Home
 > search for

Featured Documents related to »  laptop encryption


The CyberAngel: Laptop Recovery and File Encryption All-in-One
Relevant Technologies took the CyberAngel into our labs to test it for our acceptability rating. It worked as advertised, and had more features than expected.

laptop encryption  CyberAngel: Laptop Recovery and File Encryption All-in-One Background According to the Computer Security Institute's 2003 Computer Crime and Security Survey, theft of private or proprietary information created the greatest financial losses for the survey respondents. If you are a medical institution, government agency, or financial institution, information theft can result in violation of patient privacy regulations, loss of customer credit card numbers, unauthorized financial transactions, or Read More...
Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » laptop encryption


A Brief Word on Asset Management and Laptops
Disconcerting? That's hardly what one feels when losing a laptop, and when it's stolen ... ? Lackadaisical, however, seems to be the approach most

laptop encryption  extend to laptops, but laptop security is one area that's often overlooked, even by the most meticulous enterprises. An enterprise can incorporate several policies in their asset management policies to ensure that its laptops are secure. First, it can create and enforce policy on the use of mobile devices, such as what information can be stored on it, encryption tools (and where the encryption key is stored), etc. and enforce it.  Second, it can use tracking devices that allow the laptop to be traced Read More...
Lost Your Laptop? The CyberAngel® Brings It Back
A company known as Computer Sentry Software, Inc. has designed an innovative option for laptop recovery. With laptop theft on the rise, investing in an

laptop encryption  lot of people, your laptop is one of the most important of your personal or work possessions. If it got stolen or lost, you'd want it back. A company known as Computer Sentry Software, Inc. has designed an innovative option for laptop recovery. With laptop theft on the rise, investing in an affordable laptop recovery package is well worth the investment. According to Safeware Insurance , a company that insures against theft, laptop theft rose 21% from 1999 to 2000. Computer Sentry Software, Inc . based Read More...
Lexiguard&;: The Coming
A cool new desktop encryption product has been unveiled by Lexias, Inc. at RSA Conference 2000. With a simple and easy-to-use interface and affordable price

laptop encryption  ;: The Coming Adobe Acrobat of Encryption Event Summary Last week at RSA Conference 2000, Lexias, Inc. unleashed a desktop encryption product which someday could become the defacto desktop encryption application of choice if Lexias plays their cards right. Known as Lexiguard 1.0, this desktop PKI solution is easy to install, easy to use, and may be one of the hottest new security products of the 21st century. The flexible user interface allows you to select your choice of five symmetric Read More...
Are Your Laptops Protected against Careless Employee Use?
The best encryption and security policies will not protect your laptops against careless employee use. Learn about the latest innovations in tracking IT assets

laptop encryption  Encryption Key to Stolen Laptop Hospital Employee Tapes Encryption Key to Stolen Laptop IT and security staff at a 2,400-physician Michigan-based hospital were justifiably concerned when they learned that a nurse s laptop computer had been stolen. Of greater concern was the fact that the nurse had contravened the hospital s data security policy and affixed the laptop s encryption key to the front of the computer. Fortunately, the hospital had protected the laptop with the Computrace endpoint security Read More...
PeopleSoft on Client/Server and Database Issues
To address questions for a TEC customer, we interviewed PeopleSoft's Michael Daniels. The conversation covered issues in the areas of client/server architecture

laptop encryption  on Client/Server and Database Issues Event Summary To answer questions for a Technology Evaluation Center customer, a large utility in the northeastern United States, TEC interviewed Michael Daniels of PeopleSoft on how the PeopleSoft ERP product performs in the areas of client/server architecture and database management. Question: Is PeopleSoft designed as a fault tolerant environment? Exactly how is this accomplished? Is the failover manual or automatic? Mr. Daniels: PeopleSoft clients use a Read More...
Understanding the PCI Data Security Standard
The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a

laptop encryption  the PCI Data Security Standard MessageLabs Hosted Web Security and Content Filtering service operates at the Internet level, intercepting viruses, and spyware. Source : MessageLabs | Now part of Symantec Resources Related to Understanding the PCI Data Security Standard : Payment Card Industry Data Security Standard (PCI DSS) (Wikipedia) Understanding the PCI Data Security Standard Data Security is also known as : Data Security Architecture , Data Security Articles , Data Security Audit , Read More...
Case Study: Ruckus Wireless
Like all fast-growing companies, Ruckus Wireless needed to continue to innovate quickly, speed products to market, manage costs, and meet quality and regulatory

laptop encryption  Card , Wireless Router Laptop , Wireless Router Key , Wireless Router Installation , Wireless Router Help , Wireless Router Connection , Wireless Router Cable , Wireless Router 802 , Wireless Router 802.11 , Wireless Repair , Wireless Networks Security , Wireless Networking Security , Wireless Networking Router , Wireless Networking Connection , Wireless Network for Small Business , Wireless Network for Business , Wireless Network Solutions , Wireless Network Software , Wi-Fi Technology Innovator Ruckus Read More...
PKI and Biometrics Ready for Take-Off
Expect the new e-signature law to bolster both the PKI and biometric markets. This new law allows documents signed through digital signatures to have the same

laptop encryption  Identix's easy to install laptop versatile type II PCMCIA card BioTouch product is particularly interesting. The type II PCMCIA card sports an on-board fingerprint scanner that can catalog multiple fingers per user. The scanner pokes out the side of your laptop,and is a little bigger than a postage stamp. You pop out the fingerprint printer in the same way that you pop out an PCMCIA modem interface, and put your finger on the reader to authenticate. It interoperates with Identix's other products called Read More...
Enabling IPhones in the Enterprise
Find out how to safely onboard them to your company's Exchange server in Enabling iPhones in the Enterprise.

laptop encryption  IPhones in the Enterprise More and more, employees are insisting on using their personal iPhones for company business. Find out how to safely onboard them to your company's Exchange server in Enabling iPhones in the Enterprise . You'll learn the essentials of configuring iPhones for enterprise access—including procedures for enforcing device passwords and encryption policy, and wiping corporate data if the device is lost or the employee leaves. It all comes down to four simple steps—learn Read More...
Server-gated Cryptography: Providing Better Security for More Users
Server-gated cryptography (SGC) as part of your secure socket layer (SSL) certificate can protect you from the dangers waiting in cyberspace. But first you

laptop encryption   Read More...
Closing the Legacy Gap: Protecting Legacy Systems with FDE
Protecting your company’s data is not only wise, but often legally necessary. In order to beef up their data security programs, more companies are implementing

laptop encryption  the Legacy Gap: Protecting Legacy Systems with FDE Protecting your company’s data is not only wise, but often legally necessary. In order to beef up their data security programs, more companies are implementing full disk encryption (FDE). In the past, FDE was software based, which left it open to greater security risks. With the advent of new technology, however, it is now possible to migrate from software- to hardware-based FDE while still protecting your existing systems. Read More...
WAP Forum Specifies RSA’s RC5 Encryption For Wireless
As the wireless community continues to grow at mind-boggling rates, security has become a key concern, not only in the eyes of users, but also to vendors and

laptop encryption  Forum Specifies RSA’s RC5 Encryption For Wireless WAP Forum Specifies RSA's RC5 Encryption For Wireless P. Hayes - May 9, 2000 Event Summary BEDFORD, Mass., On April 20 - RSA Security Inc. (NASDAQ:RSAS) announced that the WAP Forum has specified RSA Security's RC5 encryption algorithm for its WTLS (Wireless Transport Level Security) specification. At the April WAP Forum Developer's Symposium in Miami, Florida, the committee voted to include RSA Security's RC5 algorithm as an encryption technology for Read More...
Are Your Company Laptops Truly Secure?
The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and

laptop encryption  Lojack for Laptops , Laptop Security Encryption , Laptop Security Locks , Laptop Tracking Software , Laptop Full Disk Encryption , Data Encryption Laptops . SYNOPSIS The Information Technology (IT) environment has changed significantly in a few short years, as several factors have dictated the need for a more robust approach to corporate security policies, including: trend towards mobility of information, Theft of IT assets arising from a proliferation of mobile devices, Increasing data privacy and data Read More...
Firewall RFI/RFP Template
Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies

laptop encryption   Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others