
As identity-first security continues to fail, WinMagic, a cybersecurity innovator known for pioneering full-disk encryption and secure endpoint authentication, calls for a structural shift in online security—toward simpler, stronger trust with no user friction.
TORONTO, Jan. 13, 2026 /PRNewswire/ — Historic and current approaches to online security have focused on the user, but overlooked three essentials: verifying the identity that receives the data, securing at the moment that truly matters, and applying the strongest technologies to make the process both simple and secure. Recognizing these gaps could make cybersecurity dramatically simpler and safer, according to Thi Nguyen-Huu, founder and Chief Executive Officer of WinMagic, who says, “User-verification is the wrong identity.”
Here’s are four reasons why:
- There’s a logical flaw in the “verify one, deliver to another” equation.
Today’s pattern verifies the user, then delivers data to the endpoint, which is the device you use to access online accounts. That misalignment makes clear that user-identity is the wrong one to verify. “Even verifying halfway toward the right identity—the endpoint—would prevent most attacks, because attackers rarely travel to steal endpoints,” highlights Nguyen-Huu. - Patches don’t fix the flaw.
Attempts to bind user authentication to the endpoint, through number matching, device prompts, and passkey to “unlock the device” flows; all add friction and rely on fragile user vigilance. The steps still revolve around user-first ceremonies, which is inadequate for online authentication. - Technical common sense: online authentication is best done with cryptography.
Cryptography delivers mathematical assurance — accuracy of one in zillions, resilience for centuries, even when under global attack. Users cannot do cryptography, and they don’t have to. Because better alternatives exist, the user is the wrong identity to verify. - Real-world common sense: trust should be continuous, not a snapshot.
While a single login is a snapshot in time, or a moment to secure, building a secure timeline from power-on to power-off creates a stronger, more durable shield. Humans can’t sustain constant prompts without fatigue. Trust should be maintained silently, constantly, and seamlessly.
If User Identity is the Wrong Identity, What is Right?
“The right identity is the user combined with a trusted endpoint,” Nguyen-Huu said. “This identity can be proven cryptographically and maintained over time via a persistent, trusted channel that gives real-time updates to the identity provider.”
Instead of granting trust in a single login moment, this model starts at the device (secure boot, encryption, OS login, integrity) and carries through from power-on to power-off. When systems recognize this identity, trust becomes silent, continuous, and structurally safer — all with no user action beyond endpoint login.
Delivering on the Zero Trust Principle
The widely adopted security framework of Zero Trust changed the conversation in cybersecurity with its principle to “never trust, always verify.” However, most implementations still rely on verifying the user through repeated prompts and multi-factor authentications (MFA) challenges. This vigilance creates fatigue, friction, risk, and fragile moments that attackers love to exploit.
The Right Identity matches Zero Trust in a way current models cannot. Here’s why:
- It delivers “always verify” without exhausting users. Verification happens silently and continuously, anchored in the endpoint—not through human gestures.
- It closes a gap Zero Trust never addressed. Today’s Zero Trust assumes identity is the trust anchor, but that identity is user-only, and attackers exploit it. Anchoring trust in the endpoint makes remote manipulation materially harder.
- It enforces trust cryptographically, not procedurally. Instead of fragile ceremonies performed over the network, trust is proven mathematically and maintained from power-on to power-off.
- It aligns with Zero Trust’s adaptive model. Keys exist only when policy conditions are met—secure boot, encryption, OS integrity—making trust dynamic and policy-driven.
“The Right Identity approach doesn’t just complement Zero Trust—it makes its promise practical. Silent, continuous verification replaces repeated challenges, delivering stronger security and a better user experience at the same time,” Nguyen-Huu said.
A Glimpse ahead: Machine Identity and AI agents
This security model isn’t just for people. The same principles of cryptographic proof and continuous trust extend naturally to machine identity, including AI agents and autonomous services.
Nguyen-Huu points out that, “With machine interactions scaling beyond human ones, the industry needs an identity foundation that works without human gestures.”
About WinMagic
WinMagic’s mission is to secure the digital world through high standards and strong ethics. For more than two decades, WinMagic has led innovation in encryption and endpoint security. Today, the team is advancing a new paradigm for online access—anchoring the endpoint as the foundation of trust. By letting endpoints speak for users, WinMagic turns online interactions into secure, automated exchanges – policy-driven and cryptographically anchored. This evolution removes friction, reduces risk, and lays the groundwork for the Secure Internet: continuous protection with zero user effort.
Learn more at https://www.winmagic.com.
Media Inquiries:
Karla Jo Helms
JOTO PR™
727-777-4629
jotopr.com
View original content to download multimedia:https://www.prnewswire.com/news-releases/winmagic-challenges-identity-first-security-the-industry-has-been-verifying-the-wrong-identity-302659791.html
SOURCE WinMagic

