Your are here:hacking technology > encryption decipher > Article list

Organizations must ensure that USB sticks can be used only in accordance with the corporate securityHits:8
?How often do you have a USB flash drive in your office?Hundreds?Miles?His sheer convenience of use almost second nature. But as so often with computer security, each time a device?t popul or platform?r, it is also a target for b?sartige...12/23/2010
WinMagic ectacom distribution agreement to distribute full SecureDoc Disk Encryption L?solutionsHits:33
WinMagic has signed a distribution agreement that ectacom GmbH, a leader in the DACH region to sch?down signed allowed?Additives provider of business continuity, enterprise-class IT Risk Management-L?solutions and security, the...12/22/2010
User-k?can not trust the new security features in Windows 7 onlyHits:9
Recent tests have shown that increased Windows 7 User Account Control than seven out of ten of malware, as to the operating system. With Windows 7 anf shows?llig if safety tests, technical PNC encourages all companies to Sicherheitsma?took...12/21/2010
PGP Universal Gateway Email secures electronic communications Browne JacobsonHits:65
Founded in 1832, Browne Jacobson is one of the gr??th firms in GreatBritain with branches in Birmingham, London and Nottingham. Once in the Gr??e vervierfachtoder in the last ten?Years the company has 251 Anw?lten. Browne...12/20/2010
ATEME secured the headquarters of the gendarmerie in Franz?Sische CorsicaHits:11
ATEME was NextiraOne and Franz?Sische gendarmerie was weight?hlt to encoding L?Including solutions?Lich provide the transmission, recording and transcoding of a project, with the headquarters of the gendarmerie in Corsica weight?...12/18/2010
Let your mobile device?te on the back of the taxiHits:10
London taxi drivers warn that this is the worst time of year istoder exit from mobile device?th such as mobile phones, laptops and USB sticks in the back of their cabins so dam?ftigt K?shore diving in and out of their cabins,...12/17/2010
Corporate laptops remain anf?llig for theft or loss of dataHits:7
According to a new survey from Check Point Software Technologies Ltd., said only 41% of respondents had data encryption L?solutions in business notebooks used. 51% said no encryption, and 8% said they did not know if encryption was used....12/16/2010
Encryption techniques are not sure about the security of data and network security leave vulnerableHits:8
The companies are unreliable?regularly practices and unprotected and tools for data security, encryption, have no basis for the security. The lack of leadership and education, which companies use encryption to leave uncertain data security...12/15/2010
Most organizations are not able to control when users copy or move data on mobile device?thHits:6
According to recent research, Bell Micro, only 62 percent of British companies were able to control when users copy or move data from your company IT resources on portable device?ten. The study says that about 35 percent of the...12/14/2010
Company k?able data and different operating systems with Check Point Full Disk Encryption for Mac OSHits:15
Check Point Software Technologies Ltd. Check Point Full Disk Encryption for Mac OS X Snow Leopard 10.6, a hard disk encryption L?solution with pre-boot authentication for Mac operating systems support Check Point Full Disk Encryption...12/13/2010
PGP Whole Disk Encryption for use in the Defense Ministry and the British ArmyHits:30
The electronic data by the Ministry of Defence, British Army, Royal Navy and Royal Air Force held an increasingly important role in national defense and military intelligence?generic operations. PGP Corporation has announced that...12/11/2010
Overtis identifies five gaps that contribute to data lossHits:10
Data loss w?during the year?or the past has mostly been reported by commercial businesses. The 692 data breaches reported since the ICO one?or 2007, the gr??th number (205) were in the private sector. Corporate data loss at all?floor...12/10/2010
Technical security challenges of online shopping at workHits:9
A recent survey conducted by ISACA, found while shopping online at work or working on a device?t, many people do activity?th, the GEF your employer?hrden, for example, k?nnte clicking on links in e-mails (52%), the provision of working e...12/09/2010
Check Point Full Disk Encryption offers a H?chstma?of data security for laptops and PCsHits:26
EAL4 is the h?Next existing standard encryption products get k?can, and shows the product through a long process and strict scrutiny is gone. The International Organization for Standardization initially?grows accepted and used Common...12/08/2010
Wolverhampton City Primary Care Trust meet encrypted e-mail communication with Axway Secure MessengeHits:15
Wolverhampton City Primary Care Trust (PCT) has launched Secure Messenger Axway to enforce, input-output encrypted e-mail communications and security for all users in more than 100 remote sites based. Wolverhampton City PCT existing e-mail...12/07/2010

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:5 , Total 33 Pages, Every Page 15 Records, Total Records: 491

Hot Articles
Recommend Articles
New Articles
Sub category