WinMagic 2017-01-14T21:38:19+00:00

WinMagic Overview

WinMagic Inc. develops full-disk encryption software. Its SecureDoc line of products ensures protection of sensitive information stored on desktops and laptops by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot time. WinMagic’s award winning products fulfill the requirements of even the most security conscious users by focusing on concrete security features, nevertheless still offering unparalleled flexibility.

Videos

LATEST NEWS

  • EU GDPR – The Final Countdown
    <p>In May 1986, a little-known Swedish band called Europe released their international breakthrough album, The Final Countdown – topping the charts in 25 countries. Thirty years later in May 2016, the European Commission released the official EU General Data Protection Regulation (GDPR) – another international breakthrough with a far greater global impact, albeit on the […]</p> <p>The post <a rel="nofollow" href="https://www.winmagic.com/blog/2017/05/25/eu-gdpr-final-countdown/">EU GDPR – The Final Countdown</a> appeared first on <a rel="nofollow" href="https://www.winmagic.com/blog">SecureSpeak | WinMagic Data Security Blog</a>.</p>
  • The Increase of Data and Compliance Regulations – How Can Businesses Best Keep Pace?
    <p>Data flow is evolving from the ground up – quite literally – with Big Data, the Cloud and IoT changing the way we store, process and share information. But with the rapid growth of data – expected to reach 44ZB by 2020 according to IDC – comes an exponentially larger surface area for hacks, attacks, […]</p> <p>The post <a rel="nofollow" href="https://www.winmagic.com/blog/2017/05/18/increase-data-compliance-regulations-can-businesses-best-keep-pace/">The Increase of Data and Compliance Regulations – How Can Businesses Best Keep Pace?</a> appeared first on <a rel="nofollow" href="https://www.winmagic.com/blog">SecureSpeak | WinMagic Data Security Blog</a>.</p>
  • The Requirement for Security Independence in a Virtualized (or Cloud) (or Virtual) World
    <p>As we evolve more and more to complete self-contained services like the mainstream Cloud services of Microsoft, Amazon, IBM and Google, I often express concerns about the Cyber aspects being coupled.  Enterprises and users are, if they haven’t already, getting more and more comfortable with giving up their physical/virtual servers, applications and storage but are […]</p> <p>The post <a rel="nofollow" href="https://www.winmagic.com/blog/2017/05/11/requirement-security-independence-virtualized-cloud-virtual-world/">The Requirement for Security Independence in a Virtualized (or Cloud) (or Virtual) World</a> appeared first on <a rel="nofollow" href="https://www.winmagic.com/blog">SecureSpeak | WinMagic Data Security Blog</a>.</p>

TWITTER


CONTACT INFORMATION

Contact Us