Monday, January 16, 2012

TÜV Rheinland i-sec announces strategic partnership with WinMagic

TORONTO, CANADA & COLOGNE, GERMANY: WinMagic, the prominent innovator in disk encryption, announced that after evaluating all major encryption vendors TÜV Rheinland i-sec GmbH, a provider of IT-security solutions based in Cologne, Germany, has added WinMagic’s SecureDoc with PBConnex to its portfolio of products.

TÜV Rheinland selected WinMagic due to its consistent leadership position in mobile data security. WinMagic’s SecureDoc with PBConnex, the only full-data encryption solution with wireless pre-boot networking, is the latest example of WinMagic’s data protection innovation.

“As a vendor neutral provider of security solutions we are always searching for innovative and business relevant security solutions,” said Olaf Siemens, MD, TÜV Rheinland i-sec. “In WinMagic we have found a partner who offers a solution which provides major benefits for our customers due to its high security standards and low administration complexity.”

“TÜV Rheinland i-sec is a very important strategic partner for WinMagic as it brings both an excellent reputation and global security expertise,” said Georg Gann, director DACH and Eastern Europe, WinMagic GmbH “With offices worldwide, TÜV Rheinland is an ideal partner to further expand WinMagic’s global market reach.”

PBConnex, a feature of SecureDoc, authenticates users and encrypted devices against Microsoft (Nasdaq: MSFT) Active Directory and the SecureDoc Enterprise Server in the pre-boot environment – before the key to decrypt and load the operating system is available. As passwords can be reset directly in Active Directory, users are spared a lengthy password reset procedure – greatly simplifying use and administration by making it easy to instantly log on to new systems.

PBConnex also eliminates the need to replicate user access credentials onto devices and, if previously required, the need to set up separate password reset mechanisms for other full-disk encryption solutions – making it just as easy for users to access a network from an encrypted device as an unencrypted device.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.