WinMagic 2017-01-14T21:38:19+00:00

WinMagic Overview

WinMagic Inc. develops full-disk encryption software. Its SecureDoc line of products ensures protection of sensitive information stored on desktops and laptops by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot time. WinMagic’s award winning products fulfill the requirements of even the most security conscious users by focusing on concrete security features, nevertheless still offering unparalleled flexibility.

Videos

LATEST NEWS

  • The Key to Protecting Data, Featuring Gartner
    <p>If there is one absolute truth in business, it’s that data is now everywhere. Big or small, companies wrestle with keeping data secure with an ever expanding mobile and agile workforce. Increasingly companies are turning to endpoint encryption as the answer to protecting their data. “Endpoint Encryption is a fundamental point of defense in preventing […]</p> <p>The post <a rel="nofollow" href="https://www.winmagic.com/blog/2017/06/27/key-protecting-data-featuring-gartner/">The Key to Protecting Data, Featuring Gartner</a> appeared first on <a rel="nofollow" href="https://www.winmagic.com/blog">SecureSpeak | WinMagic Data Security Blog</a>.</p>
  • 4 Keys to Building an Independent Support Team
    <p>Recently I was on a call with a customer where one of my Team Leads and the Support Agent did most of the talking. Part way through the call, the customer asked me why I wasn’t saying anything. My response was that both my Team Lead and Support Agent had a plan that made sense […]</p> <p>The post <a rel="nofollow" href="https://www.winmagic.com/blog/2017/06/20/4-keys-building-independent-support-team/">4 Keys to Building an Independent Support Team</a> appeared first on <a rel="nofollow" href="https://www.winmagic.com/blog">SecureSpeak | WinMagic Data Security Blog</a>.</p>
  • The 6 Point Security Spring Cleaning Checklist
    <p>As an enterprise, you should not need an occasion to ensure that your security practices are up-to-date, fine-tuned and resilient. However, when immersed in the day-to-day it’s easy to overlook or neglect some of the standard best practices to securing your environment. The first signs of spring seem to trigger an inherent need to clean, […]</p> <p>The post <a rel="nofollow" href="https://www.winmagic.com/blog/2017/06/15/6-point-security-spring-cleaning-checklist/">The 6 Point Security Spring Cleaning Checklist</a> appeared first on <a rel="nofollow" href="https://www.winmagic.com/blog">SecureSpeak | WinMagic Data Security Blog</a>.</p>

TWITTER


CONTACT INFORMATION

Contact Us