Usb Security RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Usb Security Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Security Policies
 •   Application Security
 •   Security Monitoring
 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security

Related Searches
 •   Conference Usb
 •   Filing Usb Security
 •   Functions Of Usb Security
 •   Measured Usb
 •   Networks Usb Security Risk
 •   Questions About Usb Security Risk
 •   Strategies Usb Security Risk
 •   Support Usb Security
 •   Usb Security Risk Web Cast
 •   Workflow Usb Security
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Barclays Bank by Lumension

August 2008 - (Free Research)
Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices. 
(CASE STUDY) READ ABSTRACT |

Three Ways to Prevent USB Insecurity by Lumension

October 2013 - (Free Research)
This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools. 
(WHITE PAPER) READ ABSTRACT |

HP - rp5700 Point of Sale System by Hewlett-Packard Company

March 2008 - (Free Research)
The HP rp5700 Point of Sale System gives you a flexible point-of-sale platform that can go from the front of the store to the back office. 
(WHITE PAPER) READ ABSTRACT |

8 Ways to Better Monitor Network Security Threats in the Age of BYOD by Hewlett-Packard Limited

January 2014 - (Free Research)
This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce. 
(WHITE PAPER) READ ABSTRACT |

Mobile Application Security Best Practices to Protect Corporate Data by Thawte Inc.

July 2013 - (Free Research)
This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks. 
(EGUIDE) READ ABSTRACT |

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

Three Ways to Prevent USB Insecurity in Your Enterprise by Lumension

January 2011 - (Free Research)
USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk. 
(WHITE PAPER) READ ABSTRACT |

The RSA GRC Reference Architecture by RSA, The Security Division of EMC

June 2013 - (Free Research)
With businesses continue to focus on governance, risk and compliance (GRC), IT professionals have to maintain efficient security policies. This in-depth white paper outlines the importance of a GRC policy and how it can help your business. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Improving Mobile Data Security by Thawte Inc.

July 2013 - (Free Research)
This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more. 
(EGUIDE) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension

January 2010 - (Free Research)
Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment. 
(WHITE PAPER) READ ABSTRACT |

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture by GlobalScape

December 2012 - (Free Research)
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. 
(WHITE PAPER) READ ABSTRACT |

Technical Guide on Government Security by SearchSecurity.com

May 2011 - (Free Research)
Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats. 
(EGUIDE) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2007 - (Free Research)
Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security. 
(CASE STUDY) READ ABSTRACT |

Lumension Sanctuary Device Control by Lumension

February 2009 - (Free Research)
Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints. 
(TRIAL SOFTWARE)

Five Truths About Enterprise Data Protection by PGP Corporation

December 2008 - (Free Research)
How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy. 
(WHITE PAPER) READ ABSTRACT |

5 Ways To Secure Removable Media: Which Is Best For Your Enterprise? by WinMagic

March 2010 - (Free Research)
This paper reviews the steps some organizations are taking to draft, implement, and enforce risk mitigation policies for removable media, and how technologies available today, and appearing on the horizon, are helping. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption by Aladdin Knowledge Systems

August 2008 - (Free Research)
Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions. 
(WHITE PAPER) READ ABSTRACT |

Seven Tips for Securing Mobile Workers by Sophos, Inc.

May 2011 - (Free Research)
This paper offers practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of mobile devices that contribute to both their popularity in the workplace and their risk to an organization's networks, data and reputation. 
(WHITE PAPER) READ ABSTRACT |

Lumension Sanctuary Device & Application Control for Endpoint Security -- 30-day Free Trial by Lumension

January 2008 - (Free Research)
Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware. 
(DEMO)

Lumension Endpoint Security: Device Control and Application Control by Lumension

September 2010 - (Free Research)
The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection. 
(TRIAL SOFTWARE)

Ponemon Institute - Seven Tips for Securing Mobile Workers by Sophos UK

May 2011 - (Free Research)
This paper offers practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of mobile devices that contribute to both their popularity in the workplace and their risk to an organisation's networks, data and reputation. 
(WHITE PAPER) READ ABSTRACT |

Pod Slurping - An Easy Technique for Stealing Data by GFI Software

March 2008 - (Free Research)
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches. 
(WHITE PAPER) READ ABSTRACT |

McAfee Threats Report: Third Quarter 2010 by McAfee, Inc.

December 2010 - (Free Research)
This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts