ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
PRODUCT LITERATURE:
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
WHITE PAPER:
Citrix XenApp 5.0 offers new functionality: with preferential load balancing, preset values can now be applied to both specific users and particular applications.
PRESENTATION TRANSCRIPT:
Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
DATA SHEET:
Dell's Hard Drive Data Recovery Service gives customers of all sizes - from small businesses to large public companies and government agencies - the opportunity to recover data from a failed hard drive.
WHITE PAPER:
Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
CASE STUDY:
This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
CASE STUDY:
Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers.