WinMagic’s exclusive partner newsletter captures channel activity across the globe and celebrates the achievements of our respected partners.
CONTENTS
12 Ways to Manage BitLocker Better Using SecureDoc
Ease of Use
- Individual user accounts instead of device PINs
SecureDoc users can log onto their devices with one password, reducing additional PIN authentication steps. Multiple users with BitLocker only, have to “share” or remember multiple PINs for their devices. However, SecureDoc allows for multiple users on the same device with unique passwords; whereas, BitLocker alone has less flexible pre-boot options and does not support multiple users at pre-boot. - Single-Sign-On
After logging on to the pre-boot phase, SecureDoc can log the user into the operating system automatically. This eliminates additional login steps (BitLocker PIN + Windows verification) when the user starts the computer.
Administrative Ease
- Easy password reset
SecureDoc communicates with Active Directory directly and reduces the complex steps usually involved in password resets. Without SecureDoc, Windows and BitLocker PIN-based password reset procedures are complex, slow and not user friendly. - Simplified administrative access & control over devices
On SecureDoc, Administrators can log on all computers. Thus, no knowledge of a device PIN or recovery password is required. With BitLocker, the user would have to notify the administrator the PIN or the recovery password making administrative processes more complex and slow. - Trusted Platform Module (TPM) administration
BitLocker requires a TPM chip. It must be physically activated in the BIOS and enabled by the operating system. This technically adds complexity and increases burden on IT administrators as TPM adds extra steps for device recovery. However, SecureDoc can manage everything with or without TPM.
Compliance & Reporting
- SecureDoc offers comprehensive reports which tracks whether a device was encrypted using stolen
- SecureDoc encryption cannot be overridden by a Windows Administrator
BitLocker can be deactivated and decrypted by an administrator in Windows.
Centralized management
- All SecureDoc protected computers can be managed from a central console
Optional Smart Card application
- SecureDoc offers the opportunity for specific devices / users the optional use of smart cards
PBConnex autoboot
- SecureDoc’s PBConnext feature runs background software updates when the device isn’t in use to authenticate with autoboot as long as a device is on the network
BitLocker cannot do this on its own.
Comprehensive Networks
- SecureDoc supports not only Windows but also Mac and other operating systems; whereas, BitLocker is Windows specific
- Self-Encrypting Drives
SecureDoc supports the management of self-encrypting drives (OPAL 1 and 2 standard) Allowing for a heterogeneous device environment under one console.
SecureDoc replaces the pre-boot phase of BitLocker with our inclusive PBConnex. Therefore, the above-listed product features are a great way of illustrating all the possibilities of using SecureDoc for managing BitLocker.
Campaign Overview – Retail Sector
October — the dawn of the autumn season in Canada also sparks a new campaign in the Retail sector.
Consumer retail transactions are increasingly cashless. More and more people are switching to debit and credit cards, or even their mobile phones, to pay when they shop, rather than carry cash. Consumers are paying with cards that require a four-digit Personal Identification Number (PIN) or nothing more than a quick tap on a Point-of-Sale (POS) terminal with the assumption their personal data and their bank balances are safe.
As data security experts, we are aware that this trend in purchasing comes with challenges in security, often times misunderstood by retailers.
Partners will be given the opportunity to understand these challenges and protect their customers. Various collateral and webinars will be made for registration later this month which include insight into the following hot topics:
- Overview of the retail landscape
- In real life – recent breaches, ramifications of breaches
- Where are the threats?
- For those retail organizations already utilizing some form of data security strategy, what else are the additional points of weakness?
- Key drivers for data security in retail (e.g. regulations for compliance)
- Best practices to securing these threats (Data security strategy)
Keep an eye out for emails deployed by WinMagic in the next coming weeks for all the above information.
Securing the Law Firm
2014 September 9 — London — WinMagic teams up with OISG for the fourth edition of Securing the Law Firm. This event is the leading e-crime and information security forum specifically aimed at key IT security decision-makers in legal services. Welcoming an audience of over 100 professionals, it is the largest gathering of its kind. In consideration of the challenging position these IT professionals hold; including, protecting the law firm’s reputation, setting technology strategy, and ensuring compliance in the protection of sensitive data; this event offered practical guidance and strategic insights through a balance of educational seminars and expert presentations. Whether it is espionage, insider risk, or insecure transfer platforms, the threats facing law firms are great. Delegates also have the chance to network and exchange insights about the latest industry developments in an invitation-only environment.
Given the latest developments in the UK, the Information Commissioner’s Office (ICO) warning barristers and solicitors to keep personal information secure as a result of 15 data breaches involving members of the legal profession. The ICO can serve a monetary penalty of up to £500,000 for a serious breach of the Data Protection Act, provided the incident had the potential to cause substantial damage or distress to the affected individuals.
WinMagic wanted to raise awareness, so Mark Hickman, COO, took the stage outlining these important security themes:
- Understand the great risk that comes with great flexibility—protecting business critical data stored on mobile devices
- Implement a holistic framework to illustrate different levels of data security
- Keep a technical focus—Examine options in pre-boot authentication, management of self- encrypting drives and centralised management of heterogeneous IT-infrastructures
- Successfully operating enterprises are ready to secure their business critical data anywhere and at anytime
This was an insightful event that surely made its mark on the law sector in the United Kingdom. The education focused application to data security and lead generation allowed us to relate to our law customers in a meaningful way, as seen by partners OISG, who manned the stand at the event and talked to numerous attendees during the event.
Tackling Next Generation Data Security Challenges
2014 August 20 — New Delhi — Approximately 87 government sector customers and partners gathered at Park Hotel, Parliament St, Connaught Place for the Tackling Next Generation Data Security Challenges event. WinMagic hosted, alongside new distributor Amtrak, with partners ACPL and Hitachi in attendance. ACPL was invited for the lamp lighting ceremony and to give the valedictorian note. Hitachi attended as a prospective partner.
The purpose of the event was to navigate through the Data Encryption Maturity Model and how to tackle next generation data security challenges. Customers and partners received a sneak peek at global data security trends for 2015 and explored how Fortune 500 organizations are solving data security challenges today. All of which was followed up with a robust questions and answer session with WinMagic’s, Mark Hickman, COO of WinMagic.
All in all, this event was an existing first step towards data security education in India, specifically for the government, and our partnership with Amtrak. We hope to see the region flourish with opportunity and innovation security in India.