Select Page

Pendrive with outstanding encryption capabilities

U.S. government agencies have also recognized the high security capabilities of Kingston’s new media.

Laptops and smaller and smaller storage devices pose serious security risks. This is because if these assets are lost or stolen, confidential information may fall into unauthorized hands. In addition to software developers, hardware manufacturers are also paying increasing attention to provide their storage products with a variety of security solutions. Kingston, which introduced Data Traveler’s Blackbox media, is no exception.

The Data Traveler Blackbox also complies with US government information security standards, such as FIPS (Federal Information Processing Standard) Level 2 compliant. The new memories use hardware data encryption, which uses 256-bit AES algorithms to ensure data protection. In addition, care is taken to ensure that the passwords required for encryption are strong enough, i.e. they cannot be easily decrypted. By default, the Data Traveler Blackbox allows the user ten attempts to enter the correct password. If this fails, you can use the small memory again only after formatting the storage and setting a new password. In accordance with FIPS Level 2 requirements, the Data Traveler Blackbox performs a Power-On Self Test (POST) each time it is connected to ensure that the security technologies are working as intended.

Pendrive with outstanding encryption capabilities

Kingston has not only tried to make its new product durable and safe internally, but also made it quite resistant to external, physical influences. The data storage is protected by a titanium cover from damage from drops, moisture and other environmental influences.

The Data Traveler Blackbox will initially be available in 2, 4 and 8 GB versions. According to Kingston, the storage has a read speed of 24 MB / second and a write speed of 20 MB / second. Thanks to hardware encryption, you do not need to install any separate software or drivers to use it. After entering the password, the encryption is done completely automatically, virtually unnoticed.

About the Author