It’s always interesting to get into the Mac vs. Windows debate as it relates to the Enterprise. For the longest time, the corporate IT stack was predominately Windows-based, but not any more. With the introduction of the iPhone and iPad, Apple has seen its reach within the enterprise slowly grow over the past few years.
As I mentioned in my previous blog post, I used to run a small encryption team at a large organization before I came to work for WinMagic. One of the key responsibilities we had was to generate FISMA (Federal Information Security Management Act) compliance reports for NIST SP 800-53, AC-3 and SC-13 controls. What does that mean? Essentially, these are reports that ensure key security standard requirements are met within the organization for Government regulatory purposes.
Last week was a busy week for us WinMagic folks. As we’ve entered the new fiscal year for the company, so began our annual Sales & Marketing Kick-off event for our FY’13. It’s the event where the key customer and partner-facing teams get together and plot world domination of the data encryption and security market.
This post is going to be a lot of shameless self-promotion for WinMagic but it’s something we think is important as it’s tied directly to the recent launch of SecureDoc 6.1.
Previously I had been talking about BYOD and the hardware implications for businesses and their IT departments; the headaches, the challenges, the costs.
In today’s world, Bring Your Own Device or BYOD has quickly become a reality that organizations have come to expect. With over 76 per cent of employees using multiple devices, many of which are now owned by the individual not the organization, companies need to ensure that their corporate data is well protected. The solution for this issue is SecureDoc 6.1. Data Encryption from WinMagic.
There is a great debate raging in the security industry today on how to best provide secure corporate data in a BYOD world. The consumerization of IT and bring-your-own-device (BYOD) are becoming prevalent in organizations at lightning speed, both with and without the knowledge of corporate IT departments.
As an encryption security vendor that is working its way into Mobile Device Management (MDM), I’m fascinated and constantly looking at new ways to secure mobile devices and company information. As someone with a background in virtualized environments, I’m even more intrigued when companies like VMWare introduce solutions.
I was reading an article from ITWorld this week that touched on the recent data breach at the South Carolina Department of Revenue. While I find this type of thing fascinating, I also find it scary when someone says something like this:
“The industry standard is that most SSNs are not encrypted… A lot of banks don’t encrypt, a lot of those agencies that you think might encrypt Social Security Numbers actually don’t, because it is very complicated. It is cumbersome and there’s a lot of numbers involved with it.” – South Carolina Governor Nikki Haley
Over the last decade we have seen technology advancements grow in all sectors. For most of us, this is an “expectation” we look forward to: what’s the next cool gadget this year and how does it work? For businesses however, these new technologies are often viewed as: a new requirement that we have to now meet in order to be compliant. This usually means the solution is mandated to address one key design phase – “security”. Security alone doesn’t advance technology; solutions must be innovative, easy to use, manageable, and sometimes even
I attended the TCG (Trusted Computing Group) annual members meeting last week in beautiful Vancouver and thought I would share a couple of observations.
First of all, a little background – The TCG is an organization whose mandate is to set security standards for commercial use. The scope ranges from small mobile devices to large disk drives used in the enterprise. Key participants (about 100 in person this year) include: the PC OEMs (e.g. Lenovo, HP, Dell, etc.), OSVs (e.g. Microsoft), component manufacturers (e.g. disk drives, TPMs…), governments and ISVs. That’s where WinMagic comes in. We are an Independent Software Vendor and a member of the Storage Work Group (SWG). The SWG is responsible for the “Opal” specification for self-encrypting hard drives (SEDs), as well as, the specification for the larger “enterprise” drives.
Last Wednesday, we officially launched our new WinMagic website and we’re very excited to have had some great feedback already, from our customers and partners around the globe. Our new website features a complete redesign with an easier navigation structure to allow our visitors to find the content they are looking for quickly and easily. We’ve also remodeled the WinMagic home page so that our most popular content relating to the latest and greatest in the security and encryption world is prominently displayed.
It was a good event, well attended and there was great turnout at the session I presented at. What really resonated though was the nodding heads when walking through the information. Engaging the audience is always important when presenting, but getting agreement on key findings and data in general, is always refreshing if not comforting. It helps validate what we did, why we did it and why we think it’s important.
It’s always staggering when we speak with our clients how many people are actually on their encryption team and how much time and effort they spend just trying to get things right. Are you any different? How many people are on your encryption administration team? How much time do they spend on user management?