Knowledge is Power

SDM Technologies believes that the easiest way to educate is by sharing, providing deep value by discussing the tough problems we are facing while on the path to solutions.

Check out the latest posts

Compliance in Secure Computing

When choosing a secure technology solution, users consider factors such as usability, flexibility, and scalability to help determine which product best fits their needs. Features that promote security and privacy also play a significant part of the decision-making process. Another consideration is security compliance. Standards and approval bodies such as...

Advantages of Global Service

To stay connected during travel, that typically means swapping device SIM cards upon arrival at your destination or being shocked by roaming charges upon return. It also means the uncertainty (panic) upon landing while hoping for a data connection to appear on your device or relying on your hotel wifi...

Frictionless Secure Communications

Unpack, power up, and connect to the network. Zero-touch configuration (ZTC) is a feature that offers users the convenience of automatic set up straight out of the box. This method of configuration is fast, reliable, and costs less to deploy, with fewer human errors. It is an alternative to configuring...

WhatsApp or Signal?

Why a secure app is not enough if your device is compromised Using a secured messaging app on a compromised phone is like trying to lock a door with a broken window. Sure, apps such as Signal or WhatsApp Messenger both offer security beyond the typical messaging tool. They both...

The Luxury of Privacy

Driving directions, sleep diaries, and step counts. The apps designed to improve our lives with ultra-convenient life hacks and the ability to socialize with friends you haven’t seen since high school have changed the value placed on our privacy. Considered a basic right, privacy has now become a luxury,...

Virtual machines: the enhanced security layer

Choosing end-user productivity over IT security and manageability is a common predicament when building a secure IT environment. If you want to maintain productivity, you must sacrifice security. If it’s security that you’re seeking, productivity and usability suffers. Deploying a VM (or several) onto your desktop environment eliminates...

You’ve successfully subscribed to SDM Technologies AG
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.