Previously I had been talking about BYOD and the hardware implications for businesses and their IT departments; the headaches, the challenges, the costs.
In today’s world, Bring Your Own Device or BYOD has quickly become a reality that organizations have come to expect. With over 76 per cent of employees using multiple devices, many of which are now owned by the individual not the organization, companies need to ensure that their corporate data is well protected. The solution for this issue is SecureDoc 6.1. Data Encryption from WinMagic.
There is a great debate raging in the security industry today on how to best provide secure corporate data in a BYOD world. The consumerization of IT and bring-your-own-device (BYOD) are becoming prevalent in organizations at lightning speed, both with and without the knowledge of corporate IT departments.
As an encryption security vendor that is working its way into Mobile Device Management (MDM), I’m fascinated and constantly looking at new ways to secure mobile devices and company information. As someone with a background in virtualized environments, I’m even more intrigued when companies like VMWare introduce solutions.
I was reading an article from ITWorld this week that touched on the recent data breach at the South Carolina Department of Revenue. While I find this type of thing fascinating, I also find it scary when someone says something like this:
“The industry standard is that most SSNs are not encrypted… A lot of banks don’t encrypt, a lot of those agencies that you think might encrypt Social Security Numbers actually don’t, because it is very complicated. It is cumbersome and there’s a lot of numbers involved with it.” – South Carolina Governor Nikki Haley
Over the last decade we have seen technology advancements grow in all sectors. For most of us, this is an “expectation” we look forward to: what’s the next cool gadget this year and how does it work? For businesses however, these new technologies are often viewed as: a new requirement that we have to now meet in order to be compliant. This usually means the solution is mandated to address one key design phase – “security”. Security alone doesn’t advance technology; solutions must be innovative, easy to use, manageable, and sometimes even
I attended the TCG (Trusted Computing Group) annual members meeting last week in beautiful Vancouver and thought I would share a couple of observations.
First of all, a little background – The TCG is an organization whose mandate is to set security standards for commercial use. The scope ranges from small mobile devices to large disk drives used in the enterprise. Key participants (about 100 in person this year) include: the PC OEMs (e.g. Lenovo, HP, Dell, etc.), OSVs (e.g. Microsoft), component manufacturers (e.g. disk drives, TPMs…), governments and ISVs. That’s where WinMagic comes in. We are an Independent Software Vendor and a member of the Storage Work Group (SWG). The SWG is responsible for the “Opal” specification for self-encrypting hard drives (SEDs), as well as, the specification for the larger “enterprise” drives.
Last Wednesday, we officially launched our new WinMagic website and we’re very excited to have had some great feedback already, from our customers and partners around the globe. Our new website features a complete redesign with an easier navigation structure to allow our visitors to find the content they are looking for quickly and easily. We’ve also remodeled the WinMagic home page so that our most popular content relating to the latest and greatest in the security and encryption world is prominently displayed.
It was a good event, well attended and there was great turnout at the session I presented at. What really resonated though was the nodding heads when walking through the information. Engaging the audience is always important when presenting, but getting agreement on key findings and data in general, is always refreshing if not comforting. It helps validate what we did, why we did it and why we think it’s important.
It’s always staggering when we speak with our clients how many people are actually on their encryption team and how much time and effort they spend just trying to get things right. Are you any different? How many people are on your encryption administration team? How much time do they spend on user management?
The evolution of technology goes at a breakneck pace. Whether it’s new products coming to market or updates to existing products – it’s a never-ending cycle.
As a software company that supports multiple Operating Systems (OS), we’re no different and one of the common questions I’m asked has to do with releasing product updates to support various OS updates.
Being a software company focused on Mobile Data Protection (MDP) means we’re constantly trying to evolve our products and services. And according to Gartner Inc. that’s paying off as once again we were recognized as a Visionary in their annual MDP Magic Quadrant report!
To see how we rank, read on.
What I’d like touch on today with this post is a common misconception about data encryption and security. When I tell people who I work for and what we do, many people assume what we do is protect people from hackers. If people use our software the various security breaches people hear about would be prevented. I’d like to say that we could prevent any kind of hacks etc. but it simply isn’t true.