Kingston: ‘Hardware Encryption Makes Data Protection More Effective and Secure’

We interviewed Jordi García, Iberia Team Leader at Kingston in Spain, who analyses the evolution of enterprise storage to adapt to NIS2 and DORA regulations, which seek to increase the protection and privacy of corporate data.

Until recently, storage manufacturers devoted much of their efforts to developing hardware that offered more capacity to both consumers and businesses. Headlines were always full of figures in MB, GB and, more recently, TB.

It was a race to offer the highest possible capacity in a context where the data to be stored was growing at a frenetic pace.

Today, although this race continues, the truth is that traditional storage hardware manufacturers have had to add other features more related to data security and privacy to their messages, among other things to comply with regulations in this field and to prevent cyberattacks and information theft as far as possible.

Kingston is one of the first manufacturers to have long since begun incorporating these features beyond the capacity and density of data that can be stored on its drives, elevating these hardware devices to true storage solutions thanks to integrated software.

Jordi García, Iberia Team Leader at Kingston in Spain, discusses this with us, focusing on the current NIS2 and DORA regulations. Below is the interview with García:

—To get started, how is the enterprise storage business in Spain doing?

It is evolving towards a more cybersecurity- and compliance-focused approach. With the entry into force of regulations such as NIS2 and DORA, companies are prioritising encrypted storage solutions that guarantee data protection and operational resilience.

—Broadly speaking, what are the current priorities for organisations when selecting one technology over another?

The priorities are driven by the need to ensure data confidentiality, integrity and availability. Companies are looking for storage solutions that include advanced encryption, centralised management and protection mechanisms against unexpected power losses. In addition, compliance automation is key to ending dependence on complex manual processes.

—Why are traditional storage companies increasingly moving into the field of cybersecurity and regulatory compliance?

Due to the democratisation of technological tools, the digital threat ecosystem is constantly evolving. This is where NIS2 and DORA come into play to demand more advanced security standards. Storage-focused companies are broadening their vision to help other companies comply with these new regulatory frameworks, ensure the protection of the most sensitive information, and thus avoid financial penalties that can significantly damage companies’ accounts.

—Do you think there is a lack of offerings from other software manufacturers to cover these environments, or are these simply issues that storage manufacturers need to take more into account as part of their offerings?

It is not a question of a lack of supply. Vendors need to integrate advanced security solutions to have a value proposition that is adapted to the times. Why? Current regulations require a 360-degree approach to cybersecurity. This applies to both storage and data protection throughout the supply chain.

—How can encrypted storage solutions help companies comply with regulations such as NIS2 and DORA?

They protect sensitive information from loss or theft, so that it remains inaccessible to malicious actors. This is especially relevant in critical sectors such as finance, healthcare and defence, where data protection is a priority. In addition, advanced encrypted storage solutions facilitate the automation of regulatory compliance.

—What features should secure storage units have to adapt to these new cybersecurity standards?

Secure storage units must offer robust password management systems and comply with recognised security certifications, such as NIST’s FIPS certification. They must also offer advanced access control mechanisms and be capable of integrating into organisations’ long-term cybersecurity strategies.

—What advantages does hardware encryption offer over other data protection solutions?

Hardware encryption enhances data protection and security by performing encryption directly on the device, eliminating the need for external software. This reduces vulnerability to cybersecurity attacks and minimises the impact of potential cybersecurity breaches.

—How will data storage security evolve in the coming years, especially with increasingly strict regulations?

Data storage security will evolve towards a more proactive and comprehensive approach. Greater integration of regulations, such as NIS2 and DORA, into business strategies is expected, along with increased use of encryption and advanced authentication solutions. Cybersecurity will also be strengthened throughout the supply chain to ensure more comprehensive protection.

—What is Kingston’s strategy with its products in the field of cybersecurity and data protection?

To adapt to the new requirements of regulations such as NIS2 and DORA, one of the features that a USB drive must comply with is risk management. If a company considers itself high risk, it will need relevant password management systems or will require guidance from the relevant supplier. In this regard, the NIST FIP certificate is the benchmark.

The impact of NIS2 and DORA is beginning to be felt, but we expect their influence to go far beyond a mere reaction to regulatory requirements. Therefore, companies must integrate them into a long-term strategy to establish a culture of cybersecurity that permeates all levels of the company. This will be the best way to adapt to an increasingly interconnected world. Responding quickly and staying ahead of the curve will be crucial not only to comply with regulations but also to thrive in a world of increasingly complex challenges.

—What solutions are you providing to users, both consumer and corporate, to respond to these regulations?

We offer encrypted storage solutions designed to ensure data confidentiality, integrity and availability. There are solutions on the market with the ability to protect data from unexpected power losses and ensure that the drive restarts smoothly the next time the system boots up.

For corporate users, it is very important to have solutions that help automate compliance with regulations such as NIS2 and DORA, reducing dependence on manual processes and strengthening operational resilience. On the consumer side, we have devices with high security standards, including certifications such as NIST FIPS, which ensure that sensitive information remains protected against potential threats.