The Online Evolution – WinMagic.com 3.0

A new year beckons and our new fiscal year is in full swing. With the change in year, comes a refresh of WinMagic.com. We’ve been working like crazy to update our Web site and make it easier for you, humble reader, to find what you need when seeking information on WinMagic’s full-disk encryption offerings.

Today we’ve formally launched the re-vamped WinMagic.com – which we’ve been referring to internally as WinMagic.com 3.0. We’ve gone through many revisions in the past decade and a half, but this is probably the most dramatic change we’ve ever made. What you’ll find now is better navigation, clearer language and, overall, much better aesthetics.

Everything is more simplified, clear and concise. We pride ourselves on how SecureDoc offers cost and time savings for IT administrators all the time, but our old, complex and cluttered Web site really contradicted that efficiency message. Not any longer.

You’ll now see bold colors, clean and uncluttered design helping you find what you need more quickly and in simpler language. Our goal with the new Web site was to not just get up to speed with the 21st century of Web design, but to also change how we talk to our existing and potential customers.

But don’t take my word for it, please go experience it yourself at www.winmagic.com!

Previous Post
Database Security
Next Post
Crypto-Currencies

Related Posts

620,000 reasons to encrypt

I’ve talked about it before and as an organization we’re constantly trying to tell people and organizations that encryption should be the first line of defense for data on portable devices such as laptops. And yet again, we’re seeing a…
Read more

Talking Security at SC Congress

Last week, we attended the SC Congress in Chicago, IL and walked away a little wiser and more informed. These events are always great to get a sense of what’s happening in the industry, what customers are concerned about and…
Read more

What’s the right choice?

We’re a huge proponent that Full Disk Encryption (FDE) is the cornerstone of any data security solution and should be the foundation for which all solutions should be built on. (more…)

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu