The Need for Speed

Is software encryption on a notebook with a Solid State Drive (SSD) a non-starter due to performance concerns?

This is a good question and I have heard it asked by some pretty smart people recently.

Introducing SecureDoc 6.1

In today’s world, Bring Your Own Device or BYOD has quickly become a reality that organizations have come to expect.  With over 76 per cent of employees using multiple devices, many of which are now owned by the individual not the organization, companies need to ensure that their corporate data is well protected.  The solution for this issue is SecureDoc 6.1. Data Encryption from WinMagic.

It’s a BYOD World Embrace It or Expire.

There is a great debate raging in the security industry today on how to best provide secure corporate data in a BYOD world. The consumerization of IT and bring-your-own-device (BYOD) are becoming prevalent in organizations at lightning speed, both with and without the knowledge of corporate IT departments.

When virtual environments get too heavy

When Virtual Environments Get Too Heavy

As an encryption security vendor that is working its way into Mobile Device Management (MDM), I’m fascinated and constantly looking at new ways to secure mobile devices and company information. As someone with a background in virtualized environments, I’m even more intrigued when companies like VMWare introduce solutions.

The importance of partners

Go to market strategies for vendors varies in approach whether it’s entirely direct, indirect or an amalgamation of both. WinMagic adheres to a hybrid approach that best matching the requirements of the customer or business practices within a given region.

It’s not as hard as you might think

I was reading an article from ITWorld this week that touched on the recent data breach at the South Carolina Department of Revenue. While I find this type of thing fascinating, I also find it scary when someone says something like this:

“The industry standard is that most SSNs are not encrypted… A lot of banks don’t encrypt, a lot of those agencies that you think might encrypt Social Security Numbers actually don’t, because it is very complicated. It is cumbersome and there’s a lot of numbers involved with it.” – South Carolina Governor Nikki Haley

Windows 8 is here! Now what?

As someone that’s worked in IT for the better part of 14 years, I’ve seen my fair share of product launches. When it comes to operating systems, it’s always a cyclical engine; big flurry of attention at launch followed by mixed reaction to the product.

Smart Cards, 10 Years Later – Part 2

In my last blog, I left off talking about the different forms of authentication and the abundance of solutions available to enable multi-factor authentication (based on the directive to increase security for user authentication into laptops).

Smart Cards, 10 Years Later – Part 1

Over the last decade we have seen technology advancements grow in all sectors.  For most of us, this is an “expectation” we look forward to:  what’s the next cool gadget this year and how does it work?  For businesses however, these new technologies are often viewed as:  a new requirement that we have to now meet in order to be compliant.  This usually means the solution is mandated to address one key design phase – “security”.  Security alone doesn’t advance technology; solutions must be innovative, easy to use, manageable, and sometimes even  cool!