usb

Results 1 - 25 of 31Sort Results By: Published Date | Title | Company Name

5 Benefits of Having USB Ports on Your Rack PDUs

Published By: Raritan     Published Date: Sep 24, 2014
Connecting your PDUs to a Wi-Fi Network is only one reason, there's four more you should learn about now for your growing organization.
Tags : 
raritan, usb, power, data center, rack, pdu, wifi, webcam, wireless infrastructure, desktop management, green computing, power and cooling, data center design and management, business technology
    
Raritan

Bespaar tijd en geld

Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
De traditionele vorm van levenscyclusbeheer voor pc’s is een inefficiënt en duur proces dat uw bedrijf veel tijd en geld kost. Met de PCaaS-oplossing van Dell EMC (PC-as-a-Service) kan de zakelijke aanpak van uw IT-infrastructuur worden getransformeerd. Externe werkzaamheden vormen een dagelijks aspect van het moderne bedrijfsleven en daarmee is het risico op inbreuk van kritieke data enorm toegenomen. Gegevensverlies kan uw bedrijf stilleggen en leiden tot zakelijk verlies, reputatieschade en zelfs boetes. Leer meer over Dell oplossingen powered by Intel®.
Tags : 
bespaar, tijd, geld, dell
    
Dell PC Lifecycle

Beyond Passwords & Outdated Physical Access Systems

Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard

Boosting Online Banking Confidence and Usage with Secure USB Authentication

Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards, smart card, smart cards, regulatory compliance, online banking, ssl, banking, database security, aladdin
    
Aladdin

Breach Response Best Practices

Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock

Build Strong Security Starting from the Device-Level

Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat, internet security, network security appliance, vulnerability management, data loss prevention
    
Lenovo and Intel®

Build Strong Security Starting from the Device-Level

Published By: Lenovo and Intel     Published Date: Oct 17, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat
    
Lenovo and Intel

CMX i din affär, på flygplatsen eller arenan

Published By: Cisco     Published Date: Sep 21, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco

De totale economische impact van de PC Lifecycle Services van Dell

Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Zowel publieke als particuliere organisaties erkennen dat het levenscyclusbeheer van de pc ingewikkelder en duurder wordt naarmate de verscheidenheid van pc-apparaten en werkstijlen van werknemers toeneemt. Om optimaal productief te zijn hebben verschillende groepen medewerkers verschillende behoeften op het gebied van hardware, software en configuratie voor eindgebruikers. Terwijl IT-afdelingen een breder scala aan technologie voor een steeds meer verspreid en mobieler personeel willen bieden en ondersteunen, met behoud van zo min mogelijk verstoring voor de eindgebruiker, moeten ze ook aan de kosten denken. Het consolideren van processen en het inroepen van de hulp van een leverancier, zoals Dell, kan de kosten verminderen en expertise bieden voor betere werking van pc-levenscyclusbeheer. Download deze whitepaper voor meer informatie over Dell oplossingen met Intel®.
Tags : 
    
Dell EMC EMEA

EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz, security, it management, document management, information management, secure content management, content management
    
Globalscape

Entrust IdentityGuard Cloud Services Smart Credentials

Published By: Entrust Datacard     Published Date: May 15, 2014
Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials
Tags : 
entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking, it management
    
Entrust Datacard

Entrust IdentityGuard Cloud Services Smart Credentials: Multiuse Smartcards, USB Tokens & Mobile

Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile, security
    
Entrust Datacard

How Business Decision Makers Can Use Smart Technologies WITHOUT More IT Support

Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security, application integration, business intelligence, customer satisfaction, customer service, web services, web service security, secure content management
    
Aberdeen - youSENDit

Inomhuspositioneringstjänster från Cisco

Published By: Cisco     Published Date: Sep 20, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco

Pod Slurping: An Easy Technique for Stealing Data

Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi, storage management, identity management, security policies
    
GFI

Realizing 2030: Die Zukunft Der Arbeit

Published By: Dell EMEA     Published Date: Mar 05, 2019
Dell Technologies schloss sich kürzlich mit dem Institute for the Future (IFTF) und 20 Experten aus unterschiedlichen Ländern zusammen, um eine Zukunftsaussicht zu entwerfen, einen Vorausblick auf die Entwicklung von aufstrebenden Technologien – wie z. B. künstliche Intelligenz (KI) und das Internet der Dinge (Internet of Things, IoT) – und deren Einfluss auf unsere Lebens- und Arbeitsweise bis 2030. Auf diese Weise wollte Dell Technologies Erkenntnisse erreichen, die Unternehmen dabei unterstützen, das kommende Jahrzehnt zu meistern. Die Schlussfolgerung der Experten war, dass wir uns an einem Scheidepunkt befinden, auf dem Weg in eine neue Ära der Partnerschaft zwischen Mensch und Maschine. Erfahren Sie mehr über Dell Lösungen in Zusammenarbeit mit Intel®.
Tags : 
    
Dell EMEA

Removable Media Best Practices: Business-aligned Security Strategies and Advice

Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection, anti spam, anti spyware, anti virus, security management
    
CREDANT Technologies

Safety & Security in Buildings

Published By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide profiles solutions made to take safety & security in both new and older buildings to a higher level. You’ll get 1. Building Safety & Security Solutions Guide 2. Building Safety & Security Fact Sheet 3. USB Interconnects Quick Reference Guide 4. PIDG Terminals & Splices Quick Reference Guide 5. AMPMODU Interconnect System Catalog
Tags : 
    
TE Connectivity

Secure Critical Company Information when a Mobile Device is Lost

Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere

Storage Area Network (SAN) Technology and Management

Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast includes interviews from leading SAN vendors including AJ Casamento, Solutioneer at Brocade, Bob Nusbaum, MDS Product Manager at Cisco and Jim Morin, Portfolio Management at Ciena.
Tags : 
storage area network, san infrastructure, mainline information systems, fibre channel, networking, infrastructure, storage area networks, storage management
    
Mainline Information Systems

Support of USB Devices: USB Lockdown - Secure KVM Switching

Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus, network security, remote access, remote network management, access control, ipsec, security management, mobile workers, wireless hardware, vulnerability management
    
Avocent

Technologielösungen für gesteigerte Produktivität

Published By: Dell SB     Published Date: Aug 27, 2019
Sie möchten ein Unternehmen gründen oder weiter ausbauen – dabei zählt jede Minute. Sparen Sie Zeit und erhöhen Sie die Produktivität, indem Sie Ihre Technologie optimieren. Mit dem einfachen Wechsel zum Intel® Optane™ Speicher und der Migration zu Windows 10 Pro erledigen Sie alltägliche Aufgaben schneller und haben mehr Zeit für Innovationen. Im Folgenden finden Sie einige Strategien zur Optimierung Ihres Arbeitstags.
Tags : 
    
Dell SB

The Great Balancing Act: Using USB Flash Drives in Government Environments

Published By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : 
usb, flash drive, mobile security, pii, personal information, malware, government information security, identity management, intrusion prevention, ipsec, mobile computing, mobile workers, pda, wireless security
    
Lumension

The Threats Posed By Portable Storage Devices

Published By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi, storage management, identity management, security policies
    
GFI

Three Ways to Prevent USB Insecurity in Your Enterprise

Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss, data theft, malware, anti spam, anti spyware, anti virus, policy based management, enterprise software, data protection, database security, productivity
    
Lumension
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.