Vendors
WinMagic
WinMagic's SecureDoc software will ensure that you feel secure & protected.

WinMagic Inc. develops full-disk encryption software. Its SecureDoc line of products ensures protection of sensitive information stored on desktops and laptops by employing authentication from password to hardware token, biometrics, and PKI commencing right at pre-boot time. WinMagic’s award winning products fulfill the requirements of even the most security conscious users by focusing on concrete security features, nevertheless still offering unparalleled flexibility.

 

Visit vendor homepage: http://www.winmagic.com/

SecureDoc Enterprise Server

WinMagic's SecureDoc Enterprise Server (SES) offers organizations total control over their data security environment ensuring maximum security and transparency in regular work flow.  With industry-leading full disk encryption (FDE) technology and industry-first technology like PBConnexTM, SES enables customers to streamline their IT processes and as a result, help reduce the total IT cost of ownership.

SecureDoc CloudSync

No matter where the data resides in the cloud, SecureDoc CloudSync ensures that files are always encrypted at the end point before they are ever moved into a cloud service, thus removing the risks of any data breaches in the cloud.
WinMagic’s cloud solution spans across multiple platforms, i.e. users are able to share encrypted data between Windows, Mac, iOS, and Android users. Encrypted data can be shared transparently between users having access to the same encryption key (i.e. no passwords required), and passwords can be set to share data externally. In addition, FileViewers are available for iOS, and Android platforms to allow encrypted data to be shared with non-SecureDoc CloudSync users.
Encryption keys and cloud policies are managed centrally by SecureDoc Enterprise Server (SES) to provide full control to IT administrators over data security. This also provides peace of mind to C level executives since encryption keys are not controlled by third parties and the fact that IT administrators can easily recover encrypted data.

//