My shopping cart
Your cart is currently empty.
Continue ShoppingAll Kanguru Defender secure USB flash drives with AES hardware encryption are built with RSA-2048 digitally-signed secure firmware, impervious to the potential risk of malicious third-party, firmware-based attacks. Recent discoveries like "badUSB" have worried some organisations who may be particularly vulnerable to this type of attack. Kanguru's on-board, RSA-2048 secure firmware makes Defender® USB drives the most trusted, secure USB on the market to protect against third-party attacks. If your organisation worries about any possibility of malware tampering through USB peripherals, you can be assured the Kanguru Defender® Series of secure USB drives provide a robust defense and can help secure data along with helping to protect your organisation's infrastructure.
· AES 256-Bit Hardware Encryption
· RSA-2048 Digitally-Signed, Secure Firmware
· Physical Write Protect Switch (select models)
· On-Board Anti-Virus
· Remotely-Manageable
In addition, with Kanguru Remote Management Console, (KRMC™) organisations can monitor, locate, and even remotely delete/disable their USB drives if lost or stolen. All Kanguru Defender® secure USB drives are remotely manageable through KRMC as an optional feature.
For organisations not in the market for high-end hardware encryption, but still want to be protected from third-party malware tampering, Kanguru launched its newest non-encrypted version of an RSA-2048 secure firmware USB flash drive called the Kanguru FlashTrust back in 2014. FlashTrust is the world's first non-encrypted USB drive with on-board secure firmware, offering organisations the same level of firmware protection used in our trusted hardware encrypted devices. Using the same principle, if a third-party hacker were to try to tamper with the USB drive to deliver malware to a network, it would simply shut down, as it is consistently verified through a self-test on start-up, making it a perfect solution for Endpoint Security environments.
· RSA-2048 Digitally-Signed, Secure Firmware
· Physical Write Protect Switch
The Kanguru UltraLock is available as both an external Hard Drive or external Solid State Drive, and provides self-checking firmware. The Ultralock's internal controller is able to self-check the digital signature of the firmware and verify that it is valid. If the firmware has been modified in any way by a third party, the signature validation will fail and the device will cease operation, preventing an attack to a network.
· Digitally-Signed, Secure Firmware
· Physical Write Protect Switch
· Available Models: HDD or SSD
The Kanguru UltraLock USB-C M.2 NVMe SSD is a SuperSpeed+ USB 3.1 Gen 2 solid state drive for high speed data transfers. The Ultralock's internal controller is able to self-check the digital signature of the firmware and verify that the signature is valid. If the firmware has been modified in any way by a third party, the signature validation will fail and the device will cease operation, preventing an attack. Along with a physical write protect switch, the Kanguru UltraLock USB-C M.2 NVMe SSD is ideal for storing data and high-speed data transfers.
· Secure Firmware
· Available Models: UltraLock USB-C M.2 NVMe SSD
The firmware for the Kanguru QS Slim DVDRW DVD and BD-RE Blu-ray Burner is digitally-signed secure firmware, preventing it from being used maliciously by a third-party as a malware attack. If an intrusion of malware from third-party hacking on USB devices is a concern within your organisation, the Kanguru QS Slim DVD and BD-RE drives are protected by digitally-signed secure firmware; trusted on computers and networks around the world.
· Digitally-Signed, Secure Firmware
· Available Models: DVD or Blu-ray Burner
Your data is one of the most valuable assets to your organisation including company financials, personal information of clients, patients, proprietary, technical data, etc. To conduct good business requires easy access, convenience and portability of this information in order to get work done. USB flash drives have become very popular for this reason because of the easy transfer of data. But researchers urge caution for specific circumstances where savvy hackers could potentially use USB technology to wreak havoc on a network or infrastructure. This threat, called "badUSB" could come from a third-party manipulating the firmware of any USB peripheral such as a printer, keyboard, computer mouse, webcam or memory stick to trick the USB into delivering malware that could infiltrate an organisation's network.
Energy & Utility companies, Defense Contractors, and Government organisations are just a few of the industries where using secure firmware USB drives to protect from third-party malware tampering is a good idea. Industries that could be a potential high-target for terrorism may choose to be proactive in implementing a solution that helps alleviate this potential threat by using USB drives with secure firmware implementation.
Organisations and IT professionals that restrict USB devices to Kanguru trusted secure firmware drives either through a company-wide security policy or endpoint protection, inherently protect their network and infrastructure because the firmware cannot be manipulated effectively.
(Note: Secure Firmware is a separate component from encryption. If you require hardware encryption in addition to secure firmware, please see our Defender® Hardware Encrypted USB Drives.)
In August of 2014, researchers Karsten Nohl and Jakob Lell at a Black Hat security event, revealed a potential threat to USB technology, pointing out that any USB peripheral, including printers, keyboards, computer mice, webcams or flash keys, could be open to a possibility of a third-party hacker physically changing the firmware to deliver infective malware. Although this would be a very difficult thing to do, the news, known as "BadUSB", has worried some organisations that USB devices could be vulnerable to such type of physical tampering.
It is not so much a threat to the average user, but there could be a potential threat to organizations that might be a target for terrorism or cyber-attacks. To combat this, organisations at greater risk can restrict their USB use to devices with secure firmware, making it a part of their overall security policy. Secure firmware USB provides an ideal layer of protection from malware attack. For more on this, please see this blog.