usb security

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name

Three Ways to Prevent USB Insecurity in Your Enterprise

Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss, data theft, malware, anti spam, anti spyware, anti virus, policy based management, enterprise software, data protection, database security, productivity
    
Lumension

Unruly USB: Devices Expose Networks to Malware

Published By: Lumension     Published Date: Mar 30, 2011
Learn how to protect against what comes in your environment via USB in this Lumension white paper from Web Buyer's Guide
Tags : 
lumension, usb, malware, security, data loss, threat, cybersecurity, anti spam, anti spyware, anti virus, security management, data protection
    
Lumension

Unruly USB Devices Expose Networks to Malware

Published By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : 
usb security, network security, patch management, lumension, device management, security, intrusion prevention, mobile workers, pda, wireless security
    
Lumension

The Great Balancing Act: Using USB Flash Drives in Government Environments

Published By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : 
usb, flash drive, mobile security, pii, personal information, malware, government information security, identity management, intrusion prevention, ipsec, mobile computing, mobile workers, pda, wireless security
    
Lumension

Pod Slurping: An Easy Technique for Stealing Data

Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi, storage management, identity management, security policies
    
GFI

Support of USB Devices: USB Lockdown - Secure KVM Switching

Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus, network security, remote access, remote network management, access control, ipsec, security management, mobile workers, wireless hardware, vulnerability management
    
Avocent
Search      

Add Research

Get your company's research in the hands of targeted business professionals.