At WinMagic data protection is our strong suit and we often talk about it on this blog. At the same time it’s good to remember that ensuring security of data at rest using encryption and strong key management are just two important aspects of the larger picture of data security. In my next few posts I’d like to expand on other challenges an enterprise faces as part of the larger picture, the solutions and technologies that address those challenges and their potential links to encryption and key management.
WinMagic will be attending a number of different events over the next few months including our next Data Connectors event. Come and visit us at Data Connectors in Louisville, Kentucky on March 19th, 2014!
Last week we announced upcoming improvements to SecureDoc that we plan to deliver in the April timeframe. These enhancements include support for BitLocker and TCG Enterprise drives and we’re really excited about the value these new solutions will ultimately deliver to customers.
TPMs have been shipping for nearly 8 years now. WinMagic was an early adopter and supported TPM version 1.1 for full disk encryption before most. We expanded our support to the more main stream version 1.2 TPMs when they started shipping. Now more than 100 Million TPMs are out there in laptops and other devices, and soon many, many Version 2.0 TPMs will join them. TPM 2.0 and disk encryption will be a good topic for a future blog but today I am going to set the ground work on where we are today.
Over the weekend Bell announced that more than 22,000 SMB customers’ user data was compromised and posted online. So what was the source of the breach? A third-party supplier.
I’ve talked about it before and as an organization we’re constantly trying to tell people and organizations that encryption should be the first line of defense for data on portable devices such as laptops. And yet again, we’re seeing a huge data breach in Canada, this time in Alberta, due to a laptop being stolen and not being encrypted.
I have been asked several times what the difference between a TCG Opal and TCG Enterprise SED (Self-Encrypting Drive) is. From a specification perspective they are both outputs of the TCG Storage Work Group and both have their roots in the Trusted Storage Architecture Core Specification developed in the Storage Work Group.
Being an IT administrator can be very challanging, with many responsibilities ranging from making sure every employee has the proper working tools required to do their jobs to keeping corporate data safe. Some of the simplest tasks faced by IT Admins, such as password resets, can be very time consuming. In fact, IT Pros can spend as much as 20 minutes on a single employee password reset process. Depending on the size of the organization, that can add up over the course of a year.
As 2014 kicks off, WinMagic will be attending a number of different events over the next few months. In particular, we are excited to be attending our first Data Connectors of the year, being held at the Los Angeles Airport Marriott on January 23rd, 2014!
In late December it was revealed that RSA allegedly implemented flawed encryption technology to enable an NSA back door into its tokens. As a result of this, a few key speakers at this year’s RSA 2014 conference arebacking out of their speaking commitments in protest of RSA’s actions.
When we look at the number of clients we work with on a daily basis and the magnitude of industries they represent, it’s pretty easy for us recognize that companies in all verticals are now beginning to understand the importance of securing their data. Of course, there will also be more companies who subscribe to this belief given the nature of their business, the legislations they face and the data they handle on a frequent basis.