WinMagic Gets FIPS Validation
WinMagic's SecureDoc full-disk encryption technology receives FIPS 140-2 Level 1 and 2 validations
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
MISSISSAUGA, Ontario -- WinMagic® Inc. (www.winmagic.com), the innovative leader in full-disk encryption, is proud to announce that its SecureDoc solution for Microsoft Windows 2000/XP/2003 is the first full-disk encryption technology to receive FIPS 140-2 Level 1 and 2 validations from the U.S. National Institute of Standards and Technology and the Canadian Communications Security Establishment. As the only solution to enable government agencies and corporations to incorporate full-disk encryption that meets all Level 1 and 2 criteria within a complete security solution, SecureDoc is now uniquely positioned to meet the laptop security directive of the Office of Management and Budget (OMB) and the smart card requirements of HSPD-12.
“Already the first full-disk encryption vendor to pass DISA’s Joint Interoperability Test Command, WinMagic is proud to also be the first encryption developer to receive FIPS 140-2 level 1 and 2 validations,” said Thi Nguyen-Huu, CEO, WinMagic. “This prestigious security certification underscores WinMagic’s leadership position in standards-based encryption, and its commitment to provide customers worldwide with a simple and secure encryption solution that truly meets all international security mandates and policies.”
Perfectly suited to today’s mobile workforce, WinMagic’s award-winning SecureDoc full-disk encryption protects all data on desktops, laptops, and handheld devices by encrypting the entire hard drive before the operating system brings up the logon screen. SecureDoc’s “install-and-forget” preboot design simply replaces the Windows GINA with a SecureDoc log-on screen to not only provide real-time data protection that is completely transparent to the user, but also prevent intruders from bypassing the encryption level.
About the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024