WinMagic Observations from Infosecurity Europe 2013

Last week, WinMagic joined thousands of other security and technology vendors and professionals at the annual Infosecurity Europe 2013 event in London, UK and made some insightful discoveries from customers and those in the industry.

We shared our ‘hot-off-the-press’ Ponemon Phase II Report which covered the differences between hardware and software full disk encryption and it was extremely well received.  Many were fascinated with the savings of hardware encryption solutions especially with Self Encrypting Drives (SEDs) and were curious to find out whether we offered solutions that could help them manage SEDs.  More and more, we see companies starting to adopt SEDs as part of their security strategy for laptops and are looking to have better management and control with SEDs along with the other devices they are encrypting within the organization.

Continuing on the topic of managing different devices, Bring Your Own Device (BYOD) continues to be a popular trend and an ongoing struggle for organizations to manage.  In particular, some of the reoccurring questions we heard included:

  • What control can you have as an organization other than protecting the data on the device?
  • Should I be able to see what someone is doing with their smartphone when it is not a corporate device?
  • What types of tools are available so that I can encrypt the device but not disrupt the performance of the device?

Luckily for our visitors (and us!), we were able to show them a quick demo of how WinMagic could help support a BYOD strategy and manage SEDs and other devices including smartphones, tablets and removable media.

Overall, we were excited to be at Infosecurity to help educate the market and show people what solutions were out there to help manage the many emerging technologies within security and encryption. We found there was a definitive knowledge gap – people knew what they wanted their security and encryption strategy to be, but had no idea how to approach it.  Once people saw what type of solutions were out there and how easy our solutions were to use, they seemed very enthusiastic to continue the conversation so that they could continue to further their security strategy.

It’s always a pleasure to attend Infosecurity every year and we are definitely looking forward to continue these conversations with our prospects and head back to Infosecurity in 2014!

Previous Post
Come one, come all
Next Post
So much to do so little time

Related Posts

Florida Gets Serious With Data Privacy

July 1st was a big day in Florida if you’re a follower of info security news. That was the day Florida’s new Florida Information Protection Act (FIPA) came into effect and had immediate consequences for anyone that does business in…
Read more

Making the Case for Data Encryption

In August, we released the results of a survey we did with the Ponemon Institute where we examined the Total Cost of Ownership (TCO) for data encryption. To make this information even clearer, we’ve now created a handy, easy to…

Educating Employees Help Keep Data Secure

With the growing world of technology, the IT manager is plagued with the grueling task of technology audits. Audit checks are carefully planned, controls are tested and evaluated, and then reports help identify problem areas to work on. The method…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Contact Us

This will close in 0 seconds