usb

Results 1 - 25 of 31Sort Results By: Published Date | Title | Company Name
Published By: Raritan     Published Date: Sep 24, 2014
Connecting your PDUs to a Wi-Fi Network is only one reason, there's four more you should learn about now for your growing organization.
Tags : 
raritan, usb, power, data center, rack, pdu, wifi, webcam
    
Raritan
Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
De traditionele vorm van levenscyclusbeheer voor pc’s is een inefficiënt en duur proces dat uw bedrijf veel tijd en geld kost. Met de PCaaS-oplossing van Dell EMC (PC-as-a-Service) kan de zakelijke aanpak van uw IT-infrastructuur worden getransformeerd. Externe werkzaamheden vormen een dagelijks aspect van het moderne bedrijfsleven en daarmee is het risico op inbreuk van kritieke data enorm toegenomen. Gegevensverlies kan uw bedrijf stilleggen en leiden tot zakelijk verlies, reputatieschade en zelfs boetes. Leer meer over Dell oplossingen powered by Intel®.
Tags : 
bespaar, tijd, geld, dell
    
Dell PC Lifecycle
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas
    
Entrust Datacard
Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards
    
Aladdin
Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection
    
LifeLock
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat
    
Lenovo and Intel®
Published By: Lenovo and Intel     Published Date: Oct 17, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat
    
Lenovo and Intel
Published By: Cisco     Published Date: Sep 21, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco
Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Zowel publieke als particuliere organisaties erkennen dat het levenscyclusbeheer van de pc ingewikkelder en duurder wordt naarmate de verscheidenheid van pc-apparaten en werkstijlen van werknemers toeneemt. Om optimaal productief te zijn hebben verschillende groepen medewerkers verschillende behoeften op het gebied van hardware, software en configuratie voor eindgebruikers. Terwijl IT-afdelingen een breder scala aan technologie voor een steeds meer verspreid en mobieler personeel willen bieden en ondersteunen, met behoud van zo min mogelijk verstoring voor de eindgebruiker, moeten ze ook aan de kosten denken. Het consolideren van processen en het inroepen van de hulp van een leverancier, zoals Dell, kan de kosten verminderen en expertise bieden voor betere werking van pc-levenscyclusbeheer. Download deze whitepaper voor meer informatie over Dell oplossingen met Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb
    
Globalscape
Published By: Entrust Datacard     Published Date: May 15, 2014
Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials
Tags : 
entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile
    
Entrust Datacard
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
Aberdeen - youSENDit
Published By: Cisco     Published Date: Sep 20, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco
Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod
    
GFI
Published By: Dell EMEA     Published Date: Mar 05, 2019
Dell Technologies schloss sich kürzlich mit dem Institute for the Future (IFTF) und 20 Experten aus unterschiedlichen Ländern zusammen, um eine Zukunftsaussicht zu entwerfen, einen Vorausblick auf die Entwicklung von aufstrebenden Technologien – wie z. B. künstliche Intelligenz (KI) und das Internet der Dinge (Internet of Things, IoT) – und deren Einfluss auf unsere Lebens- und Arbeitsweise bis 2030. Auf diese Weise wollte Dell Technologies Erkenntnisse erreichen, die Unternehmen dabei unterstützen, das kommende Jahrzehnt zu meistern. Die Schlussfolgerung der Experten war, dass wir uns an einem Scheidepunkt befinden, auf dem Weg in eine neue Ära der Partnerschaft zwischen Mensch und Maschine. Erfahren Sie mehr über Dell Lösungen in Zusammenarbeit mit Intel®.
Tags : 
    
Dell EMEA
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
    
CREDANT Technologies
Published By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide profiles solutions made to take safety & security in both new and older buildings to a higher level. You’ll get 1. Building Safety & Security Solutions Guide 2. Building Safety & Security Fact Sheet 3. USB Interconnects Quick Reference Guide 4. PIDG Terminals & Splices Quick Reference Guide 5. AMPMODU Interconnect System Catalog
Tags : 
    
TE Connectivity
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast includes interviews from leading SAN vendors including AJ Casamento, Solutioneer at Brocade, Bob Nusbaum, MDS Product Manager at Cisco and Jim Morin, Portfolio Management at Ciena.
Tags : 
storage area network, san infrastructure, mainline information systems, fibre channel, networking
    
Mainline Information Systems
Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus
    
Avocent
Published By: Dell SB     Published Date: Aug 27, 2019
Sie möchten ein Unternehmen gründen oder weiter ausbauen – dabei zählt jede Minute. Sparen Sie Zeit und erhöhen Sie die Produktivität, indem Sie Ihre Technologie optimieren. Mit dem einfachen Wechsel zum Intel® Optane™ Speicher und der Migration zu Windows 10 Pro erledigen Sie alltägliche Aufgaben schneller und haben mehr Zeit für Innovationen. Im Folgenden finden Sie einige Strategien zur Optimierung Ihres Arbeitstags.
Tags : 
    
Dell SB
Published By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : 
usb, flash drive, mobile security, pii, personal information, malware, government information security
    
Lumension
Published By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod
    
GFI
Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
    
Lumension
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.