X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 portable device security


Case Study: IT Asset Security Tool Helps Healthcare Provider Track 97% of Laptops
Learn how IT asset tracking tools helped Allina Hospitals and Clinics monitor 2,700 computers on and off their network without having to invest in additional

portable device security  in how we managed portable devices, says Myrvold. Since we began to use laptops extensively, we had experienced a sharp increase in computer theft but this was the first time we had lost a laptop with this type of data on it. Laptop security was a potential hole in our otherwise robust data security strategy . Two months after the data breach, Myrvold and his team began implementing Computrace IT asset management, theft recovery and data protection software on all of Allina's mobile computers.

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » portable device security

Palm Tries to Take the Desktop in Hand


Palm Computing to offer software to allow Palm devices to network with enterprise systems and applications.

portable device security   Read More

Mobile Learning: Is Your Business Ready for It?


The popularity of mobile technology has brought mobile learning (m-learning) to one’s fingertips. M-learning takes advantage of the mobility of the learner and the lightweight portability of the mobile device to support learning nuggets of content at anytime and from virtually anywhere. This article reviews issues this trend has raised and technical challenges businesses must overcome to implement this learning strategy.

portable device security   Read More

Pod Slurping-An Easy Technique for Stealing Data


Just when you thought you had all your security measures figured out, along comes the portable storage device to make you question them all over again. With the popularity of portable consumer products—and their ever-increasing storage space—comes a greater risk of losing sensitive corporate data. To secure corporate data, companies must not only focus on perimeter security, but on internal security weaknesses as well.

portable device security   Read More

Mirapoint Adds Web-Mail Client to Messaging Appliance Line


Given that the SP can host well over 200,000 mailboxes, the cost of the WebMail Direct option is minimized to approximately .16 cents a mailbox (bringing the total cost of a mailbox, including hardware to just shy of .80 cents (US).

portable device security   Read More

Security Breach: Now What?


When people's lives or financial transactions are at risk, proper Security Incident handling is of extreme importance.

portable device security   Read More

Malware Security Report


Learn how to protect your company in the VeriSign Malware Security Report.

portable device security   Read More

Which is Best: Cloud-Based or on-Premise Web security?


As you'll discover in the Aberdeen report, Web Security in the Cloud: More Secure!

portable device security   Read More

Developing a Security-oriented Corporate Culture


JurInnov’s director of information systems and security provides a detailed analysis of why development of a security-oriented corporate culture is imperative for companies wishing to keep their electronically stored information secure.

portable device security   Read More

Aberdeen Research Brief: Email Security in the Cloud-More Secure! Compliant! Less Expensive!


This paper compares on-premise versus SaaS, hosted solutions for email security. You can see that there is research that proves hosted services is a better choice for compliance, security, and costs, especially when it comes to email. If you’re an IT managers who is undecided about the SaaS model, this is a must-read.

portable device security   Read More

Data Security Is Less Expensive than Your Next Liability Lawsuit: Best Practices in Application Data Security


Insecure data. Heavy fines due to non-compliance. Loss of customers and reputation. It adds up to a nightmare scenario that businesses want to avoid at all costs. However, this nightmare is preventable: knowledge base-driven data security solutions can be critical tools for enterprises wanting to secure not only their data—but also their status in the marketplace.

portable device security   Read More