Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan

News Feed Item

Kanguru Announces Defender DualTrust: A Secure Browser and Encrypted USB Device

Making online purchases and secure internet browsing is safer and easier than ever with the launch of Kanguru’s new Defender DualTrustTM, a new secure online access and encrypted USB storage device developed jointly by Kanguru and Deepnet Security. The Defender DualTrust turns any Windows PC into a safe and secure environment for online banking, paying bills, shopping, browsing, and investment activity. It also provides a secure portable USB storage environment to store your sensitive files and take them with you anywhere.

The All New Kanguru Defender DualTrust turns any PC into a secure, safe environment to browse, shop  ...

The All New Kanguru Defender DualTrust turns any PC into a secure, safe environment to browse, shop online, pay bills, bank and invest safely, protecting against the possibility of cybercrime and identity theft. The device also provides encrypted USB storage to store your files securely and take with you anywhere! (Photo: Business Wire)

Protected by military-grade hardware encryption, the Defender DualTrust USB flash drive creates a secure browsing session that is isolated from viruses and spyware lurking on the host PC. Each secure session starts with a clean browser, and blocks vulnerabilities to malware and viruses, leaving no trace of online activity behind on the computer. Any files downloaded or saved during the session are automatically encrypted on the flash drive to easily take with you wherever you go.

As hackers and thieves become increasingly more sophisticated, it’s more important than ever for businesses and consumers to protect themselves from cybercrime. The Defender DualTrust makes it simple to protect bank accounts, credit card information and other sensitive data from disclosure. Best of all, it’s completely portable and works on any Windows computer whether at home, in the office or on the road.

Features include:

  • Linux virtual environment isolated from host OS
  • 256-bit AES hardware encryption (FIPS 197)
  • Secure browser, leaving no trace of online activity on local PC
  • Approximately 7GB of secure storage
  • Onboard BitdefenderTM Antivirus (Includes 30 Days free trial)

Kanguru Defender DualTrust is available now at www.kanguru.com/dualtrust and through authorized Kanguru resellers.

Kanguru is a global leader in providing secure portable storage solutions, providing enterprises, organizations and consumers with the best in easy-to-use, secure IT products and data storage. For more information on Kanguru, please visit www.kanguru.com.

Deepnet Security is a leading developer of multi-factor authentication and anti-phishing solutions. Its award-winning product, DualShield Unified Authentication Platform, provides two-factor and two-way authentication for a wide range of enterprise, web and cloud applications in one single security platform, and supports a wide selection of authentication methods including tokens, smartcards, certificates, biometrics and device DNA.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-centric compute for the most data-intensive applications. Hyperconverged systems already in place can be revitalized with vendor-agnostic, PCIe-deployed, disaggregated approach to composable, maximizing the value of previous investments.
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure using the Kublr platform, and how Kubernetes objects, such as persistent volumes, ingress rules, and services, can be used to abstract from the infrastructure.