22 WinMagic Testimonials

Industry
Company Size
15 per page
  • 15
Reset
  • "We could not have had better assistance from WinMagic’s support staff. Each time we asked for a new feature or modification, WinMagic came through very quickly, By seamlessly encrypting the entire hard drive at pre-boot, SecureDoc has enabled this bank to securely combine two previously-separate networks to provide remote users …

  • "Of all the file encryption solutions we tested, only WinMagic fully met our document security needs. SecureDoc was able to provide transparent file encryption on our file servers to ensure only authorized users can access information, while keeping the user experience exactly as it was prior to applying encryption. SecureDoc …

  • "People tend to think of encryption as nothing more than data protection, but once information is secure we are free to focus entirely on our number one priority – providing the best possible care for our patients."

  • "We have spent considerable time to evaluate disk encryption products for integration with our VPN solution for mobile professionals - Thales Trusted VPN. Based on a very strict evaluation focusing on fulfillment of a combination of requirements to international security standards, functionality, user-friendliness and price, we decided to go for …

  • "SecureDoc's sector based encryption is smart. It sits at the lowest level and intercepts all requests to read and write to the disk, so the entire disk is encrypted and no sectors are missed. With strong, trusted encryption algorithms, SecureDoc has a clean design."

  • "I evaluated several vendors and was overwhelmed by the performance, ease of use, and level of security your product provided. The centralized management really makes a difference! Thanks again."

  • "WinMagic listens to our feedback on management functionality, SecureDoc always provided outstanding data protection, but has worked hard to greatly improve the management console which now makes it much easier to centrally deploy the software as well as to make any patches and configuration changes, This is proving invaluable as …

  • “We selected WinMagic Inc’s SecureDoc, McAfee Inc’s SafeBoot and Utimaco Safeware AG’s SafeGuard Device Encryption for a comprehensive Proof of Concept."

  • “MagicEndpoint is truly pioneering the future of authentication. It’s only a matter of time before outdated methods like SMS and push notifications are completely obsolete—they’re known to be vulnerable to phishing, sim-swapping, and other widely used malicious techniques. MagicEndpoint’s technology is sound, and its ‘No User Action’ approach and elimination …

  • "Of the products we evaluated, only WinMagic's SecureDoc was really capable of meeting all our requirements right out of the box."

  • "SecureDoc ensures that no unauthorized user can access Suva’s internal data, makes it simple for authorized users to access information, and has proved simple to integrate with all virus scanners, backup systems, and compression programs, And, there has been no noticeable performance degradation to the user in day-to-day computer operations, …

  • "Data encryption is no longer a ‘nice to have’ for law firms; it’s a necessity."

  • "For two months, we researched five different solutions based on numerous criteria, of the products we evaluated, only WinMagic’s SecureDoc was really capable of meeting all our requirements right out of the box, It had the flexibility to integrate with our existing technologies while its versatile installation options meant that …

  • "We have already completed the roll out of 900 laptops. We roll out around 60 users a week, and ensure each receives two hours of technology and corporate responsibility training when they get their new laptop. We haven’t received a single user complaint.”

  • "EDC’s Corporate Mobility Initiative meant replacing desktops with 1200 laptops to provide clients worldwide with the most productive working environment. This meant replacing our existing encryption with an enterprise-class solution that would ensure all data was protected if a laptop is lost or stolen and also enable administrators to centrally …