ATEK Access Technologies is proud to announce the release of the Mini-Bar series, the latest addition to its Datakey brand of rugged portable memory products. Consisting of portable memory tokens and mating receptacles, the Mini-Bar series provides embedded systems designers...
Imagine this: you’re a healthcare professional drowning in a sea of medical records, knowing that each document needs to be securely stored yet readily accessible. That’s where WORM (Write Once, Read Many) immutable secure SD, Micro SD and USB drives...
In every business data is king, the ability to recover swiftly from a disaster is crucial. Whether it’s a cyber-attack, hardware failure or natural calamity, the continuity of your business hinges on how well-prepared you are. That’s where encrypted USB...
Data security is essential in sensitive environments such as hospitals, financial services and government organisations. USB-based malware attacks are not uncommon in today’s digital society and according to a new report from Mandiant, researchers say in the first half of...
In today’s digital age, data security has become a top priority for individuals and businesses alike. With the rise of cyber threats and data breaches, safeguarding sensitive information has become more crucial than ever before. Flexxon, a leading innovator in...
The chances are you know that WORM stands for write-once-read-many times. A WORM kit improves data security in the workplace and in your embedded systems. Data cannot be erased or manipulated once written to Flexxon’s Write-Once-Read-Many (WORM) SD cards and...
The difference between an encrypted and unencrypted memory stick An encrypted USB drive and a memory stick (also known as a USB flash drive) are both portable storage devices that use USB technology to transfer data between computers. However, there...
In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place...
In our increasingly connected world, embedded systems, such as those at the heart of IoT and IIoT devices, need to carry sensitive data. Accordingly, if you’re an embedded systems designer, you’re advised (certainly by us) to not only make security...
In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined...
Nexus (GB) Ltd, Unit 5, Chilgrove Business Centre, Chilgrove Park Road, Chilgrove, Chichester, West Sussex PO18 9HU, United Kingdom
"*" indicates required fields
"*" indicates required fields