MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
November 17, 2010
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. mark for My Articles similar articles
PC World
October 23, 2006
Andrew Brandt
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. mark for My Articles similar articles
InternetNews
March 12, 2007
Andy Patrizio
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. mark for My Articles similar articles
InternetNews
December 19, 2008
Andy Patrizio
One Laptop Per Child a Solar Movement No electricity? No problem. The One Laptop Per Child project has solar-powered laptops for kids in the most remote corners of the world. mark for My Articles similar articles
InternetNews
January 15, 2008
Andy Patrizio
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. mark for My Articles similar articles
Entrepreneur
September 2008
Heather Clancy
Unscramble This Encrypting data can save you lots of heartache. how should you do it? mark for My Articles similar articles
PC World
July 9, 2002
Lincoln Spector
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. mark for My Articles similar articles
Wall Street & Technology
May 31, 2007
Elena Malykhina
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. mark for My Articles similar articles
CIO
October 1, 2005
Top Five Ways to Waste Your IT Staff's Time A survey reveals what IT thinks is a waste of time. mark for My Articles similar articles
JavaWorld
May 2000
Todd Sundsted
Alternative deployment methods, Part 1: Beyond applets You designed your client's next big Java-based application, and now you must plan for its deployment. The end-user population consists primarily of several hundred nontechnical administrative personnel in offices that span four time zones.... mark for My Articles similar articles
National Defense
August 2013
Jeffrey G. Richardson
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. mark for My Articles similar articles
CIO
November 15, 2001
Software for All - COMPANIES TO WATCH Lanovation, a small software company in Minneapolis, wants to make your life easier. Specifically, it wants to help your systems administrators roll out software updates across your network... mark for My Articles similar articles
InternetNews
December 1, 2009
McAfee Tackles Portable Device Threats Security software maker looks to lock down portable USB drives and mobile devices. mark for My Articles similar articles
InternetNews
September 13, 2007
Andy Patrizio
Dell Adds Encrypting Drive to Latitude Line Dell announced it would offer Seagate's encrypting hard drive as an option for its Latitude line of laptops to provide "the world's most secure notebooks." mark for My Articles similar articles
BusinessWeek
November 19, 2007
Stephen H. Wildstrom
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. mark for My Articles similar articles
InternetNews
April 24, 2009
Andy Patrizio
Report: Hanging on to Old Notebooks a Bad Idea Long-term study finds holding on to old notebooks proves more costly than buying new. mark for My Articles similar articles
JavaWorld
July 2000
Todd Sundsted
Alternative deployment methods, Part 2: The best of both worlds How to combine the best features of applets with a handful of more traditional deployment techniques, creating a solution both easy to use and powerful enough for the enterprise mark for My Articles similar articles
Information Today
March 2006
Phillip Britt
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. mark for My Articles similar articles
InternetNews
February 20, 2009
Jennifer Schiff
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. mark for My Articles similar articles
InternetNews
February 22, 2008
Andy Patrizio
Laptop Encryption Has a Point of Weakness Researchers find a way to get at disk encrypted passwords under the right circumstances. mark for My Articles similar articles