Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

WinMagic Releases v5 of Full-Disk Encryption Solution

Comprehensive Full-Disk Encryption Solution Helps Organizations Deploy, Maintain and Manage Data Security Protection Transparently Across Multiple Platforms

Full-disk encryption software provider WinMagic today launched the latest release of its full-disk encryption solution that helps organizations seamlessly data protection with existing security policies on Windows 7 (32 and 64 bit)/Vista/XP, Mac OS X Tiger/Leopard/Snow Leopard and/or Linux platforms.

Comprehensive Full-Disk Encryption Solution Helps Organizations Deploy, Maintain and Manage Data Security Protection Transparently Across Multiple Platforms

Full-disk encryption software provider WinMagic today launched the latest release of its full-disk encryption solution that helps organizations seamlessly data protection with existing security policies on Windows 7 (32 and 64 bit)/Vista/XP, Mac OS X Tiger/Leopard/Snow Leopard and/or Linux platforms.

WinMagic SecureDoc Full Disk EncryptionThe latest release, WinMagic SecureDoc v5, features a single integrated enterprise console for policies and profiles which provides support for Microsoft Windows (including Windows 7 64 bit), Mac OS and/or Linux support, OPAL Self-Encrypting Drives (SED), Full-Disk and File Folder Encryption, removable media encryption, portable and secure USB encryption (no additional software installation or administration access rights required) and Intel Anti-Theft Technology.

The software enables users to centrally-manage self-encrypting drives, including Seagate Drive Trust Momentus hard drives and Opal compliant drives and enables deployment of sector-based full-disk encryption, file-and-folder encryption, container encryption, and self-extractor encryption. In the event a password is lost or the user is unavailable, SecureDoc v5 utilizes centralized escrow and management of encryption keys to ensure critical data can be accessed.

SecureDoc v5 also adds full-disk encryption and encryption management to Intel Anti-Theft Technology (Intel® AT) – a laptop theft deterrence mechanism enabling organizations to issue a “poison pill” to disable stolen laptops whether or not they are connected to the internet – ensuring data cannot be accessed before a laptop is disabled, even if the hard drive is removed and installed on another computer.

SecureDoc v5 enables administrators to create and securely share key files (or encryption policies) as well as link SES profiles with specific users or specific Windows/Mac devices. Utilizing the software’s audit functionality, administrators can track data security down to the individual user or device level.

Enhanced features for Mac OS X users, including Password Synchronization; support for self-help, challenge/response data recovery; an automatic encryption option for removable media that expedites conversion time; an Auto Login (AutoBoot) feature; and the OS Picker, which enables access to an external recovery/repair CD/DVD from an encrypted Mac.

An all-new intuitive dashboard enables administrators to set and send security policies to desktops, laptops, tablets and USB devices – ensuring any user’s selected device is protected by transparent data encryption that complies with all existing security protocols. The dashboard provides a single interface which enables administrators to customize user profiles, installation packages and global options within the SecureDoc Enterprise Server (SES). By synchronizing Microsoft’s Active Directory with SES, key files can be dynamically provisioned so encrypted data stores can be securely shared with only authorized users without entering passwords, ensuring maximum productivity and data security.

New productivity-enhancing features in v5 include built-in wizards which enable users to customize personal settings to make it easy to securely transfer data between their desktop/laptop and their removable media as well as functionality which enables users to ‘drag-and-drop’ files in and out of encrypted Windows, Mac and Linux folders. Additionally, a portable secure media viewer allows third-party users with the correct password to securely view files or folders on a USB without key files or the need to install software.

Advertisement. Scroll to continue reading.

New File Folder Encryption (FFE) for USB devices enables users to combine FDE with FFE to maximize Personal Identifiable Information (PII) security. Once granted exclusive or shared access to a secure folder, a SecureDoc client can encrypt folders on the local or network drive – enabling users that share a unique group key to securely share files and folders without a password.

Related Content: Samsung Announces USB 3.0 Drives With Hardware Encryption

Related Content: Sophos Launches Full Disk Encryption for Mac

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.