Five Ways To Secure Your Systems Against Hackers TAGS: endpoint security | malware “Boss, I think that someone stole sensitive information from my system.” Those are words that no computer user ever wants …Continue reading →
March 19, 2024
Five Ways To Secure Your Systems Against Hackers TAGS: endpoint security | malware “Boss, I think that someone stole sensitive information from my system.” Those are words that no computer user ever wants …Continue reading →
Windows 7 Network Security TAGS: endpoint security | windows While Windows XP remains the world’s most widely used client computer operating system, experts project that Windows 7 adoption will …Continue reading →
Endpoint Security for BYOD TAGS: endpoint security | mobile devices From iPhones and Android devices to tablets and notebooks, employees are increasingly bringing devices from home to the office for …Continue reading →
Windows vs. Mac Security: An Enterprise Endpoint Security Comparison TAGS: endpoint security | macintosh | windows Everywhere we look we see reports and hear anecdotes that the Macintosh invasion of the enterprise is underway. Indeed, when …Continue reading →
Podcast: Endpoint encryption strategies TAGS: encryption | endpoint security When a laptop turns up stolen, it’s reassuring to know that the contents of the device were encrypted, transforming a …Continue reading →
Product review: Promisec’s Spectator TAGS: endpoint security | product review The endpoint security is today’s hot button information security issue, and the marketplace is flooded with solutions ranging from costly …Continue reading →
Hot Pick: SecureWave’s Sanctuary Device Control 3.0.1 TAGS: endpoint security | product review It’s your company’s equipment and your company’s intellectual property. If you don’t want employees treating either as if it were …Continue reading →
Bridging the gap between perimeter and host security TAGS: endpoint security | firewall Most organizations recognize the importance of information security and devote resources to an information security program with adequate technical controls. …Continue reading →
Desktop Security: GreenBorder Enterprise Security TAGS: endpoint security | malware | product review Enterprise Security Solution doesn’t detect anything; it protects Internet Explorer and Outlook users from themselves through a sandboxing technique that …Continue reading →
XP SP2’s effect on your Web site TAGS: endpoint security | web security Last month’s XP SP2 rollout was one of the highest-profile software releases yet. Unlike previous service packs and hotfixes, SP2 …Continue reading →