It was a good event, well attended and there was great turnout at the session I presented at. What really resonated though was the nodding heads when walking through the information. Engaging the audience is always important when presenting, but getting agreement on key findings and data in general, is always refreshing if not comforting. It helps validate what we did, why we did it and why we think it’s important.
It’s always staggering when we speak with our clients how many people are actually on their encryption team and how much time and effort they spend just trying to get things right. Are you any different? How many people are on your encryption administration team? How much time do they spend on user management?
The evolution of technology goes at a breakneck pace. Whether it’s new products coming to market or updates to existing products – it’s a never-ending cycle.
As a software company that supports multiple Operating Systems (OS), we’re no different and one of the common questions I’m asked has to do with releasing product updates to support various OS updates.
Being a software company focused on Mobile Data Protection (MDP) means we’re constantly trying to evolve our products and services. And according to Gartner Inc. that’s paying off as once again we were recognized as a Visionary in their annual MDP Magic Quadrant report!
To see how we rank, read on.
What I’d like touch on today with this post is a common misconception about data encryption and security. When I tell people who I work for and what we do, many people assume what we do is protect people from hackers. If people use our software the various security breaches people hear about would be prevented. I’d like to say that we could prevent any kind of hacks etc. but it simply isn’t true.
Welcome to WinMagic’s blog!
If you’ve found this page, you’re interested in data security, encryption and discussions of that type, and that what I’m going to focus on. WinMagic is going to talk about what is happening in the security market, analyze issues, breaches, technology advancements and more.