Hardware  >   Electronic Components  >   Discrete Component Interconnection  >   Buses  >  

Universal Serial Bus

RSS Feed    Add to Google    Add to My Yahoo!
Universal Serial Bus Reports
 
New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Frequently Asked Questions (FAQ): SAN Acceleration Using FalconStor Network Storage Server (NSS)
sponsored by FalconStor Software
WHITE PAPER: Do you have questions regarding SAN acceleration? Learn more about solid state storage, which solid state technologies are currently on the market, and why your enterprise needs solid state storage. This concise white paper is designed to answer frequently asked questions on these topics and more.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

FalconStor Software

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
sponsored by Lumension
WHITE PAPER: Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

Lumension

Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY: This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006

SecureWave

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

The Threats Posed by Portable Storage Devices
sponsored by GFI Software
PRODUCT LITERATURE: This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007

GFI Software

How to Prevent Security Breaches Through Effective Management and Control of USB Devices
sponsored by Lumension
WEBCAST: Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Posted: 12 Aug 2009 | Premiered: Aug 12, 2009

Lumension

The SAP Virtualization Ecosystem
sponsored by VMware and Intel
PRESENTATION TRANSCRIPT: This paper discusses the options available to you for virtualizing SAP, the big cost savings you can expect from virtualization, and why you should go virtual right away.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

VMware and Intel

Rainbow Technologies Authentication eBook
sponsored by SafeNet, Inc.
BOOK: Understanding authentication/identity management should be the start of your company's security assessment.
Posted: 19 Jun 2002 | Published: 25 Mar 2002

SafeNet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement