Hardware  >   Electronic Components  >   Discrete Component Interconnection  >   Buses  >  

Universal Serial Bus

RSS Feed    Add to Google    Add to My Yahoo!
Universal Serial Bus Reports
 
Preventing Data Leaks on USB Ports
sponsored by Pointsec Mobile Technologies
WHITE PAPER: This paper examines how to effectively prevent data leakage and protect vital company information stored on your USB devices. You will also learn how to ease your company's data movement and secure important information with USB storage techniques.
Posted: 31 Jan 2007 | Published: 01 Jan 2007

Pointsec Mobile Technologies

Frequently Asked Questions (FAQ): SAN Acceleration Using FalconStor Network Storage Server (NSS)
sponsored by FalconStor Software
WHITE PAPER: Do you have questions regarding SAN acceleration? Learn more about solid state storage, which solid state technologies are currently on the market, and why your enterprise needs solid state storage. This concise white paper is designed to answer frequently asked questions on these topics and more.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

Paramount Foods Upgrades Store Technology
sponsored by Hewlett-Packard Company
CASE STUDY: Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers.
Posted: 18 Mar 2008 | Published: 01 Oct 2006

Hewlett-Packard Company

Trusted Computing: What the Future Looks Like
sponsored by Wave Systems Corp.
VIDEOCAST: Ethernet transformed networking. USB forever shaped the perception of peripherals. Will Trusted Computing transform the way we compute? Hear Wave CEO Steven Sprague draw parallels between Trusted Computing and successes in the cellular and cable industries.
Posted: 15 Sep 2010 | Premiered: Sep 15, 2010

Wave Systems Corp.

The Threats Posed by Portable Storage Devices
sponsored by GFI Software
PRODUCT LITERATURE: This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007

GFI Software

HP POS System Helps Mayors Improve Customer Service, Gain Selling Time
sponsored by Hewlett-Packard Company
CASE STUDY: Among the priorities for the new system were ease of use by salespeople, an easy-to-manage centralized customer database for lookup and validation, and the use of broadband connectivity. Maintaining access to proprietary applications that supported nonsales functions was also required.
Posted: 18 Mar 2008 | Published: 01 Aug 2008

Hewlett-Packard Company

Tera1200 PC-over-IP Host Processor Product Brief
sponsored by Teradici Corporation
PRODUCT LITERATURE: This product brief provides IT administrators with key information to better manage their commercial PC environments.
Posted: 10 Mar 2008 | Published: 10 Mar 2008

Teradici Corporation

Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY: This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006

SecureWave
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement