Skip to Recently Updated

MagicINFO

This homepage is the primary documentation source for supported versions of Samsung MagicINFO. From here, you can access Information to help answer questions you have related to your version of MagicINFO Server, Player and Author. Follow the links on this page to explore the Information you need.  It is recommended that you bookmark webpage for future reference. 


Reminder Notice : MagicINFO 8 End of Support

Thank you for using our MagicINFO solution.

As previously communicated, we would like to remind you that software maintenance for MagicINFO 8 has been discontinued.

The three-year maintenance period that was promised from its release in April 2020 has expired, with the final security patch delivered in October 2023.

Please note that any security vulnerabilities and bugs occurring in MagicINFO 8 are now the responsibility of the customer.

Recommendation : Migrate to VXT or Upgrade to MagicINFO 9 

To continue receiving security updates and technical support, we offer the following options:

1. Migrate to VXT (Recommended)

  • We highly recommend migrating to VXT, the next generation of MagicINFO.
  • VXT is built on the latest technology, providing enhanced security features, expanded functionality, and a future-proof solution.
  • From a long-term perspective, migrating to VXT is more cost-effective and streamlines your future upgrade path.


2. Upgrade to MagicINFO 9

  • While this upgrade is available as a paid service, it offers enhanced security features and functionality that will provide greater value to your business.
  • For secure operation, your system should always be maintained with the latest patches.
  • The update patch can be downloaded from our official website: Get update







Security Recommendations for MagicINFO 9

To ensure secure operation of MagicINFO 9, we strongly recommend implementing the following security measures:

< Network Security >

1. Implement HTTPS Protocol
- Operating with HTTP can expose sensitive information to potential threats.
- We strongly recommend configuring your system to use HTTPS to ensure encrypted data transmission.

2. Configure Network Firewalls
- Configure network firewalls to allow only authorized traffic.
- Close all unnecessary ports and selectively open only required ones.

< Authentication & Access Control >

1. Enable Multi-Factor Authentication (MFA)
- To prevent unauthorized access due to credential theft, MFA functionality must be activated.
- This is an essential component of account security.
  ( how to enable MFA :  Two-factor authentication (OTP) )

2. Enforce Strong Password Policies
- Mandate complex passwords and require periodic password changes.
- Restrict password reuse.

3. Implement Access Control Management
- Apply the principle of least privilege by granting users only the minimum permissions necessary.
- Restrict administrator account usage to only when absolutely necessary.

< System Protection >

1. Maintain Current Software Versions
- Always keep your software updated with the latest versions and security patches.
- Apply security patches promptly upon release.

2. Install Antivirus Protection
- Install trusted antivirus programs on your servers to protect against viruses and malware.
- Perform regular full system scans.

3. Establish Security Update Schedule
- Develop and adhere to a regular schedule for applying security patches.
- Apply critical security updates immediately.

< Data Protection & Monitoring >

1. Establish Data Backup Procedures
- Regularly back up critical data and document restoration procedures.
- Periodically test your backup restoration process to ensure data recoverability.

2. Conduct Regular Security Assessments
- Perform regular vulnerability scans to identify and address potential security risks.
- Periodically review and update security policies and procedures.