TagsBIOS Bring Your own device BYOD cloud compliance Computer and Network Security Data breach Data Encryption data protection data security data security software disk encryption software Encryption encryption software FDE FileVault 2 Full Disk Encryption Gartner IT security network security program network security solutions Opal PBConnex Ponemon RMCE RME RSA SC Congress SecureDoc Secure Doc 6.1 SecureDoc 6.1 securedoc enterprise server security security breaches SED Self-Encrypting Drives Self Encrypting Drive software encryption SSD TCG TCO theft UEFI Windows 8 WinMagic
Category Archives: General
I had the pleasure and privilege of attending the RSA security conference in San Francisco last week. With 25,000 attendees it was the biggest RSA conference ever. There were so many exhibitors that they opened up a second building for … Continue reading
Last week at RSA Conference 2014 we announced the results of a Harris Poll survey we commissioned. It was an interesting process and the data it revealed was not altogether surprising, but the main conclusion one draws from it is … Continue reading
Last week we announced upcoming improvements to SecureDoc that we plan to deliver in the April timeframe. These enhancements include support for BitLocker and TCG Enterprise drives and we’re really excited about the value these new solutions will ultimately deliver … Continue reading
TPMs have been shipping for nearly 8 years now. WinMagic was an early adopter and supported TPM version 1.1 for full disk encryption before most. We expanded our support to the more main stream version 1.2 TPMs when they started … Continue reading
WinMagic is a global organization that’s seeing a lot of success in market today. With success comes growth and we continue to see strong market demand in Europe, Middle East and Africa (EMEA) and India. We’ve had solid presence in … Continue reading
Pre-boot Network Authentication (PBNA). It’s a technology we’ve been talking about for the better part of a couple of years now, but now it’s really starting to take off.
Over the weekend Bell announced that more than 22,000 SMB customers’ user data was compromised and posted online. So what was the source of the breach? A third-party supplier.
One of the more common IT headaches in medium to large sized organizations is managing mixed environments. It’s not just different operating systems and software applications but also devices of various form factors, be it servers, desktops, laptops, tablets and … Continue reading
Data encryption and security management seems like an easy thing to talk about, implement and manage day to day, but the fact is, there’s always a learning curve.
I’ve talked about it before and as an organization we’re constantly trying to tell people and organizations that encryption should be the first line of defense for data on portable devices such as laptops. And yet again, we’re seeing a … Continue reading