BASH Shellshock has been all over the news lately, and has come to the attention of our security conscious customers (which is pretty much all of them.) There are lots and lots of blogs out there on it, a Wikipedia article and even a dedicated site.
Next week we head to Boston, MA for the Campus Technology 2014 event. With a number of key customers that are in the education space, we have a solid grasp of the needs and complexity of dealing with data encryption in education.
At the end of June, WinMagic had the opportunity to attend Gartner’s 2014 Security & Risk Management Summit. After many sessions, meetings and cocktail receptions, we walked away a little wiser and informed. Over the next few weeks I’ll delve into some of the sessions we attended, and share some stuff we learned from them. But for this blog post, I thought it would be good to share some key highlights/data that we took in from the event.
As previously mentioned, yesterday, we released the latest version of SecureDoc and among key enhancements SecureDoc can now manage BitLocker-enabled environments. For Microsoft IT pros, this means that you can deploy BitLocker and encrypt data at rest in a more secure way than the alternatives without creating headaches for you or your users.
Last week we announced upcoming improvements to SecureDoc that we plan to deliver in the April timeframe. These enhancements include support for BitLocker and TCG Enterprise drives and we’re really excited about the value these new solutions will ultimately deliver to customers.
TPMs have been shipping for nearly 8 years now. WinMagic was an early adopter and supported TPM version 1.1 for full disk encryption before most. We expanded our support to the more main stream version 1.2 TPMs when they started shipping. Now more than 100 Million TPMs are out there in laptops and other devices, and soon many, many Version 2.0 TPMs will join them. TPM 2.0 and disk encryption will be a good topic for a future blog but today I am going to set the ground work on where we are today.
Over the weekend Bell announced that more than 22,000 SMB customers’ user data was compromised and posted online. So what was the source of the breach? A third-party supplier.