Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/23/2009
08:37 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

WinMagic, Intel Team On Anti-Theft Technology

By collaborating with Intel on Anti-Theft, WinMagic will combine data protection with tamper-resistant asset protection and theft deterrence

San Francisco, California and Toronto, Ontario - September 23, 2009 - WinMagic' (www.winmagic.com), the innovative leader in disk encryption, today announced an agreement with Intel Corporation (NASDAQ: INTC), to support Intel' Anti-Theft Technology (Intel' AT). Combining WinMagic's SecureDoc full-disk encryption with Intel AT will provide organizations worldwide with fully-integrated data protection and laptop theft deterrence.

WinMagic plans to deliver a comprehensive enterprise notebook security solution that combines SecureDoc full-disk encryption with Intel AT enabled notebooks.

By collaborating with Intel on Anti-Theft, WinMagic will combine data protection with tamper-resistant asset protection and theft deterrence.

WinMagic's integrated security offering will leverage the robust hardware-based capabilities of Intel AT to enable stronger data protection.

WinMagic's SecureDoc will integrate with the local and remote theft detection mechanisms provided by Intel AT during pre-boot and normal operation to ensure that data cannot be accessed by an unauthorized user.

If an Intel AT enabled laptop is lost or stolen it can be disabled.

When the notebook is reported as stolen or lost, WinMagic's integrated solution will support local and remote theft detection mechanisms to not only disable the victim's notebook (Intel AT) but also prevent the unauthorized user from accessing the data on the stolen notebook (SecureDoc FDE). By using the hardware hooks on Intel AT enabled platforms, the thief will not be able to access the data even if the user credentials are compromised. In addition, the data cannot be retrieved since Intel AT binds the data to the particular platform.

If the laptop is recovered and the theft condition is cleared, the PC can easily be re-activated locally utilizing a pre-provisioned user password or via a remote server-generated reactivation code. Since the data on the recovered laptop is not deleted and the protection is non-destructive, the data can be securely retrieved upon routine pre-boot authentication.

Intel AT is a scalable hardware-based theft deterrence solution that can disable the PC and access to its data when potential theft or loss is detected locally or via a remote notification.

WinMagic is a leader in data-at-rest encryption. As a comprehensive enterprise solution, its FDE solution suite offers strong single or multiple factor authentication while managing the heterogeneous nature of an enterprise IT architecture. SecureDoc provides one integrated enterprise management console to handle everything data-at-rest encryption related including the presence of a SED (self encrypted hard drive), the encryption of removable media, the management of Windows-based clients (7/Vista/XP) and Mac clients, password rules and recovery, the labeling of encryption keys, the synchronization with Active Directory and the dynamic management of encryption keys.

SecureDoc also supports and manages hardware-encrypted disk drives such as the Seagate' MomentusT FDE and BlackArmorT drives as well as the TCG "Opal" specification drives. This provides organizations with the flexibility to deploy any combination of hardware/software-based encryption - or transition between the two - with full transparency for users and a consistent management interface for administrators. This not only makes it easy to customize data protection to meet any security protocol, but also 'future-proofs' investment in encryption.

"According to the 2008 Ponemon Cost of a Data Breach Studies, compromised customer records in the U.S. costs a company $202 per record while in the U.K. the cost is £60 per record," said Thi Nguyen-Huu, CEO of WinMagic Inc.

"This partnership makes it simple to implement comprehensive data protection practices to ensure a lost or stolen laptop does not provide unauthorized access to company data," Nguyen-Huu continued. "The collaboration with Intel on Intel AT is the latest in a long line of WinMagic initiatives which make it just as simple to use and manage encrypted devices as unencrypted devices."

"This collaboration with WinMagic sets a new ease-of-use and ease-of-management benchmark for data security," said George Thangadurai, Director of Intel's Strategy and Platform Planning Group, and General Manager of the company's Anti-Theft Program. "Now, organizations looking to deter PC theft and, more importantly, protect the data inside - the loss of which can be catastrophic to a business - have a simple and intuitive solution that seamlessly combines two best-of-breed technologies."

"Protection in portable devices such as laptops, must constantly stride the fine line of ensuring accessibility by authorized users and preventing unauthorized access in any form when lost or stolen," said Eric Ouellet, Vice President, Secure Business Enablement at Gartner. "Integrated approaches leading to platform lockdown that severely undermine the usability and value of a stolen or lost device provide strong deterrence."

Garry L McCracken, CISSP, Vice President Technology Partnerships at WinMagic will participate in the Panel (PROP001), "Benefits of Intel Anti-theft Technology," at the Intel Developer Forum (IDF 2009) in San Francisco on Wednesday, September 23, 2009 at 1:05 p.m. PST.

About WinMagic Inc.

WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions. Compatible with all editions of Microsoft Windows 7, Vista, XP, and 2000 as well as Mac and Linux platforms, WinMagic's SecureDoc protects sensitive data stored on servers, desktops, laptops and removable media, such as USB thumb drives and CD/DVDs. Thousands of the most security conscious enterprises and government organizations around the world depend on SecureDoc to minimize business risks, meet privacy and regulatory compliance requirements, and protect valuable information assets against unauthorized access. With a full complement of professional and customer services, WinMagic supports over three million individual SecureDoc users in approximately 43 countries. For more information, please visit www.winmagic.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...
CVE-2021-3197
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.