-based encryption, which can lead to legal fees if the drive is lost.
We explore Tomasz Surdyk's thoughts on how all entities can stay secure in the digitised world.
Don’t plug any USB drives into your computer if you don’t know exactly where they came from.
What we learned from Kingston’s experts and tech influencers on work-from-home enablement Twitter chat.
There are benefits to using both cloud storage and hardware-based encryption.
We explore the top 12 tips small and medium size enterprises can take to enhance cybersecurity.
We’ve examined several factors using unique research to identify what may impact markets globally in 2022.
Prof Sally Eaves shares her thoughts on the SME cybersecurity landscape and the need for education & support.
Bill Mew shares his thoughts how the largest security challenges need commitment from the boardroom.
Rob May shares his thoughts on how close we are to edge computing and the security it requires.
Secure important personal and private information on a PC with a hardware-encrypted SSD.
The pandemic has increased internet traffic, which has placed importance on the role of data centers.
The use of DLP software, VPNs, Encrypted SSDs and USBs, will help mitigate some risks of remote working.
Cameron Crandall of Kingston helps you decide if you should move to your server storage to NVMe SSDs.
There are many advantages to using a dedicated hardware encryption processor in USB flash drives.
What will 2021 bring in Tech and trends? What do our KingstonCognate members and industry experts predicting for the future?
Cyber security and data privacy are everyone’s responsibility. What are the key considerations?
Learn why the future of business depends on SSD-enabled SDS, and how SSD fits into a Software Defined Storage Solutions.
Kingston & Matrix42 partnered to give optimal endpoint security solution in multiple sectors to mitigate risks.
The importance of organisations to consider Revenue, Profit & Risk as equal in organisations to ensure they mitigate data security & cyber security risks. Read this article from Industry Expert, Bill Mew & he will provide you with an insight on this topic.
What do industry experts think has changed since the introduction of GDPR?
Data centres should be using server SSDs. There are many benefits over client drives and costs have come down.
NVMe is now the standard protocol for SSDs to empower data centres and enterprise environments.
Cloud and on-premise data centre managers can learn a lot from supercomputing.
Find out how Hardwareluxx were able to manage the growth of their web traffic using Kingston's DC500M SSD.
SDS hasn’t lived up to its hype but now that NVMe is more affordable, the commodity hardware is ready to deliver.
Choosing the right SSD for your server is important since server SSDs are optimized to perform at a predictable latency level while client (desktop/laptop) SSDs are not. These difference result in better uptime and less lag for critical apps and services.
To work from home you need a good workspace for your PC, the right conferencing gear, and a secure connection.
What strategies can organisations use to best secure customers data in a post-GDPR world with the ever-evolving nature of cyber security threats? Kingston pooled the knowledge of some of the UK’s most experienced commentators in cyber security to discuss how data protection has changed since the introduction of GDPR.
This whitepaper demonstrates how using Kingston Technology’s Data Centre DC500 SSDs can reduce your overall capital and licence costs by 39%.
You already know that remote working is a business enabler. But the challenges posed to your network security and compliance with GDPR are too big to ignore.
How to enable and disable Microsoft’s BitLocker eDrive feature to leverage hardware encryption on your Kingston SSD.
Some of Kingston and IronKey's Secure USB Flash drives are powered by partners, licensed technology, or services.
256-bit AES hardware-based XTS block cipher mode encryption is used in DT 4000G2 and DTVP 3.0.
Firmware/hardware PFAIL protection is an highly effective method for preventing data loss in enterprise SSD.
Kingston datacenter SSDs provide excellent resiliency to protect sensitive data in OLTP workloads.
HPC can require massive amounts of data. SSDs consume a fraction of the power of their spinning disk.
End-to-End Data Protection protects customer’s data as soon as it is transferred by the host system to the SSD, and then from the SSD to the host computer. All Kingston SSDs incorporate this protection.
This program offers the options most frequently requested by customers, including serial numbering, dual password and custom logos. With a minimum order of 50 pieces, the programme delivers precisely what your organisation needs.
Everyday working life has changed radically and so have traditional ways of working: thanks to mobile storage media, we can access our data practically at any time from any location, and can work on our data wherever we are.
Most IronKey and Kingston secure USB flash drives are FIPS 140-2 Certified.
Heathrow Airport in London (30 October 2017) uses unencrypted USB drives for its non-cloud storage. Unfortunately, it was not standardized on encrypted USB drives.
Storage can be the most challenging component for VDI performance.
Testing is a cornerstone of our commitment to deliver the most reliable products on the market. We perform rigorous tests on all of our products during each stage of production. These tests ensure quality control throughout the entire manufacturing process.