Usb Security Reports White PaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Usb Security Reports White Paper returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   Storage Security
 •   Wireless Security
 •   Mobile Device Management

Related Searches
 •   About Usb Security
 •   Conferencing Usb Security Reports
 •   Support Usb Security
 •   Usb Demonstrations
 •   Usb Security Code
 •   Usb Security Contracts
 •   Usb Security Reports California
 •   Usb Security Reports Own
 •   Usb Security Reports Tutorial
 •   Usb Security Resource
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 12, 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

Three Ways to Prevent USB Insecurity by Lumension

October 14, 2013 - (Free Research)
This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools. 
(WHITE PAPER) READ ABSTRACT |

Frequently Asked Questions (FAQ): SAN Acceleration Using FalconStor Network Storage Server (NSS) by FalconStor Software

October 25, 2010 - (Free Research)
Do you have questions regarding SAN acceleration? Learn more about solid state storage, which solid state technologies are currently on the market, and why your enterprise needs solid state storage. This concise white paper is designed to answer frequently asked questions on these topics and more. 
(WHITE PAPER) READ ABSTRACT |

Smart Policies for Personal-Liable Smartphones by BlackBerry

April 05, 2010 - (Free Research)
This white paper addresses how businesses and employees can compromise between personal and business smartphone use, as well as benefit by establishing personal-liable smartphone policies. 
(WHITE PAPER) READ ABSTRACT |

Secure and Effective Data Extraction from the SAP® ERP System by Winshuttle, LLC

December 2008 - (Free Research)
This white paper describes the variety of tools available for such ad-hoc reporting applications and compares and contrasts these tools in terms of their ease-of-use and security. 
(WHITE PAPER) READ ABSTRACT |

Salvation Army Protects the Integrity of Data and Global Brand by Lumension

October 2013 - (Free Research)
In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met. 
(WHITE PAPER) READ ABSTRACT |

Navigating Backup and Recovery in VMware Environments - Technical White Paper by HP

July 2011 - (Free Research)
This white paper explores the problems faced by IT administrators when managing the physical and VMware virtual infrastructure, and shows how HP Data Protector simplifies backup and recovery. 
(WHITE PAPER) READ ABSTRACT |

6 Reasons Why Software-Based Encryption Doesn’t Stack Up by MXI Security

April 2010 - (Free Research)
Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations. 
(WHITE PAPER) READ ABSTRACT |

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow by Sendmail, Inc.

October 2008 - (Free Research)
This white paper examines the architecture limitations prevalent in today's large-enterprise email networks. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension

January 2010 - (Free Research)
Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment. 
(WHITE PAPER) READ ABSTRACT |

The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report by Neustar®

May 2014 - (Free Research)
This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent USB Insecurity in Your Enterprise by Lumension

January 2011 - (Free Research)
USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Network Access Control (NAC) Solution that is Right for Your Network by ForeScout Technologies, Inc.

March 2011 - (Free Research)
This white paper provides a comprehensive overview between a number of available deployment, device interrogation and policy enforcement methods to help you determine which Network Access Control (NAC) solution is right for your company's network. 
(WHITE PAPER) READ ABSTRACT |

Barclays Bank by Lumension

August 2008 - (Free Research)
Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices. 
(CASE STUDY) READ ABSTRACT |

McAfee Threats Report: Third Quarter 2010 by McAfee, Inc.

December 2010 - (Free Research)
This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe. 
(ANALYST REPORT) READ ABSTRACT |

Pod Slurping - An Easy Technique for Stealing Data by GFI Software

March 2008 - (Free Research)
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Reliable Inbound Supply Integration by Sterling Commerce, An IBM Company

September 2009 - (Free Research)
This white paper will enumerate the critical business challenges, as well as specific opportunities and benefits of working aggressively to achieve inbound supply integration. 
(WHITE PAPER) READ ABSTRACT |

Fixed Asset Management Strategies and Best Practices

by Sage Software

February 2012 - (Free Research)
Challenges to control fixed assets include lack of accurate physical asset inventories and inadequate tools and resources to adapt to changing tax laws and methods. Read this white paper to learn best practices for managing fixed assets and how control will help you save time and money. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored by Sophos, Inc.

September 2009 - (Free Research)
This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media. 
(WHITE PAPER) READ ABSTRACT |

Citrix XenApp 5.0: Preparing for a Successful Migration by visionapp

November 2008 - (Free Research)
Citrix XenApp 5.0 offers new functionality: with preferential load balancing, preset values can now be applied to both specific users and particular applications. 
(WHITE PAPER) READ ABSTRACT |

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture by GlobalScape

December 2012 - (Free Research)
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. 
(WHITE PAPER) READ ABSTRACT |

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems by IBM

September 2013 - (Free Research)
This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Click through to learn how the intrusion prevention system (IPS) can be used to fulfill this model. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention from the Inside Out by Cisco Systems, Inc.

June 2008 - (Free Research)
In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization. 
(VIDEOCAST) READ ABSTRACT |

Big Data Means Big Opportunities by Dell, Inc. and Intel®

December 2013 - (Free Research)
Uncover the ins-and-outs of an industry-leading vendor's Hadoop software that's capable of analyzing, managing and processing the vast amounts of data you must deal with 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts