WinMagic Introduces Endpoint Identity Architecture Aligned with CISA OT Guidance

May 19, 2026
WinMagic has announced a transport layer identity architecture designed to meet new CISA guidance for Zero Trust in operational technology environments. The system uses endpoint-based verification to maintain continuous identity assurance even in disconnected or air-gapped systems.

WinMagic announced in a press release a new transport layer identity architecture intended to align with recent Cybersecurity and Infrastructure Security Agency (CISA) guidance on applying Zero Trust principles to operational technology. The company’s approach focuses on continuous, hardware-bound identity verification at the endpoint level.

The system uses MagicEndpoint, Live Key, and Live Identity in Transaction (LIT) to maintain identity assurance beyond login. These components enable identity to be verified locally through TPM-bound cryptographic keys, allowing operations to continue securely even when disconnected from networks or operating in air-gapped conditions.

WinMagic’s design supports continuous verification, operational resilience, and unified protection for legacy systems. It extends Zero Trust to environments such as energy grids and manufacturing facilities where uninterrupted access is essential. The company stated that organizations can integrate this model with existing identity systems like Okta, Azure AD, and SAML platforms while maintaining continuous endpoint-level identity assurance.

We hope you enjoyed this article.

Subscribe to AI Policy Brief

Weekly report on AI regulations, safety standards, government policies, and compliance requirements worldwide.

Trend report

Cybersecurity Trends Report 2025

Netwrix

The Cybersecurity Trends Report 2025 by Netwrix Research Lab provides insights into how organizations are adapting their cybersecurity strategies amidst growing AI adoption. The report, based on a survey of 2,150 IT professionals from 121 countries, highlights key trends such as the increase in hybrid IT environments, AI-driven security challenges, and the rising costs of security incidents.

Read more