Kanguru - comprehensive solutions for data security

In an era of increasing threats from data breaches and identity theft, every organization and private user needs effective solutions to secure their information.
Threats such as identity theft, confidential data leakage and ransomware attacks pose serious challenges to information security. Identifying and countering threats is key, so it is essential to implement appropriate precautions and security policies to effectively protect data from various types of threats.
Kanguru offers state-of-the-art hardware-encrypted devices and advanced management services to help protect sensitive data and meet increasingly stringent regulations.
Introduction to data protection
Data protection has become one of the most important challenges in today's digital world. In an era when data is processed on a large scale and transmitted across the globe, ensuring the protection of individuals' personal data has become crucial. The General Data Protection Regulation (GDPR) is a regulation that covers all countries in the European Union and aims to ensure a high level of data protection. The RODO introduces a number of principles and obligations to protect the fundamental rights of individuals, including the right to data protection, the right to access data, the right to erasure and the right to be forgotten. Proper implementation of these principles is essential to ensure the security and confidentiality of processed data in any organization.
Data security and regulatory compliance
Many organizations, especially those operating in the medical, financial or public sectors, face unique legal requirements for data protection. Breaches of confidential information can have serious financial and legal consequences. Data controllers are liable for violations of data protection laws, including criminal, civil and administrative liability. Compliance with the law is essential to avoid sanctions and other negative consequences.
Kanguru provides hardware-based encrypted USB drives and advanced remote management services that are certified to the highest standards, including government FIPS 140-2 and FIPS 140-3. These solutions ensure that an organization's data remains secure even in the most demanding environments.
Data protection rights of individuals
Every individual whose data is processed has a wide range of data protection rights. The right to data protection ensures that data is protected from unauthorized access, loss or unauthorized processing. Individuals also have the right to be informed about what data is being processed, for what purpose and by whom. An important entitlement is the ability to obtain a copy of the personal data being processed, allowing them to control their own information. In addition, the right to rectify data allows you to correct incorrect or outdated information, and the right to erasure and to be forgotten allows you to request erasure in certain situations. These rights are the foundation of data protection and are a guarantee that each person can actively manage his or her data in terms of data protection.
Protecting privacy and preventing identity theft
Increasing incidents of identity theft are affecting not only companies, but also individuals. Kanguru offers easy-to-use and affordable hardware-encrypted memory sticks that effectively protect sensitive data from unauthorized access, securing important documents, passwords, family photos, financial data and wills, all password-protected and stored away from the Internet.
User authentication and regular backups are key to preventing data loss. Backups play an important role in recovering from a disaster or attack, providing an additional level of security.
Integration with iStorage - the leader in security
In September 2024, Kanguru joined the iStorage group, significantly expanding its product portfolio to include certified top-level security solutions.
A backup and recovery strategy is critical to ensuring business continuity. iStorage offers services that comply with the highest data security standards, supporting effective recovery procedures in the event of system failure or information loss.
In December 2024, the iStorage diskAshur PRO+C became the world's first FIPS 140-3 Level 3 certified USB drive.
Remote management and monitoring of devices
One of the unique advantages of Kanguru Defender devices is the ability to remotely manage all encrypted USB drives in an organization.
Effective device management also requires adequate network security and the use of firewalls. Kanguru's management systems make it possible to ensure a high level of data security, protecting resources from unauthorized access. A data protection officer plays a key role in this process, monitoring compliance and training employees on data protection.
IT administrators can monitor the location of media, generate reports, block access and, if necessary, remotely delete data from lost or stolen devices, all from one convenient console.
Solutions tailored to different sectors
Medicine and healthcare
Kanguru supports medical facilities in complying with HIPAA, GLBA and other regulations with hardware-encrypted FIPS 140-2-certified USB devices.
Medical facilities very often process genetic data, which belongs to special categories of personal data. In such cases, it is necessary to appoint a data protection officer who is responsible for monitoring compliance and cooperating with supervisory authorities. The processing of such data also requires the patient's explicit consent, which is crucial to the legality of operations on sensitive data.
The security of patient and staff data is a priority, and additional protection against malware ensures effective security.


Financial sector and banking
Kanguru USB flash drives with AES-256 encryption and FIPS certification effectively protect financial data from cyber attacks and misuse.
As financial institutions process their customers' personal data, they are required to comply with the principles of the RODO. The responsibility of the data controller includes ensuring the security and compliance of data processing with applicable regulations, as well as responding to possible violations.
Remote management features help control and enforce security policies in any institution.
Education
Educational institutions can securely store student and employee data with affordable, hardware-encrypted Kanguru Defender devices.
When processing a child's personal data, educational institutions must obtain parental consent when using social media accounts and when downloading materials from the Internet. Under the provisions of the RODO, the protection of children's personal data requires specific formal requirements, especially when using social media accounts and downloading online materials.
Remote management makes it easier for administrators to protect data and enable quick action in case of media loss.


Energy and utilities
Kanguru provides not only hardware-encrypted devices, but also USB flash drives with digitally signed firmware to protect against "badUSB" malware attacks.
The protection of critical infrastructure requires the application of access control rules and the restriction of sharing personal data and sensitive information. The implementation of security procedures is carried out as directed by the data controller, who is responsible for compliance with applicable regulations and data protection rules.
This is an important support in protecting critical infrastructure from outside interference.
Small and medium-sized companies
For companies of all sizes, Kanguru offers enterprise-class security solutions that are both affordable and easy to use.
Small and medium-sized companies are increasingly using cloud services, so they need to back up regularly and plan effective data recovery procedures. Implementing strategies that include backup and recovery helps ensure business continuity even in the event of a system failure or loss of information.
Hardware encryption, remote management and additional accessories provide full data protection without sacrificing convenience.

Violations of RODO and the consequences for companies.
Violations of RODO can have serious consequences for any company that processes personal data. The consequences of a breach include not only heavy financial penalties, but also loss of customer trust, reputational damage and economic losses. In the event of a data breach, a company is obliged to inform both the individual to whom the data relates and the relevant data protection authority. The data controller must immediately take the necessary measures to reduce the impact of the breach, remedy the damage, and prevent similar incidents in the future. It is also crucial to appoint a data protection officer and keep a detailed record of data processing to effectively monitor and manage information security. Complying with the provisions of the RODO and implementing appropriate data protection measures is not only a legal obligation, but also part of building a competitive advantage and trust among customers.
Comprehensive data protection at home
Kanguru is not just a solution for businesses. With easy-to-use and secure hardware-encrypted USB flash drives, anyone can protect their finances, passwords, family photos and other private data.
Home users should remember to use authentication, which is a key component of security and allows users to verify their identities. In addition, network security, such as firewalls, is essential to protect against threats coming from the network and against unauthorized access and data loss.
The range also includes high-speed DVD and Blu-ray recording drives and media duplicators for easy archiving and file management.
Recommended devices
PRODUCT | DESCRIPTION | COMPLIANCE | ADDITIONAL FUNCTIONS | FIPS LEVEL. |
Kanguru Defender 3000™ | FIPS 140-2 certified, Level 3, brute force immunity, tamper-proof, AES-XTS 256-bit hardware encryption | RODO, Sarbanes-Oxley, GLBA, HIPAA, TAA | Waterproof, secure software | Level 3 (#2401) |
Kanguru Defender Elite300™ | FIPS 140-2, Level 2, AES-XTS 256-bit hardware encryption, physical write-protection switch | RODO, Sarbanes-Oxley, GLBA, HIPAA, TAA | Tamper-proof, digitally signed software | Level 2 (#2442) |
Kanguru Defender HDD350™ / SSD350™. | FIPS 140-2, AES-XTS 256-bit hardware encryption | RODO, Sarbanes-Oxley, GLBA, HIPAA, TAA | Level 2 (#2280) | |
Kanguru KRMC-Enterprise | Remote management of secure USB drives - local installation | RODO, Sarbanes-Oxley, GLBA, HIPAA, TAA | ||
Kanguru KRMC-Hosted | USB remote management - hosted by Kanguru | RODO, Sarbanes-Oxley, GLBA, HIPAA, TAA | ||
Kanguru FlashTrust™ | USB 3.0 without encryption with secure, digitally signed firmware | TAA | Ideal for environments with endpoint protection | |
Cloning and deleting data | NVMe, HDD, DVD, Blu-ray, USB cloning and data erasure devices according to NIST SP800-88 | TAA | Models: KCLONE-1HD-MBC, 7HDS-PRO, 15HDS-PRO, etc. | |
DVD/BD optical drives | DVD and Blu-ray Recorders | TAA | Secure firmware | |
Kanguru UltraLock™ | Superfast USB-C, HDD/SSD/M.2 NVMe drive with secure firmware and write lock switch | TAA | Digitally signed firmware |
iStorage devices with PIN protection and hardware encryption
PRODUCT | DESCRIPTION | COMPLIANCE | ADDITIONAL FUNCTIONS | FIPS LEVEL. |
iStorage datAshur PRO+C
|
USB-C, PIN, AES-XTS 256-bit, adapter to USB-A, IP68, dust and water resistance | Brute force, user and administrator PIN protection | FIPS 140-3, Level 3 (#4918) | |
iStorage datAshur PRO
|
USB-A, as above | NLNCSA DEP-V, NATO Restricted. | FIPS 140-3, Level 3 (#4918) | |
iStorage datAshur PRO2
|
USB-A, EAL5+ microprocessor | Brute force protection, IP68 | FIPS 140-2, Level 3 (#3793) | |
iStorage diskAshur3 SSD/HDD | PIN, USB 3.2, AES-XTS 256-bit encryption | TAA | User PIN, administrator PIN, emergency PIN | awaiting certification |
iStorage diskAshur PRO3 SSD/HDD | CAVP, USB 3.2 | TAA | User PIN, administrator PIN, emergency PIN | |
iStorage diskAshur DT3 | TAA | User PIN, administrator PIN, emergency PIN | ||
iStorage diskAshur M2 | EAL5+ microprocessor, PIN, USB 3.2 | TAA | User and administrator PIN |
Summary
Kanguru guarantees the highest level of data security - from large institutions and companies to the medical and education sectors and individual users. Hardware encryption, FIPS certification, remote management and a wide range of products make data protection simpler and more effective than ever before.