DataLocker

Their Story | DataLocker | A Conversation With Jay Kim

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Jay Kim

How do organizations ensure that those devices (and related ports) don’t get misused and abused — especially when there are 10s of thousands of users, each potentially with multiple external devices?

That’s where centralized management comes into play, giving IT leaders and business owners the ability to define and enforce acceptable use policies aligned with their business needs and their risk appetite. Listen to today’s story by Jay Kim as he shares some detailed use cases.

Their Story At Hacker Summer Camp | Las Vegas 2019 | Jay Kim, DataLocker

A Their Story interview with Sean Martin & Marco Ciappelli
Guest: Jay Kim, CEO and Founder | DataLocker

For today’s story, Sean and I connect with a former pharmaceutical IT professional and now-CEO of DataLocker, Jay Kim. While focused on IT problems, Jay found himself in the crosshairs of the Y2K phenomenon and got a real taste for what the “A” meant in the information security CIA Triad (Confidentiality, Integrity, and Availability). As a consequence of his choice to be in IT, Jay found himself on a business trip where he met an engineer with a novel idea about manufacturing secure external hard drives.

The idea turned into a patented, secure external hard drive device that was a platform-independent device with a built-in keypad used for authentication—meaning all the users had to do was plug it in and type in their passcode to access the data on the drive. With this, the company, DataLocker, was formed.

There’s a decent amount of story told by Jay covering the years following their FIPS-validated product in 2009, and I would encourage you to listen to hear how the business was, founded and funded, how the team grew, and how the product line and overall solution set was enhanced. Listen up. We think you will find some inspiring words here.