-
"We chose WinMagic because of the unparalleled support provided during the initial pre-installation stages. The combination of application support, hardware support, ease of use and most importantly – ROI – made our decision to select SecureDoc easy."
-
“MagicEndpoint is truly pioneering the future of authentication. It’s only a matter of time before outdated methods like SMS and push notifications are completely obsolete—they’re known to be vulnerable to phishing, sim-swapping, and other widely used malicious techniques. MagicEndpoint’s technology is sound, and its ‘No User Action’ approach and elimination …
-
"SecureDoc's sector based encryption is smart. It sits at the lowest level and intercepts all requests to read and write to the disk, so the entire disk is encrypted and no sectors are missed. With strong, trusted encryption algorithms, SecureDoc has a clean design."
-
"Of the products we evaluated, only WinMagic's SecureDoc was really capable of meeting all our requirements right out of the box."
-
“SecureDoc has enabled us to integrate data encryption with smart card authentication to protect all data on laptops without complicating the log-on process for authorized users.”
-
“We selected WinMagic Inc’s SecureDoc, McAfee Inc’s SafeBoot and Utimaco Safeware AG’s SafeGuard Device Encryption for a comprehensive Proof of Concept."
-
"For two months, we researched five different solutions based on numerous criteria, of the products we evaluated, only WinMagic’s SecureDoc was really capable of meeting all our requirements right out of the box, It had the flexibility to integrate with our existing technologies while its versatile installation options meant that …
-
"We could not have had better assistance from WinMagic’s support staff. Each time we asked for a new feature or modification, WinMagic came through very quickly, By seamlessly encrypting the entire hard drive at pre-boot, SecureDoc has enabled this bank to securely combine two previously-separate networks to provide remote users …
-
"We have already completed the roll out of 900 laptops. We roll out around 60 users a week, and ensure each receives two hours of technology and corporate responsibility training when they get their new laptop. We haven’t received a single user complaint.”
-
"EDC’s Corporate Mobility Initiative meant replacing desktops with 1200 laptops to provide clients worldwide with the most productive working environment. This meant replacing our existing encryption with an enterprise-class solution that would ensure all data was protected if a laptop is lost or stolen and also enable administrators to centrally …
-
"We have had a laptop loss since deploying the software so in that respect it has already paid for itself by ensuring the data could not be accessed, There have been a number of highprofile data losses recently and we have no intention of joining those companies, SecureDoc protects us …
-
"SecureDoc ensures that no unauthorized user can access Suva’s internal data, makes it simple for authorized users to access information, and has proved simple to integrate with all virus scanners, backup systems, and compression programs, And, there has been no noticeable performance degradation to the user in day-to-day computer operations, …
-
"As a world-recognized think tank of security experts providing consulting, training, and briefings to highly-prestigious corporations and government agencies around the world, including Amazon, Microsoft, and the National Security Agency, Black Hat is in a unique position to evaluate all security solutions available, Entrusted with highly-sensitive customer information, Black Hat …
-
"WinMagic listens to our feedback on management functionality, SecureDoc always provided outstanding data protection, but has worked hard to greatly improve the management console which now makes it much easier to centrally deploy the software as well as to make any patches and configuration changes, This is proving invaluable as …
-
"As SecureDoc integrates with all devices at pre-boot users do not have to deal with a second log-in screen. This transparency means that as far as users are concerned their laptops operate exactly the same with the encryption installed as they do without encryption."