USB Research
-
Royal Holloway: An enhanced approach for USB security management
Sponsored by: TechTarget ComputerWeekly.comUSB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
Expands the workspace with one single cable
Sponsored by: MMDCheck out the following solution brief to get a firsthand look at what's new to the world of docking stations. See how with USB 3.0 you can virtually eliminate the need for excess wires, actually increase worker well-being, and more.
-
EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
Sponsored by: GlobalscapeThis whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
-
Three Ways to Prevent USB Insecurity
Sponsored by: LumensionThis crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
Sponsored by: LumensionThis case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
Salvation Army Protects the Integrity of Data and Global Brand
Sponsored by: LumensionProtecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
-
How to Achieve Device Control Peace of Mind
Sponsored by: LumensionUncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
-
Beyond Passwords & Outdated Physical Access Systems
Sponsored by: Entrust, Inc.Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
-
Frequently Asked Questions (FAQ): SAN Acceleration Using FalconStor Network Storage Server (NSS)
Sponsored by: FalconStor SoftwareDo you have questions regarding SAN acceleration? Learn more about solid state storage, which solid state technologies are currently on the market, and why your enterprise needs solid state storage. This concise white paper is designed to answer frequently asked questions on these topics and more.
-
Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
Sponsored by: LumensionRead this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
-
How to Prevent Security Breaches Through Effective Management and Control of USB Devices
Sponsored by: LumensionLearn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
-
The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
Sponsored by: IronKeyCheck out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
-
Nucleus RTOS
Sponsored by: Mentor GraphicsComplex microprocessors lie at the heart of every electronic device and embedded system in use today - from mobile phones to brain scanners. Such products demand sophisticated software to get the job done, and that's where operating systems come in.
-
New Insider Threat Emerges in the New Economy
Sponsored by: LumensionLearn how employees and partners are engaging with IT assets and intellectual property.
-
Dell ProSupport Hard Drive Data Recovery Service
Sponsored by: DellEMC and Intel®Dell's Hard Drive Data Recovery Service gives customers of all sizes - from small businesses to large public companies and government agencies - the opportunity to recover data from a failed hard drive.
-
The SAP Virtualization Ecosystem
Sponsored by: VMware and IntelThis paper discusses the options available to you for virtualizing SAP, the big cost savings you can expect from virtualization, and why you should go virtual right away.
-
Citrix XenApp 5.0: Preparing for a Successful Migration
Sponsored by: visionappCitrix XenApp 5.0 offers new functionality: with preferential load balancing, preset values can now be applied to both specific users and particular applications.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Paramount Foods Upgrades Store Technology
Sponsored by: Hewlett Packard EnterpriseRead how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers.
-
HP - rp5700 Point of Sale System
Sponsored by: Hewlett Packard EnterpriseThe HP rp5700 Point of Sale System gives you a flexible point-of-sale platform that can go from the front of the store to the back office.
-
Tera1100 PC-over-IP Portal Processor Product Brief
Sponsored by: Teradici CorporationThe TERA1100 Portal Processor is designed to be integrated into a Desktop Portal, a small device at the end-user's desk.
-
The Threats Posed by Portable Storage Devices
Sponsored by: GFI SoftwareThis white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
-
Mobile Data Security Essentials for Your Changing, Growing Workforce
Sponsored by: CREDANT TechnologiesDownload this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
-
Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
Sponsored by: SecureWaveThis article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.