WinMagic’s exclusive partner newsletter captures channel activity across the globe and celebrates the achievements of our respected partners.

What’s to come in 2015!

Employees at almost every company use cloud services like DropBox or Box to store and share files. IT departments understand that these services provide significant value and aid productivity, but they worry about data going beyond the firewall.

WinMagic brings peace of mind.

No matter where the data resides, WinMagic’s SecureDoc for Cloud ensures that files are always encrypted at the end point before they are ever moved into a cloud service, thus removing the risks of any data breaches in the cloud. Furthermore, with keys centrally managed by WinMagic’s SecureDoc Enterprise Server, we make lives easier for IT and security administrators. It’s peace of mind, centrally managed, regardless of the cloud sharing service a company is using.

A new set of tools, SecureDoc Cloud Lite (SDCL), is now available to synchronize encrypted data to Cloud Service providers, as well as providing the ability for end users to access and decrypt such files on Windows and IOS devices using a new set of decryption tools collectively called SecureDoc FileViewer.

To learn more about SecureDoc Cloud Lite refer to your WinMagic representative. We look forward to launching this exciting new enhancement in this coming year!


Securing Data With BitLocker, Without the Cost

Even the “freest” of features bring costs. A case in point is Microsoft’s BitLocker solution. While popular as a method for encrypting data at rest, BitLocker is arguably not free even though it is included within certain editions of the Windows 7 and Windows 8 desktop operating systems.

WinMagic dramatically reduces BitLocker’s management costs and hardware requirements, as SecureDoc can manage BitLocker-enabled environments.

WinMagic recently published a white paper outlining why SecureDoc is the best way to manage BitLocker, including detail on how SecureDoc saves money and makes lives easier for IT pros and end users.

DOWNLOAD NOW. The white paper is available for free online.

As a general summary, here are two ways SecureDoc reduces unexpected costs companies experience when deploying BitLocker.

First, each BitLocker-enabled system requires a Trusted Platform Module (TPM) chip in order to access all of BitLocker’s features. Adding a TPM chip to every device in an organization to fully realize BitLocker’s benefits is a significant investment at roughly $30 per machine—and an IT person must visit each machine to configure and enable the chip.

With SecureDoc, no TPM chip is necessary.

Second, BitLocker only manages data security on Windows machines and devices. The reality of today’s enterprise is far more complicated, and the loss of any device—including those running Linux, Android or Apple iOS—could be disastrous. In addition, IT teams at many companies are opting to deploy modern self-encrypting drives (SEDs) that further simplify and enhance data security. Deploying BitLocker for free means paying for other methods to manage security on non-Windows devices and SEDs.

With SecureDoc, customers no longer have to choose how and what to do for data encryption within their organization. SecureDoc offers a single console—one expense for one solution—to manage encryption on BitLocker-enabled machines, SEDs or non-Windows devices.

In many other ways, SecureDoc provides value to the company deploying BitLocker, both in terms of cost and technology advantages that make a SecureDoc environment a more secure environment. Additional details are available in the new whitepaper.


Back to contents

Bring Your Own Everything Merging the Way We Do Business

Bring Your Own Device (BYOD) affects organizations of all sized everywhere as the technological landscape advances and business demands proliferate. However, an evolution of this trend is emerging as Bring Your Own Everything (BYOx). This shifts focus from just personal devices being used in the enterprise to include other applications such as mobility, cloud computing, data analytics and applications.

Consumerization of these products and services in the enterprise is a growing phenomenon that cannot be ignored by IT. Evidently, in a study on 2014 Consumerization of IT in the Enterprise, conducted across IDG Enterprise brands, results revealed that 90% of “consumer or individual (ie. LinkedIn, Skype)” cloud-based services are currently being used by employees within their organization, WITH or WITHOUT approval of IT at 49 percent and 41 percent, respectively.

This is significant as it demonstrates the attractive consumer value that executives see in utilizing personal devices and applications at work; furthermore, keeping the enterprise competitive in a growing and technologically demanding marketplace. Executives are taking advantage of consumer tools to more efficiently reach customers, prospects and partners. Frank Gens, Chief Analyst from IDC, reveals in a study conducted in collaboration with UNISYS, polling over 3,000 iworkers & executives in nine countries, there exists an evident “consumerization gap” namely from visibility challenges. Gens states in his overview, “IT pros underestimated employee use of consumer devices by 50 percent and use of social network for customer communication by almost 40 percent,” which does provide obvious transparency challenges for IT management and data security.

It’s important to bring up these discussions with customers and apply our collective expertise to the advancement of policy, compliance and consultancy as alliances within this industry. By sympathizing with the immense challenge of the IT manager, our products and services will continue to evolve to serve them better. To learn more about how WinMagic can optimize BYOD environments, click here.


Back to contents

FY2015 Key Vision Predictions – Discussion Points

WinMagic’s, Garry McCracken, Vice President of Technology Partnerships, spots data security trends and adopts these into the development of our products. His astute insights derive from 30 years of experience in data communications and information security, and commitment to our partnerships while incorporating new technologies into WinMagic solutions. Below are some consideration points from Mr. McCracken’s FY2015 Key Vision Predictions:

Self-Encrypting Drives (SEDs) are the Future

The rise of Self-Encrypting Drives (SEDs) will be a major trend that emerges in 2015 with adoption rates increasing and eventually completely overtaking software encryption.

What this means for your customers? Consider hardware based encryption such as SEDs. Many software based solutions, such as BitLocker, still benefit from optimized management, which SecureDoc does. However, in hardware based encryption implementation is faster and saves on the Total Cost of IT Ownership. It is advantageous for your customers to adopt SEDs as the hardware method of encryption outweighs in data security on the platforms of performance, transparency and security. Here are some talking points on how:

  • Performance—Software based encryption can initially take hours, with SEDs the encryption process can be reduced to minutes, because in hardware based encryption, it’s all done in the actual storage device instead of the CPU.
  • Transparency—there is no need to run software in the OS in hardware based encryption. This reduces any potential interference or conflict with other software existing in the CPU.
  • Security—in software based encryption the key is inside the computer’s memory which can be attacked directly. In hardware based encryption the key is inside the drive, thus never leaving the drive. This makes it harder to crack or retrieve after a crypto erase scenario.

Demand for Endpoint Key Management Encryption Solutions will Rise

Endpoint centric key management encryption solutions will emerge with wide popularity as the exposed data breaches make the enterprise realize that the encryption must take place on the endpoint before the data goes to the cloud.

What this means for your customers? Sensitive information shared on popular cloud applications is not often prescreened by the IT department. As employees access cloud applications, IT managers ought to have visibility. Arguably, the value of utilizing cloud services is much higher because it is so convenient; thus, it is inevitable that people will upload data on the cloud. So instead of storing keys in the cloud, where it may be exposed to a rogue administrator, using a key management system to keep the keys returns control back to the IT manager of the enterprise.

Talk to your WinMagic Representative about the upcoming SecureDoc Cloud Lite to learn more on how to empower your customers in this scenario.

NVMe Self-encrypting Drives will affect the Peripheral Component Interconnect Express (PCIe)

Eventually NVMe Self-encrypting drives will completely supersede SATA SEDs because of their advantages, primarily speed.

What this means for your customers? There may be security challenges with software based encryption as it may not be able to keep up with the speed of NVMe. Hardware based encryption is much faster and potentially has more capability to keep up with the standard. In explaining to your customers, you may use this analogy, when entering an eight lane highway, it is much faster coming from a four lane road instead of a one lane road due to bottleneck. Software based encryption is the one lane road; whereas, hardware base encryption is the three lane road, fast and efficient.

To read more about NVMe and Self-Encrypting Drives, click here.



Back to contents


Leave a Comment


Angel Massey-Singh

About Angel Massey-Singh /

Angel is a marketer, a mom and maniacal about monkeys. She was the Vice President of Marketing at WinMagic.
Angel Massey-Singh