When downtime is not an option

February 2004 Cyber Security

Magic Card is a powerful, instant recovery system technology for your PC. It provides you with the ultimate protection from any form of corruption or unwanted modification, accidental or intentional damage to your hard drive, hacking, viruses, tampering, and most other kinds of accidents including formatting.

It installs in under a minute, protects any size disk, takes no disk space, supports up to eight partitions, holds no data on the card and best of all it performs everything in 'realtime' just by restarting your computer.

Magic Card is a hardware-based PCI card that provides several levels of protection to an organisation's infrastructure and easily integrates into your existing environment. Magic Card's uniqueness resides partially in an original algorithm that converts system data into a binary code and combined with an exclusive dynamic buffer system, places the information in the optimum location on your hard drive. Developed over five years by a top senior level security and computer engineering team specialising in recovery solutions, the Magic Card provides unparalleled system recovery protection.

For more information contact Pentagon, 011 793 6106/8, sales@pentagon.co.za, www.pentagon.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Work from home securely
Issue 5 2020 , Cyber Security
First Consulting provides enterprise-level IT security to working-from-home employees at more than 40 South African organisations.

Read more...
Agility, meticulous alignment and testing
Issue 5 2020 , Cyber Security
Data loss can put the nails in the coffin for unprepared businesses. Investing in cyber resilience is key to succeed in the age of digital transformation.

Read more...
Cybersecurity comment: A holistic approach to threat vulnerability
Issue 5 2020 , Cyber Security
Any organisation, whether large or small, public or private, should follow an established framework in order to protect itself against cyber threats.

Read more...
Email security in COVID-19 times
Issue 5 2020 , Cyber Security
MJ Strydom, MD of cybersecurity specialist company, DRS, takes a look at email security in the era of COVID-19 and beyond.

Read more...
June 2020’s most wanted malware
Issue 5 2020 , Cyber Security
Check Point Research finds sharp increase in attacks using the Phorpiex Botnet delivering new ‘Avaddon’ ransomware via malspam campaigns.

Read more...
60% in SA victim to public cloud cybersecurity incidents
Issue 5 2020 , Cyber Security
Ransomware and malware, exposed data, compromised accounts, and cryptojacking to blame; GDPR shows promise with Europeans suffering least.

Read more...
Vodacom Business enhances cyber resilience
Issue 5 2020 , Cyber Security
Partnership with Cloudflare will allow Vodacom Business to offer DDoS protection and traffic acceleration for all network infrastructure — whether on-premise, cloud-hosted, or in a hybrid environment.

Read more...
Tax season often equals tax scams
Issue 5 2020 , Cyber Security
While many of us cannot wait for our refunds, this is also a time of the year when cybercriminals are waiting to attack.

Read more...
Cybersecurity comment: Cyber threats remain relentless
Issue 5 2020, CA Southern Africa , Cyber Security
Over 80% of email-based threats in Q1 2020 leverage COVID-19 in some form to feign legitimacy to the end user.

Read more...
11 essential steps to reinforce cybersecurity
Issue 5 2020 , Cyber Security
Wayne Olsen has compiled a guideline to ensure that businesses and their employees are protected while working remotely.

Read more...