© Copyright Acquisition International 2024 - All Rights Reserved.

Article Image - Cryptography in 2016
Posted 30th June 2016

Cryptography in 2016

Kingston Technology was founded in 1987 and has grown to be the world’s largest independent manufacturer of memory products.

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Cryptography in 2016
Image

Kingston Technology was founded in 1987 and has grown to be the world’s largest independent manufacturer of memory products. But what is the story behind their success? And what advice and insight do they offer on the hot topic of the European Union General Data Protection Regulation?

In a nutshell, Kingston offers a full range of memory products that address complex IT business requirements, including DRAM for servers, desktop and notebook computers. In addition, Kingston provides a wide range of Flash memory based products, including encrypted USB drives, to store and protect sensible data. Moreover, in March 2016, Kingston acquired the IronKey encrypted USB business and will utilise the IronKey product line to deliver FIPS 140-2 Level 3 certification solutions for customers who need the highest level of encryption and security (FIPS 140-2 Level 3 certification is a requirement for civilian and government agencies as well as military branches in the United States and Canada).

As such, Kingston serves an international network of distributors, resellers, retailers, OEM customers and data centres on six continents. The company also provides contract manufacturing and supply chain management services for semiconductor manufacturers and system OEMs.

From our perspective, perhaps one of the biggest developments in digital technology is the forthcoming European Union General Data Protection Regulation. The European Union General Data Protection Regulation (EU GDPR) replaces the 1995 Data Protection Directive and aims to better protect personal data of EU residents as well as generally future proof data protection in the EU whilst unifying 28 different national legislations at the same time.

Thinking back to 1995, the Internet was in its early days and most of us used Altavista as a search engine, AOL as an Internet provider as well as instant messaging platform and Amazon was called Cadabra. Companies like Google, Facebook or Twitter who process a big chunk of today’s data and personal data were not around back then and this demonstrates how urgent the need for a new data protection regulation that is digital age-proof was.

As such, the EU Commission put forward a first draft of an updated legislation in 2012 and after four years of negotiations between EU Commission, EU Parliament and the Council of Ministers, the final version of the EU GDPR passed the European Parliament in April this year. There is a two-year transition period which means that the legislation will take full effect in May 2018. So organisations have two years to develop and work on policies, processes and technology to comply with the EU GDPR.

The new regulation applies to every organisation that processes personal data, for example name, date of birth, bank details or medical records, of EU residents no matter if the organisation itself is based within or outside the EU. The GDPR furthermore doesn’t prescribe in detail how organisations should protect personal data but strongly recommends carrying out a risk assessment and evaluation and then taking appropriate and state-of-the-art measures such as for instance encrypting data to mitigate the risks found. In case of a data breach businesses will face fines of up to 4% of their global revenue or €20 million (whichever is greater).

Additionally, individuals will have the right to be notified if their personal data has been compromised and data breaches must be reported to a national supervisory authority. This means that a data breach in addition to the direct costs like fines or legal fees will also generate indirect costs such as negative publicity, loss of customer trust and ultimately business.

In order to become GDPR compliant, we recommend following five steps. First and foremost, companies need to understand the new regulation and what it means to your organisation. Secondly, they need to understand which personal data your organisation processes and who uses and has access to them.

Once there is an understanding, the third step is to define a strategy for the data and who gets access to which data and on which medium. Our fourth step refers to the technology being used. As recommended in the GDPR, hardware encryption and endpoint-management are the options to be considered, especially for data on the move. Lastly, but certainly not least, you need to ensure your staff is aware of the GDPR and best practice data protection policies are followed.

This also applies to data on the move. Mobile devices such as phones, laptops or USB-drives generally have a certain risk of getting stolen, lost or misplaced. Hence employees carrying data out of the office on these devices increase the overall risk of data being compromised and leaving an organisation open to hefty fines, recovery costs and a potential PR disaster. It is also important to remember that this not only applies to data that you need to protect from a legal point of view but also to sensitive data that you want to protect.

As mentioned previously, encryption of personal and sensitive data is currently the recommended and state-of-the art way to be safe. Organisations invest heavily in protecting data inside the network. By investing in encrypted USB drives with 256-bit AES hardware-based encryption organisations can get a small but important item ticked off their GDPR to-do list. Data outside the network or beyond a company’s firewall is every bit as important.

Naturally, improving network security is an ongoing task for IT departments as hacking is more prevalent.
In an increasingly mobile world where more employees work from home or in a BYOD (bring your own device) environment, companies will need to better address security concerns and this especially includes “data on the go” which is where USB drives come in.

Due to the new regulation and its impact on businesses, we expect encryption to become a boardroom topic. Currently the encryption of personal and sensitive data is more of a topic for IT departments and IT security managers. However, the potential 4% revenue or €20 million fines if a data breach occurs will ensure a heightened overall awareness for encryption within organisations.
At Kingston Technology, we offer an affordable business-grade encrypted (DTVP 3.0), highsecurity (DT4000 G2) as well as keypad USB-drives (DT2000), to help make sure organisations comply with the EU General Data Protection Regulation (GDPR) and their data gets the security it deserves.

In addition, Kingston uses the IronKey product line to deliver FIPS 140-2 Level 3 certification solutions for customers who need the highest level of encryption and security. Furthermore, Kingston’s close software partner DataLocker® Inc. will continue to manage the SafeConsole® and Enterprise Management Services (EMS) platforms that both Kingston and IronKey managed encrypted drives utilise. Thus IT administrators can centrally manage encrypted USB drives to meet compliance requirements and provide a higher level of support. Features include setting passwords remotely, configuring password and device policies, activating audit for compliance and more.

Although the development is unfamiliar territory for many businesses, we are confident that we can assist any business in meeting its requirements and thereby ensuring them a smooth transition and allowing them to do what they do best.

Company: Kingston Technology
Name: Christoph Bader,
Strategic Marketing Manager B2B
Web: www.kingston.com
Address: 17600 Newhope
Street, Fountain Valley,
CA 92708, USA
Brooklands Close,
Sunbury-on-Thames,
TW16 7EP, United Kingdom
Telephone: www.kingston.com/
company/contacts



Categories: Innovation, Strategy


You Might Also Like
Read Full PostRead - Eye Icon
Ambienta Acquires a Majority stake in SF-Filter AG
Finance
09/02/2016Ambienta Acquires a Majority stake in SF-Filter AG

Ambienta, the largest European private equity fund specialised in environmental businesses, today announced it has acquired a majority stake in SF-Filter AG, Zurich, a successful specialist for filter solutions with sales of about CHF 80 m.

Read Full PostRead - Eye Icon
Leading the Way in Aesthetic Dermatology
Innovation
06/05/2020Leading the Way in Aesthetic Dermatology

There are exceptional scientists in all fields, and then there are the truly outstanding specialists in their unique fields. Dr Desmer Destang is one such individual, having been highly regarded as one of the finest orthodontic and oro-facial orthopaedic speci

Read Full PostRead - Eye Icon
Windjammer Capital’s Sale of Protective Industries to Berwind
Strategy
06/05/2015Windjammer Capital’s Sale of Protective Industries to Berwind

Choate recently represented Windjammer Capital Investors in the hugely successful exit of its investment in Protective Industries, Inc. (Caplugs), a leading Buffalo, NY-based manufacturer of plastic protection products, in a sale to an affiliate of Berwind.

Read Full PostRead - Eye Icon
AMF’s Acquisition of Ownership in Property Portfolio in Helsinki
M&A
03/06/2015AMF’s Acquisition of Ownership in Property Portfolio in Helsinki

AMF's Acquisition of Ownership in Property Portfolio in Helsinki

Read Full PostRead - Eye Icon
2016’s Most Innovative Company – Kenya
Strategy
31/07/20162016’s Most Innovative Company – Kenya

Formed in 1998, Miller & Company Advocates comprises a team of highly qualified, energetic and dynamic professionals who represent the new face of legal practice that is in tune with today’s business trends and modern client needs.

Read Full PostRead - Eye Icon
The Digital Operational Resilience Act: What This Means for the Finance Sector and Its Legacy Technology
Finance
02/11/2023The Digital Operational Resilience Act: What This Means for the Finance Sector and Its Legacy Technology

The main objective of the Digital Operational Resilience Act (DORA) is to strengthen the IT security of financial entities such as banks, insurance companies and investment firms. The EU deems this necessary because of the growing risk of depending on Informat

Read Full PostRead - Eye Icon
Merrill Datasite Provide VDR During XPO Acquisition of Bridge Terminal Transport Services
M&A
03/06/2015Merrill Datasite Provide VDR During XPO Acquisition of Bridge Terminal Transport Services

XPO acquisition of Bridge Terminal Transport Services

Read Full PostRead - Eye Icon
Poll Reveals Most UK Workers Are Putting IT Networks At Risk
Leadership
12/12/2019Poll Reveals Most UK Workers Are Putting IT Networks At Risk

Nearly half of working Brits are visiting sites or opening email attachments that could cause a virus, malware or ransomware attack, according to a new UK-wide study commissioned for strategic IT consultancy, Aura Technology*. The anonymous poll of 2,000 offic

Read Full PostRead - Eye Icon
Innovative Lessons from Cleaning Businesses During COVID
Innovation
14/10/2020Innovative Lessons from Cleaning Businesses During COVID

The clean freaks were right. There is something to be said for disinfecting the office every day — and the benefits have never been clearer. As businesses reopen, most are working to reassure customers that their offices are clean and safe. To do so, they're



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have 14 unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow