July 2010 - (Free Research) Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
January 2009 - (Free Research) Dell's Hard Drive Data Recovery Service gives customers of all sizes - from small businesses to large public companies and government agencies - the opportunity to recover data from a failed hard drive.
March 2009 - (Free Research) Read this paper to discover why only IronKey - with a unique end-to-end security that extends from the Cryptochip to firmware to services - is able to deliver a complete range of anti-malware controls down to the hardware level.
January 2012 - (Free Research) Today, what virtualization software can accomplish is nearly limitless. But has your computer security methodology and software kept up? This whitepaper will take an in-depth look at virtualization security risks and mitigations.
February 2009 - (Free Research) Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints.
January 2011 - (Free Research) A growing trend in small businesses is to solve storage problems with a simpler, more elegant technology: network-attached storage (NAS). Continue reading to learn about NAS appliances such as Cisco® Small Business NSS 300 Series Smart Storage solution, as well as learn the reasons why it differs from other NAS storage method.
August 2008 - (Free Research) Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
March 2008 - (Free Research) In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
October 2010 - (Free Research) Do you have questions regarding SAN acceleration? Learn more about solid state storage, which solid state technologies are currently on the market, and why your enterprise needs solid state storage. This concise white paper is designed to answer frequently asked questions on these topics and more.
June 2012 - (Free Research) Check out this white paper to discover a file system designed to provide global file sharing and collaboration, centralized storage capacity and easy cloud-based storage - while presenting all clients with real-time common and consistent views of the files.
February 2009 - (Free Research) This paper describes the risks posed by the Downadup worm and how Shavlik is uniquely suited to help customers respond quickly. Read this brief paper to learn how Shavlik makes it easy for users to do targeted installation of solutions that automate and control patch and configuration management processes while minimizing operational impact.
September 2009 - (Free Research) This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
January 2008 - (Free Research) Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware.
January 2010 - (Free Research) Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.
March 2010 - (Free Research) This paper reviews the steps some organizations are taking to draft, implement, and enforce risk mitigation policies for removable media, and how technologies available today, and appearing on the horizon, are helping.
April 2009 - (Free Research) Complex microprocessors lie at the heart of every electronic device and embedded system in use today - from mobile phones to brain scanners. Such products demand sophisticated software to get the job done, and that's where operating systems come in.
January 2012 - (Free Research) The following five steps are some very effective ways to improve data security in a cost-effective manner and are the first steps toward readying an organization for more robust data protection measures such as data leak prevention (DLP).
The Albér Cellcorder CRT-300 cell resistance tester displays and records cell float voltage, internal cell resistance and intercell connection resistance. The portable unit includes a memory card, backlit graphical reflective LCD....
March 2009 - (Free Research) The 3-2-1 Archiving and Data Protection Best Practice advocates that a minimum of 3 copies of all business critical data be retained, that these copies should be kept on 2 different types of storage media, and that at least one copy should be offsite on removable media.
August 2009 - (Free Research) This chapter shares stories about backups to highlight problems that you yourself may have encountered. For each, we'll look at some of the root causes for those problems, and suggest ways that a modernized Backup 2.0 approach might help solve the problem.
October 2007 - (Free Research) Sandy Carter, Vice President of SOA and WebSphere Strategy, IBM Corporation, takes readers through a specific roadmap on how, where, when, and why to embrace a Service Oriented Architecture (SOA) strategy in her new book.