RSA 2017: Protecting Data Everywhere

The RSA Conference began in 1991 as a forum for cryptographers to gather and share the latest industry knowledge. In 1997 – just 6 years later – WinMagic launched into the data security market – offering software full disk encryption. Since then, similar to the RSA Conference agenda, WinMagic has continued to push the art of security forward, bringing encryption and intelligent key management to new markets and new heights.  As we celebrate our 20th year anniversary, we have the same mindset we had when we started out – to protect data no matter where it resides. However now, more so than ever, data has become the lifeblood of the modern world – from banking to education – it’s everywhere. And the surface area of data has expanded across a wide variety of devices, platforms and operating systems, making it more and more difficult to secure.

Protecting Data Privacy: a Shared Responsibility

Data Privacy Day is a reminder that the privacy of data – corporate and personal – increases in importance year after year. And it’s amazing that this year, on January 28th, Data Privacy Day turns 10. You may recall another interesting announcement that occurred in January 2007 – the introduction of the Apple iPhone. Perhaps this was sheer coincidence, or maybe this was the foresight to know that the dawn of rapid data collection and sharing by individuals was about to create an evolution of data security challenges we’d never witnessed before.

The Journey to EU GDPR

The EU General Data Protection Regulation was adopted in April 2016 and will, after two-years of transition, be applied starting May 2018.  As we head fast into 2017, it would be easy to start thinking that there is still over a year left before your company must be compliant, but how much have you done to get ready in the last eight months?  Probably in all reality, not as much as you would like.

Enabling the IT Security Admin

Organizations should have total control over their data security environment to ensure maximum security and transparency. A key consideration for any security product, however, is that managing it should not turn into a full-time job.

Proactively Secure Your Cloud Deployments And Keep Control Of Your Data

When you move into a new place, one of the first things you do is change all the locks. It’s important to your sense of security that you control who has access to your home. Changing the locks just makes logical and practical sense. This same logic should also be applied to your business thinking when you are looking to secure your sensitive information in a new environment or an environment you don’t fully control.