Protect Your Organisation
with Kanguru Secure Firmware USB Drives


Protect With Kanguru Defender® RSA-2048, Digitally-Signed, Trusted Secure Firmware, Hardware Encrypted USB Flash Drives

KanguruDefender3000.jpg

All Kanguru Defender secure USB flash drives with AES hardware encryption are built with RSA-2048 digitally-signed secure firmware, impervious to the potential risk of malicious third-party, firmware-based attacks. Recent discoveries like "badUSB" have worried some organisations who may be particularly vulnerable to this type of attack. Kanguru's on-board, RSA-2048 secure firmware makes Defender® USB drives the most trusted, secure USB on the market to protect against third-party attacks. If your organisation worries about any possibility of malware tampering through USB peripherals, you can be assured the Kanguru Defender® Series of secure USB drives provide a robust defence and can help secure data along with helping to protect your organisation's infrastructure.

  • AES 256-Bit Hardware Encryption

  • RSA-2048 Digitally-Signed, Secure Firmware

  • Physical Write Protect Switch (select models)

  • On-Board Anti-Virus

  • Remotely-Manageable

In addition, with Kanguru Remote Management Console, (KRMC™) organisations can monitor, locate, and even remotely delete/disable their USB drives if lost or stolen. All Kanguru Defender® secure USB drives are remotely manageable through KRMC as an optional feature.


Non-Encrypted, Trusted Secure Firmware Flash Drive - Kanguru FlashTrust™

FlashTrust.png

For organisations not in the market for high-end hardware encryption, but still want to be protected from third-party malware tampering, Kanguru launched its newest non-encrypted version of an RSA-2048 secure firmware USB flash drive called the Kanguru FlashTrust back in 2014. FlashTrust is the world's first non-encrypted USB drive with on-board secure firmware, offering organisations the same level of firmware protection used in our trusted hardware encrypted devices. Using the same principle, if a third-party hacker were to try to tamper with the USB drive to deliver malware to a network, it would simply shut down, as it is consistently verified through a self-test on start-up, making it a perfect solution for Endpoint Security environments.

  • RSA-2048 Digitally-Signed, Secure Firmware

  • Physical Write Protect Switch


Secure Firmware External USB Drive - Kanguru UltraLock™ Hard Drive or Solid State Drive (SSD)

Kanguru-UltraLockHDD.jpg

The Kanguru UltraLock is available as both an external Hard Drive or external Solid State Drive, and provides self-checking firmware. The Ultralock's internal controller is able to self-check the digital signature of the firmware and verify that it is valid. If the firmware has been modified in any way by a third party, the signature validation will fail and the device will cease operation, preventing an attack to a network.

  • Digitally-Signed, Secure Firmware

  • Physical Write Protect Switch

  • Available Models: HDD or SSD


Kanguru QS-Slim, Secure Firmware DVD and Blu-ray Burners 

Kanguru-QS-Slim.jpg

The firmware for the Kanguru QS Slim DVDRW DVD and BD-RE Blu-ray Burner is protected, and cannot be used maliciously by a third-party as a malware attack. If an intrusion of malware from third-party hacking on USB devices is a concern within your organization, the Kanguru QS Slim DVD and BD-RE drives are protected firmware drives so they can be trusted on your computer or network.

  • Secure Firmware

  • Available Models: DVD or Blu-ray Burner

 
concernedAboutBadUSB_DontBe_300px.jpg

RSA-2048, digitally-signed, secure firmware provides organisations with trusted USB devices. Protect your organisation from the possibility of third-party, malicious attacks by using Kanguru secure firmware USB devices with your security policy.

How Kanguru Secure Firmware USB Devices Help Organisations

Your data is one of the most valuable assets to your organisation including company financials, personal information of clients, patients, proprietary, technical data, etc. To conduct good business requires easy access, convenience and portability of this information in order to get work done. USB flash drives have become very popular for this reason because of the easy transfer of data. But researchers urge caution for specific circumstances where savvy hackers could potentially use USB technology to wreak havoc on a network or infrastructure. This threat, called "badUSB" could come from a third-party manipulating the firmware of any USB peripheral such as a printer, keyboard, computer mouse, webcam or memory stick to trick the USB into delivering malware that could infiltrate an organisation's network.

Energy & Utility companies, Defence Contractors, and Government organisations are just a few of the industries where using secure firmware USB drives to protect from third-party malware tampering is a good idea. Industries that could be a potential high-target for terrorism may choose to be proactive in implementing a solution that helps alleviate this potential threat by using USB drives with secure firmware implementation.

Organisations and IT professionals that restrict USB devices to Kanguru trusted secure firmware drives either through a company-wide security policy or endpoint protection, inherently protect their network and infrastructure because the firmware cannot be manipulated effectively.

(Note: Secure Firmware is a separate component from encryption. If you require hardware encryption in addition to secure firmware, please see our Defender® Hardware Encrypted USB Drives.)

Is "badUSB" Really As Bad As It Sounds?

In August of 2014, researchers Karsten Nohl and Jakob Lell at a Black Hat security event, revealed a potential threat to USB technology, pointing out that any USB peripheral, including printers, keyboards, computer mice, webcams or flash keys, could be open to a possibility of a savvy hacker physically changing the firmware to deliver infective malware. Although this would be a very difficult thing to do, the news, known as "BadUSB", has worried some that USB drives could be vulnerable to such type of physical tampering.

When it comes to a possibility of tampering with USB technology, it's really not a huge threat to the overall population, as it would take an extremely savvy, and deeply disgruntled hacker to tamper with the firmware of a USB device to infiltrate an organisation. Still, some organisations may be at greater risk than others. It is enough to make experts sit up and take notice, especially if an organisation could be specifically targeted by this type of attack.. To combat this, organisations that feel they are at greater risk may want to restrict their USB use to secure firmware. Making secure firmware USB a policy can provide a layer of protection from malware attack.


How Digitally-Signed, RSA-2048 Secure Firmware Works

Imagine that a thief/vandal tried to steal your car to use it as a vehicle to inflict serious damage to your house. Then imagine hypothetically that your car could somehow recognise that it is not you behind the driver's seat, and your car could completely lock down, bolt all the doors and stop functioning altogether. By design, Kanguru's secure firmware USB devices are inherently protected with what is called secure firmware. Secure firmware USB is a fundamental feature that makes it nearly impossible for any firmware-based attack to be successful, making Kanguru USB devices the most trusted USB devices on the market. Because the secure firmware is verified with a self-test on start-up, if any attempt by a third-party hacker were made to tamper with the firmware on a Kanguru secure firmware drive, the USB drive simply would not function.