Similar Articles |
|
InternetNews November 17, 2010 |
Dell Rolls Out File Level Encryption App New endpoint encryption software makes improves security of mobile devices, laptops and desktops and makes it easier to meet new data protection regulations. |
PC World October 23, 2006 Andrew Brandt |
Privacy Watch: How to Secure Files on Your Hard Drive Encryption software is easier than ever to install and run. |
InternetNews March 12, 2007 Andy Patrizio |
Seagate Delivers Encrypting Hard Drive Seagate on Monday announced a partnership with ASI Computer Technologies to deliver laptops with encrypted hard drives. The advantage of these drives is if the notebook is lost or stolen, the data on the drive is inaccessible. |
InternetNews December 19, 2008 Andy Patrizio |
One Laptop Per Child a Solar Movement No electricity? No problem. The One Laptop Per Child project has solar-powered laptops for kids in the most remote corners of the world. |
InternetNews January 15, 2008 Andy Patrizio |
PGP Updated to be a Good Citizen New version of Encryption Platform makes it play nicer with others on your computer. |
Entrepreneur September 2008 Heather Clancy |
Unscramble This Encrypting data can save you lots of heartache. how should you do it? |
PC World July 9, 2002 Lincoln Spector |
Hard Drive Security Tool Ships PC Guardian updates Encryption Plus, on-the-fly file encryption program for networked PCs. |
Wall Street & Technology May 31, 2007 Elena Malykhina |
Indentity Theft-Related Data Breaches Inceasingly Stemming From Laptop Theft More than half of identity theft-related data breaches stem from the theft or loss of a laptop or storage device. Yet most companies aren't locking down every laptop. Maybe the data isn't worth the price of securing the computer, but for most financial services companies there are no excuses. |
CIO October 1, 2005 |
Top Five Ways to Waste Your IT Staff's Time A survey reveals what IT thinks is a waste of time. |
JavaWorld May 2000 Todd Sundsted |
Alternative deployment methods, Part 1: Beyond applets You designed your client's next big Java-based application, and now you must plan for its deployment. The end-user population consists primarily of several hundred nontechnical administrative personnel in offices that span four time zones.... |
National Defense August 2013 Jeffrey G. Richardson |
Use Caution When Traveling With Encryption Software If you bring a laptop or smartphone outside of the United States, you need a basic understanding of how international export control laws may apply to your device's encryption software. |
CIO November 15, 2001 |
Software for All - COMPANIES TO WATCH Lanovation, a small software company in Minneapolis, wants to make your life easier. Specifically, it wants to help your systems administrators roll out software updates across your network... |
InternetNews December 1, 2009 |
McAfee Tackles Portable Device Threats Security software maker looks to lock down portable USB drives and mobile devices. |
InternetNews September 13, 2007 Andy Patrizio |
Dell Adds Encrypting Drive to Latitude Line Dell announced it would offer Seagate's encrypting hard drive as an option for its Latitude line of laptops to provide "the world's most secure notebooks." |
BusinessWeek November 19, 2007 Stephen H. Wildstrom |
Data Protection for the Rest of Us New hard drives can give your computer inexpensive, government-style security. |
InternetNews April 24, 2009 Andy Patrizio |
Report: Hanging on to Old Notebooks a Bad Idea Long-term study finds holding on to old notebooks proves more costly than buying new. |
JavaWorld July 2000 Todd Sundsted |
Alternative deployment methods, Part 2: The best of both worlds How to combine the best features of applets with a handful of more traditional deployment techniques, creating a solution both easy to use and powerful enough for the enterprise |
Information Today March 2006 Phillip Britt |
The Encryption Code While encryption can protect data from hackers and companies from security breaches, many companies have yet to adopt this type of data protection. |
InternetNews February 20, 2009 Jennifer Schiff |
Five Ways to Improve Data Protection As storage vendors debate encryption key management, experts weigh in on steps you can take to protect your data now. |
InternetNews February 22, 2008 Andy Patrizio |
Laptop Encryption Has a Point of Weakness Researchers find a way to get at disk encrypted passwords under the right circumstances. |