Hardware  >   Electronic Components  >   Discrete Component Interconnection  >   Buses  >  

Universal Serial Bus

RSS Feed    Add to Google    Add to My Yahoo!
Universal Serial BusReports
 
Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

ePass2000 Network Token: Securing E-Business Applications
sponsored by Feitian Technologies
PRODUCT OVERVIEW: ePass2000 was designed to offer authentication, verification and information encryption services, and support E-mail Encryption.
Posted: 09 Jan 2006 | Published: 01 Jan 2002


Dell ProSupport Hard Drive Data Recovery Service
sponsored by Dell, Inc.
DATA SHEET: Dell's Hard Drive Data Recovery Service gives customers of all sizes - from small businesses to large public companies and government agencies - the opportunity to recover data from a failed hard drive.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Gone in a Flash
sponsored by Information Security Magazine
JOURNAL ARTICLE: From USB drives to MP3 players to DVDs, portable storage media are an end user's dream and a security manager's nightmare. We evaluated six device control tools that can help you rest easier.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Information Security Magazine

Active Anti-Malware Protection: Self-Defending IronKey Flash Drives Stop MalWare and Viruses from Spreading to Computers and Networks
sponsored by IronKey
WHITE PAPER: Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

IronKey

Preventing Data Leaks on USB Ports
sponsored by Pointsec Mobile Technologies
WHITE PAPER: This paper examines how to effectively prevent data leakage and protect vital company information stored on your USB devices. You will also learn how to ease your company's data movement and secure important information with USB storage techniques.
Posted: 31 Jan 2007 | Published: 01 Jan 2007

Pointsec Mobile Technologies

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement