Whitepaper Library
 

usb

Results 1 - 25 of 29Sort Results By: Published Date | Title | Company Name
Published By: Raritan     Published Date: Jan 11, 2017
Learn how a simple USB port can save you hundreds of thousands by eliminating copper- based network infrastructure costs, facilitating PDU setup and upgrades, and increasing physical security.
Tags : 
usb ports, pdu, data center power, infrastructure, design and facilities, power and cooling
    
Raritan
Published By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide profiles solutions made to take safety & security in both new and older buildings to a higher level. You’ll get 1. Building Safety & Security Solutions Guide 2. Building Safety & Security Fact Sheet 3. USB Interconnects Quick Reference Guide 4. PIDG Terminals & Splices Quick Reference Guide 5. AMPMODU Interconnect System Catalog
Tags : 
    
TE Connectivity
Published By: Cisco     Published Date: Sep 20, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Positioneringstjänster för inomhusbruk har funnits tillgängliga under många år, men det är först på senare tid som affärsnyttan i dessa system har blivit uppenbar. Peter Jerhamre berättar mer om dessa tjänster och den bakomliggande tekniken som nyttjar Cisco trådlösa wifi nät och BLE.
Tags : 
bakomiliggande, dessa system, manga, funnits, tillgangliga
    
Cisco
Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
De traditionele vorm van levenscyclusbeheer voor pc’s is een inefficiënt en duur proces dat uw bedrijf veel tijd en geld kost. Met de PCaaS-oplossing van Dell EMC (PC-as-a-Service) kan de zakelijke aanpak van uw IT-infrastructuur worden getransformeerd. Externe werkzaamheden vormen een dagelijks aspect van het moderne bedrijfsleven en daarmee is het risico op inbreuk van kritieke data enorm toegenomen. Gegevensverlies kan uw bedrijf stilleggen en leiden tot zakelijk verlies, reputatieschade en zelfs boetes. Leer meer over Dell oplossingen powered by Intel®.
Tags : 
bespaar, tijd, geld, dell
    
Dell PC Lifecycle
Published By: Imation Mobile Security     Published Date: Feb 12, 2013
Defining the difference between compliance and protection – and what it means for your USB data storage strategy.
Tags : 
imation, compliance, protection, data breach, 2011 ponemon institute study, fips 140-2
    
Imation Mobile Security
Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection
    
LifeLock
Published By: Entrust Datacard     Published Date: May 15, 2014
Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials
Tags : 
entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
    
CREDANT Technologies
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
Aberdeen - youSENDit
Published By: Lenovo and Intel     Published Date: Oct 14, 2016
IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.
Tags : 
security, usb, endpoint protection, theft, it threat
    
Lenovo and Intel
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast includes interviews from leading SAN vendors including AJ Casamento, Solutioneer at Brocade, Bob Nusbaum, MDS Product Manager at Cisco and Jim Morin, Portfolio Management at Ciena.
Tags : 
storage area network, san infrastructure, mainline information systems, fibre channel, networking, infrastructure
    
Mainline Information Systems
Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss, data theft, malware
    
Lumension
Published By: Lumension     Published Date: Mar 30, 2011
Learn how to protect against what comes in your environment via USB in this Lumension white paper from Web Buyer's Guide
Tags : 
lumension, usb, malware, security, data loss, threat, cybersecurity
    
Lumension
Published By: SugarCRM     Published Date: Jan 17, 2014
Das neueste Release von Sugar gibt Nutzern neue Tools für den Aufbau bester Kundenbeziehungen. Lesen Sie eine Analyse von Ovum über Sugar’s optimierte Leistungsfähigkeit, die Unternehmen beim Ausbau der Kundenbindung und –zufriedenheit unterstützt. (Report nur in Englisch verfügbar.)
Tags : 
swot assessment, sugarcrm, catalyst, software, crm, sugarcrm v7, relationship management, customer relationship, ovum, public cloud
    
SugarCRM
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Lumension     Published Date: Feb 04, 2011
With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.
Tags : 
usb security, network security, patch management, lumension, device management, security
    
Lumension
Published By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : 
usb, flash drive, mobile security, pii, personal information, malware, government information security
    
Lumension
Published By: McAfee Inc     Published Date: Mar 23, 2009
Today's workforce relies on USB drives all the more to share information - roadmap presentations, contracts, and sensitive or large files that can't be mailed. Find out which McAfee Encrypted USB Drives meet your needs.
Tags : 
mcafee, usb, encryption, drives, usb drives, data protection, data management
    
McAfee Inc
Published By: Raritan     Published Date: Sep 24, 2014
Connecting your PDUs to a Wi-Fi Network is only one reason, there's four more you should learn about now for your growing organization.
Tags : 
raritan, usb, power, data center, rack, pdu, wifi, webcam, green computing, power and cooling, data center design and management
    
Raritan
Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards, smart card, smart cards, regulatory compliance, online banking, ssl, banking, database security, aladdin
    
Aladdin
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
    
GFI
Previous   1 2    Next    
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.