Latest news with #FIPS140-3


Channel Post MEA
21-07-2025
- Business
- Channel Post MEA
Kingston Calls For Adopting Stronger Hardware-Level Data Protection Strategies
Kingston Technology is urging public sector entities across the Gulf and beyond to adopt stronger hardware-level data protection strategies. Recent high-profile breaches and espionage attempts have underscored the region's vulnerability, especially in sectors handling sensitive or classified data. According to the State of the UAE Cybersecurity Report 2024 by the UAE Cybersecurity Council, ransomware attacks in the UAE surged by 32% year-over-year, reflecting growing pressure on public digital infrastructure. Similarly, the Saudi Arabia Cybersecurity Report 2024 from Foresiet reported a 35% increase in cyberattacks, particularly targeting the Kingdom's financial, government, and energy sectors, with ransomware and phishing among the most prevalent threats. With growing digitization, mobile data handling, and geopolitical risk, the stakes for protecting information assets have never been higher. 'In today's climate, data isn't just operational, it's sovereign,' said Antoine Harb, Team Leader Middle East at Kingston Technology. 'When state institutions are targeted, the integrity of national systems, citizen privacy, and geopolitical stability are all at stake. Effective data protection has moved from being an IT best practice to a matter of national resilience.' Kingston Technology is advocating for the adoption of FIPS 140-3 Level 3 certified hardware-encrypted storage, the highest internationally recognized standard for cryptographic device security. Unlike software-based encryption, hardware encryption delivers robust, tamper-evident protection, particularly critical in environments where data moves between facilities, field units, or is exposed to uncontrolled networks. Among Kingston's offerings is the IronKey D500S, a U.S. assembled device that meets both FIPS 140-3 Level 3 and TAA compliance standards. Already in use by defense and intelligence agencies globally, the device is designed for environments where failure to protect data can have national consequences. 'Security isn't about the tools, it's about the decisions behind them,' added Harb. 'It starts with policy, training, and risk-based planning. Devices like the IronKey are essential enablers, but leadership, standards, and strategic foresight come first.' To support government IT leaders, Kingston also offers its Ask an Expert program, providing advisory support on compliance alignment, secure data mobility, and best practices for endpoint protection. With cyber threats now recognized by the World Economic Forum as a top-tier global risk, Kingston Technology reiterates its call for public institutions to build cyber-resilient ecosystems rooted in trusted hardware, policy clarity, and continuous vigilance.


Mid East Info
21-07-2025
- Business
- Mid East Info
Kingston calls for Urgent Reinforcement of Data Security as Cyber Threats escalate across Critical Sectors - Middle East Business News and Information
With cyberattacks rising sharply against government institutions, utilities, and national infrastructure worldwide, Kingston Technology, a world leader in memory products and technology solutions, is urging public sector entities across the Gulf and beyond to adopt stronger hardware-level data protection strategies. Recent high-profile breaches and espionage attempts have underscored the region's vulnerability, especially in sectors handling sensitive or classified data. According to the State of the UAE Cybersecurity Report 2024 by the UAE Cybersecurity Council, ransomware attacks in the UAE surged by 32% year-over-year, reflecting growing pressure on public digital infrastructure. Similarly, the Saudi Arabia Cybersecurity Report 2024 from Foresiet reported a 35% increase in cyberattacks, particularly targeting the Kingdom's financial, government, and energy sectors, with ransomware and phishing among the most prevalent threats. With growing digitization, mobile data handling, and geopolitical risk, the stakes for protecting information assets have never been higher. 'In today's climate, data isn't just operational, it's sovereign,' said Antoine Harb, Team Leader Middle East at Kingston Technology. 'When state institutions are targeted, the integrity of national systems, citizen privacy, and geopolitical stability are all at stake. Effective data protection has moved from being an IT best practice to a matter of national resilience.' Kingston Technology is advocating for the adoption of FIPS 140-3 Level 3 certified hardware-encrypted storage, the highest internationally recognized standard for cryptographic device security. Unlike software-based encryption, hardware encryption delivers robust, tamper-evident protection, particularly critical in environments where data moves between facilities, field units, or is exposed to uncontrolled networks. Among Kingston's offerings is the IronKey™ D500S, a U.S. assembled device that meets both FIPS 140-3 Level 3 and TAA compliance standards. Already in use by defense and intelligence agencies globally, the device is designed for environments where failure to protect data can have national consequences. 'Security isn't about the tools, it's about the decisions behind them,' added Harb. 'It starts with policy, training, and risk-based planning. Devices like the IronKey are essential enablers, but leadership, standards, and strategic foresight come first.' To support government IT leaders, Kingston also offers its Ask an Expert program, providing advisory support on compliance alignment, secure data mobility, and best practices for endpoint protection. With cyber threats now recognized by the World Economic Forum as a top-tier global risk, Kingston Technology reiterates its call for public institutions to build cyber-resilient ecosystems rooted in trusted hardware, policy clarity, and continuous vigilance.


Business Wire
28-05-2025
- Business
- Business Wire
Endace Secures FIPS 140-3 Validation for EndaceProbe Packet Capture and Network Recording Appliances
AUSTIN, Texas & AUCKLAND, New Zealand--(BUSINESS WIRE)--Packet capture authority, Endace, today announced that EndaceProbe has achieved FIPS (Federal Information Processing Standard) 140-3 validation from the U.S. National Institute of Standards and Technology (NIST). The rigorous evaluation process formally validates that EndaceProbe hardware and software conforms to the latest cryptographic security framework, giving customers in government, defense, and regulated industries such as critical infrastructure, finance and healthcare, confidence the data they record using their EndaceProbes is protected by highly secure encryption. FIPS 140-3 validation was conducted on the following Endace products: EndaceProbe 2144-G5, EndaceProbe 2184-G5, EndaceProbe 92C8-G4, and the newly announced EndaceProbe 94C8-G5 100GbE platform. 'We are very proud to have achieved this FIPS 140-3 validation,' said Cary Wright, VP Product at Endace. 'Although FIPS is a US-mandated framework, it is widely acknowledged as a gold standard for cryptographic security technology. The meticulous testing requirements to meet FIPS criteria are laborious, but achieving this certification is a testament to Endace's unrelenting dedication to providing customers with armor-plated products that can be safely deployed into the most secure environments on the planet.' In October 2024, EndaceProbes were certified by the U.S. Defense Information Systems Agency (DISA) for its Department of Defense Information Network Approved Products List (DoDIN APL). Certification for the DoDIN APL involves rigorous testing to meet stringent military-grade cybersecurity criteria, and APL approved products may be deployed with no further certification or testing required, making it simpler for US agencies to comply with mandatory federal packet capture requirements. FIPS 140-3 is the most recent framework requirement from NIST and the Canadian Centre for Cyber Security for hardware and software products that use cryptography algorithms to protect sensitive information. The process is exhaustive and involves rigorous testing and validation for protecting cryptographic keys, performing cryptographic operations, and ensuring the security of data at rest, in-transit, and in-use. For more information about FIPS 140-3, see EndaceProbes provide scalable, accurate, full packet capture and recording, with zero packet loss so security and network teams can quickly access the irrefutable packet evidence they need to investigate and resolve incidents. With centralized data mining, rapid search, centralized management, and workflow integration, EndaceProbes deliver deep visibility into both North-South and East-West network traffic and 100% accurate recording on network links to 100Gbps and beyond, with industry-leading speed, density and storage capacity. About Endace
Yahoo
28-05-2025
- Business
- Yahoo
Endace Secures FIPS 140-3 Validation for EndaceProbe Packet Capture and Network Recording Appliances
NIST validation ensures highest cryptographic security standards, enhances data protection, streamlines customer procurement and deployment AUSTIN, Texas & AUCKLAND, New Zealand, May 28, 2025--(BUSINESS WIRE)--Packet capture authority, Endace, today announced that EndaceProbe has achieved FIPS (Federal Information Processing Standard) 140-3 validation from the U.S. National Institute of Standards and Technology (NIST). The rigorous evaluation process formally validates that EndaceProbe hardware and software conforms to the latest cryptographic security framework, giving customers in government, defense, and regulated industries such as critical infrastructure, finance and healthcare, confidence the data they record using their EndaceProbes is protected by highly secure encryption. FIPS 140-3 validation was conducted on the following Endace products: EndaceProbe 2144-G5, EndaceProbe 2184-G5, EndaceProbe 92C8-G4, and the newly announced EndaceProbe 94C8-G5 100GbE platform. "We are very proud to have achieved this FIPS 140-3 validation," said Cary Wright, VP Product at Endace. "Although FIPS is a US-mandated framework, it is widely acknowledged as a gold standard for cryptographic security technology. The meticulous testing requirements to meet FIPS criteria are laborious, but achieving this certification is a testament to Endace's unrelenting dedication to providing customers with armor-plated products that can be safely deployed into the most secure environments on the planet." In October 2024, EndaceProbes were certified by the U.S. Defense Information Systems Agency (DISA) for its Department of Defense Information Network Approved Products List (DoDIN APL). Certification for the DoDIN APL involves rigorous testing to meet stringent military-grade cybersecurity criteria, and APL approved products may be deployed with no further certification or testing required, making it simpler for US agencies to comply with mandatory federal packet capture requirements. FIPS 140-3 is the most recent framework requirement from NIST and the Canadian Centre for Cyber Security for hardware and software products that use cryptography algorithms to protect sensitive information. The process is exhaustive and involves rigorous testing and validation for protecting cryptographic keys, performing cryptographic operations, and ensuring the security of data at rest, in-transit, and in-use. For more information about FIPS 140-3, see EndaceProbes provide scalable, accurate, full packet capture and recording, with zero packet loss so security and network teams can quickly access the irrefutable packet evidence they need to investigate and resolve incidents. With centralized data mining, rapid search, centralized management, and workflow integration, EndaceProbes deliver deep visibility into both North-South and East-West network traffic and 100% accurate recording on network links to 100Gbps and beyond, with industry-leading speed, density and storage capacity. About Endace Endace's scalable, always-on packet capture gives Network Operations and Security teams the deep visibility they need for fast, accurate incident investigation with rich forensic evidence at their fingertips from all their tools. EndaceProbes provide enterprise-class packet sniffing in on-prem, public and private cloud environments, with rapid, centralized search and one-click access to full pcap data from leading security and performance solutions (including Palo Alto Networks, Fortinet, Cisco, Splunk, Elastic, and many others). Analyze network traffic using a single, unified console across all on-premise, private, or public cloud infrastructure for total hybrid cloud visibility. Capture every packet. See every threat. View source version on Contacts Email: pr@ Phone:Mark Evans, mobile +64-21-494 850 – New Zealand / APACKimber Smith-Fidler, mobile +1 775 298 5260 – USA / North AmericaLeah Jones (The CommsCo) +44 203 697 6680 – UK / EMEA Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Cision Canada
08-05-2025
- Business
- Cision Canada
Swissbit introduces iShield Key 2: One key for phishing-resistant login and physical access
WESTFORD, Mass., May 8, 2025 /CNW/ -- Swissbit, a leading provider of storage and security solutions, announces the launch of the iShield Key 2, its next-generation hardware authenticator for enterprise and public sector use. Built on the FIDO2 standard, it supports phishing-resistant, passwordless authentication with capacity for up to 300 Passkeys. Pro models add HOTP, TOTP, and PIV smartcard functionality, while the unique MIFARE variant enables combined digital and physical access control. A FIPS 140-3 Level 3 certified version is available for high-security environments. All models feature a compact, industrial-grade design manufactured in Berlin, Germany. At launch, the iShield Key 2 is available with USB-C, with USB-A variants scheduled for release by end of Q2 2025. All models support NFC for contactless use. The portfolio consists of three main lines: iShield Key 2, iShield Key 2 MIFARE, and iShield Key 2 FIPS. Each line is available in a base FIDO2-only version and a Pro version supporting HOTP, TOTP, and PIV. This breadth allows organizations to select the authenticator that best fits their specific requirements and use cases. Variants with FIDO Enterprise Attestation are also available, allowing organizations to restrict access to verified, company-issued security keys. Physical access control and beyond Thanks to NXP's advanced chip technology, the iShield Key 2 MIFARE supports DESFire EV3, enabling true hybrid usage. This allows the key to integrate seamlessly into daily workflows and support custom applications based on MIFARE technology – ideal for use cases such as time tracking, payment, or campus ID cards. Swissbit also offers optional support for leading access control technologies such as HID SEOS and LEGIC advant / LEGIC neon. Update Capabilities All iShield Key 2 models can be remotely updated by using secure channel protocols which allows the provisioning of new firmware versions and applications to devices in the field. About Swissbit Swissbit AG is the leading European technology company for data storage and security solutions. Founded in 2001, Swissbit operates offices in Switzerland (HQ), Germany, the USA, Japan, and Taiwan, and maintains its own semiconductor production facility in Berlin, Germany. PR Contact Swissbit AG Marian Weber Industriestrasse 4 9552 Bronschhofen Switzerland Tel: +49 172 854 88 26 Email: [email protected] - Picture is available at AP -