Sharing is Caring!

We’d like to believe part of the reason WinMagic is successful comes from listening and focusing on our customers.   We’re always more than pleased when we open up questions to solicit our customer’s and prospect’s feedback on product enhancements, features and general pain points they are looking to solve.  Quite often, our customers provide a fresh perspective that we haven’t even thought of before which sparks that “Eureka!” moment.

So why not do the same for our marketing/industry materials?  Tell us what you’d like to know – anything related to security, encryption, data protection etc.  It could be a specific question that’s weighing on your mind or perhaps you’d just like to learn more about a topic to put together a security initiative/business case for your organization.  Whatever it is, we’d like to know!

Answer these quick questions by simply leaving us a comment in the ‘Comments’ section:

What would you like to see more of from WinMagic from a content perspective?

  • Security trends and best practices
  • Encryption trends and best practices
  • Encryption and security basics
  • How to secure data within my organization
  • Security vendor requirements
  • Other (please specify)

In what format would you like these topics to be in?

  • eBooks with lots of images
  • Whitepaper with lots of technical terms
  • Videos
  • Graphics and artwork
  • Cost Benefit Calculators  with clear ROI figures
  • Case Studies/success stories
  • Other (please specify)

We want you to find value in the content we generate.  Your support has been outstanding and we appreciate any perspective you can give.

Previous Post
An innovative approach – CIOSynergy
Next Post
What is going on in Healthcare?

Related Posts

RSA Conference

Five Observations from RSA 2018

I once again had the pleasure and privilege to attend the RSA Security conference in San Francisco, CA. rsaconference.com/events/us18. The conference keynotes, sessions and sidebar conversations were a good opportunity to see what the hot topics in security are. I…

6 Best Practices for Secure Health Information

Holistic, comprehensive security strategies, centered on protecting data, not devices, are easier than ever thanks to current encryption technology. According to a recent Ponemon Institute study, over the last five years healthcare organizations have slowly increased their investment in data…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu