When downtime is not an option

February 2004 Cyber Security, Security Services & Risk Management

Magic Card is a powerful, instant recovery system technology for your PC. It provides you with the ultimate protection from any form of corruption or unwanted modification, accidental or intentional damage to your hard drive, hacking, viruses, tampering, and most other kinds of accidents including formatting.

It installs in under a minute, protects any size disk, takes no disk space, supports up to eight partitions, holds no data on the card and best of all it performs everything in 'realtime' just by restarting your computer.

Magic Card is a hardware-based PCI card that provides several levels of protection to an organisation's infrastructure and easily integrates into your existing environment. Magic Card's uniqueness resides partially in an original algorithm that converts system data into a binary code and combined with an exclusive dynamic buffer system, places the information in the optimum location on your hard drive. Developed over five years by a top senior level security and computer engineering team specialising in recovery solutions, the Magic Card provides unparalleled system recovery protection.

For more information contact Pentagon, 011 793 6106/8, sales@pentagon.co.za, www.pentagon.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The year resilience paid off
Issue 8 2020 , Editor's Choice, Security Services & Risk Management
Hi-Tech Security Solutions spoke to Michael Davies about business continuity and resilience in a year when everything was put to the test.

Read more...
Dahua’s cybersecurity approach
CCTV Handbook 2021, Dahua Technology South Africa , Cyber Security
The world is getting smarter and everything is going to have an online ID and then connect into a vast network of IoT devices, like a laptop computer, a mobile phone, a connected thermostat and more.

Read more...
Dahua Technology’s cybersecurity approach
Issue 3 2021, Dahua Technology South Africa , CCTV, Surveillance & Remote Monitoring, Cyber Security
With a mindset that emphasises cybersecurity and all the resources it can allocate to establish, carry out and strengthen its cybersecurity approach, Dahua plans to stay positive, open, responsible and constantly improving its cybersecurity.

Read more...
SASE-enriched threat protection
Issue 3 2021 , Cyber Security
MVISION XDR automates security investigation and response processes with actionable threat insights harnessed from deeply integrated cloud data sources, with the ability to proactively stop targeted attacks.

Read more...
Active Adversary Playbook 2021
Issue 3 2021 , Cyber Security
Sophos has released its Active Adversary Playbook 2021, detailing cyber-attacker behaviours and the tools, techniques and procedures Sophos’ frontline threat hunters and incident responders saw in the wild.

Read more...
Passwords are 60, time for them to go
Issue 3 2021 , Access Control & Identity Management, Cyber Security
It has been 60 years since passwords were first used at MIT and if the number of breaches in the news are anything to go by, we are no more adept at managing our passwords than we were in 1961.

Read more...
Top 10 security misperceptions
Issue 3 2021 , Cyber Security, Security Services & Risk Management
The Sophos Rapid Response team has compiled a list of the most commonly held security misperceptions they’ve encountered in the last 12 months while neutralising and investigating cyberattacks in a wide range of organisations.

Read more...
The supply chain of the future
Issue 3 2021 , Integrated Solutions, Security Services & Risk Management, Retail (Industry)
For retailers to maximise their bottom line, the supply chain needs to be fast, efficient and responsive, which requires the use of intelligent, integrated technology.

Read more...
Surveillance business models are changing
CCTV Handbook 2021, Technews Publishing, Eagle Eye Networks, Bosch Building Technologies, Dahua Technology South Africa, Genetec , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure
The CCTV Handbook round table highlighted the changes that are happening in the surveillance and security world in general, from cloud to costing models and of course, cybersecurity.

Read more...
Drones: One aspect of an integrated security strategy
CCTV Handbook 2021, Technews Publishing, Bidvest Protea Coin , CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Security Services & Risk Management
Drones are an excellent tool in one’s safety and security arsenal in the never-ending fight against crime, but they are only a tool, one of many needed for an effective security solution.

Read more...