Encryption Alphabet Soup

Learning a multiplicity of acronyms is pretty much a requirement for navigating any discipline. Every field has its own set of acronyms and the sequence of 3 or 4 letters that usually make up the acronym most likely has a completely different meaning from discipline to discipline. Even within a discipline it is common to see the acronyms muddled together.

Can your encryption solution do Pre-Boot Network-based Authentication?

If you have been reading the various blog posts we’ve published over that past few months you’ve seen us talk about: smart cards, cloud computing security, BYOD, MDM, FDE, FEE and more. What we really haven’t delved into is one of the main differentiators we offer in the market and the fact no one has be able to offer the same level of security – Pre-Boot Network-Based Authentication.

What’s your P@ssw0rd?

I know I’m a little late to the party, but recently I’ve been giving more and more thought to the passwords I use to access the various sites and tools I use on a day to day basis. The main reason I started thinking about this is because of Google’s introduction of the 2-step verification process and a recent article in Wired in which Google has declared ‘war’ on the Password.

How SEDs Really Work

I have been working with hardware and software encryption for well over a decade now and I have seen countless power point presentations on the advantages of hardware encryption over software encryption.  Transparency, performance and security are the big three.

Why Apple Matters in The Enterprise

It’s always interesting to get into the Mac vs. Windows debate as it relates to the Enterprise. For the longest time, the corporate IT stack was predominately Windows-based, but not any more. With the introduction of the iPhone and iPad, Apple has seen its reach within the enterprise slowly grow over the past few years. 

It Really Can Be That Easy

As I mentioned in my previous blog post, I used to run a small encryption team at a large organization before I came to work for WinMagic. One of the key responsibilities we had was to generate FISMA (Federal Information Security Management Act) compliance reports for NIST SP 800-53, AC-3 and SC-13 controls. What does that mean? Essentially, these are reports that ensure key security standard requirements are met within the organization for Government regulatory purposes.

Plotting world domination

Last week was a busy week for us WinMagic folks. As we’ve entered the new fiscal year for the company, so began our annual Sales & Marketing Kick-off event for our FY’13. It’s the event where the key customer and partner-facing teams get together and plot world domination of the data encryption and security market.

The Need for Speed

Is software encryption on a notebook with a Solid State Drive (SSD) a non-starter due to performance concerns?

This is a good question and I have heard it asked by some pretty smart people recently.

Introducing SecureDoc 6.1

In today’s world, Bring Your Own Device or BYOD has quickly become a reality that organizations have come to expect.  With over 76 per cent of employees using multiple devices, many of which are now owned by the individual not the organization, companies need to ensure that their corporate data is well protected.  The solution for this issue is SecureDoc 6.1. Data Encryption from WinMagic.