portable

Results 26 - 43 of 43Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : usb, flash drive, mobile security, pii, personal information, malware, government information security
     Lumension
By: PDF Tools     Published Date: Aug 21, 2009
PDF files are prevalent in virtually all market segments worldwide. Most people know and use the term "PDF" but have misconceptions what it can and can't do. The purpose of this White Paper is to explain what PDF actually is and what it's strengths and limitations are.
Tags : content delivery, document management, information management, ebusiness, enterprise software, pdf, portable document format, adobe, acrobat, document, pdf tools, it management, enterprise applications
     PDF Tools
By: IBM     Published Date: Apr 26, 2013
Virtualization continues to lead a sea change for enterprise-scale data centers and cloud environments, delivering well-established benefits such as cost savings, reduced physical space and power requirements, simpler and more flexible testing environments, faster server provisioning, and improved return on investment. Yet for many organizations, one of virtualization’s greatest benefits is only now being realized in the form of highly portable and flexible virtual images. Natural extensions of virtualization technology, virtual images help organizations achieve even greater efficiencies and cost savings.
Tags : control, virtual, lifecylce, enterprise, data centers, cloud environments, virtualization
     IBM
By: Tripp Lite     Published Date: May 31, 2016
This White Paper will: • Outline the challenges of cooling evolving IT infrastructure • Explain close-coupled cooling, available solutions, and the advantages compared to conventional perimeter systems • Recommend a plan of action to identify and solve cooling issues in your environment
Tags : tripp lite, close coupled it cooling solutions, best practices, data centers, it infrastructure, rack cooling, spot cooling, network cooling, data center cooling, server cooling, it equipment cooling, spot cooler, portable cooling, it management, enterprise applications, data management, data center
     Tripp Lite
By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
     Absolute Software
By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
     Absolute Software
By: iDirect     Published Date: Jan 29, 2007
With careful monitoring of competitors’ sites and reporting of any violations of search engine terms of service found, search engine results can in fact be directly affected. Learn how to identify your online competitors as well as common issues that can lead to reportable SEO violations.
Tags : search marketing, search engine optimization, seo, competitive analysis, seo firms, seo firm, competitors, competitor marketing
     iDirect
By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : quocirca, encryption, security, information protection, compliance, data management
     Quocirca
By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
     GFI
By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
     GFI
By: Adlib Software     Published Date: Aug 21, 2007
Read this whitepaper to learn about PDF/A and how it must be implemented in conjunction with tools and applications to manage records according to the various business practices and recordkeeping processes today's information-dependant organizations employ.
Tags : data management, adlib, adlib software, document management, pdf, portable document format, adobe acrobat, pdfs, records management
     Adlib Software
By: ElcomSoft     Published Date: Dec 06, 2007
Rapid development of digital technologies and electronic communication, availability of mobile PCs and smart phones, abundance of tools for creating documents or high-quality presentations coupled with constantly growing volumes of information and yearning for doing business more effectively leads to switching to electronic exchange of information.
Tags : pdf, acrobat, adobe acrobat, document security, secure content, secure pdf, password recovery, pdf password, elcomsoft, portable document, document management
     ElcomSoft
By: Catalyst SF     Published Date: Feb 29, 2008
This white paper has been written for executives at media publishing and content companies interested in learning about the exploding “non-streamed” or portable video market and finding out about best practices for driving revenue through advertising in this medium.
Tags : downloadable video, downloadable media, video, catalyst, catalyst sf
     Catalyst SF
By: HP - Enterprise     Published Date: Jun 05, 2013
Mobile applications have swept across geographic boundaries, cultures, and enterprises faster than any previous technology innovation. Consumers around the world use them to find their way when they travel by car and verify flight details when they travel by air. They check bank balances and sports scores, reserve theater tickets and dining reservations, shop online, pay bills, download entertainment, and participate in dozens of other everyday activities—using convenient portable devices like smart phones and tablets. The demand for this kind of convenience has spilled over into the world of work as well, and employees today expect to use their mobile devices to check email, participate in meetings, access files—even use enterprise applications, like ERP and CRM, that drive business processes.
Tags : mobile application, mobile convenience, business opportunities, travel
     HP - Enterprise
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
     Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
     Data Guard Systems, Inc
By: Dell & Microsoft     Published Date: Mar 06, 2014
Many small business people today are constantly on the move. So when it comes to purchasing new computers, it’s tough to decide whether a desktop, laptop, or tablet will give you the most bang for your buck. Download this 2-minute video to learn how a small business owner chose the Dell XPS 18 Portable All-in-One Desktop with Touch and got all three options in one, with benefits including: o The new Windows, which allows for increased productivity and ease-of-use with touch-based apps o Desktop power made portable o A huge 18.4” Full-HD touch display for amazing presentations (no need to lug a projector) o Built-in feet, with an optional docking stand and keyboard for when you’re in the office Download this short video and see how the Dell XPS 18 can help organize your life and solve your digital business challenges.
Tags : dell, windows 8, dell xps 18, tablet, large screen tablet, mobile, mobile presentations, business tablet
     Dell & Microsoft
By: Lenovo UK     Published Date: Oct 15, 2018
Avec un ordinateur portable volé chaque minute, comment conciliez-vous la menace pour la sécurité et le besoin croissant de mobilité de la main-d'œuvre et d'une productivité accrue? Avec le ThinkPad optimisé par les processeurs Intel® Core ™ i7 vPro ™, vous bénéficiez de l’approche 360 de Lenovo en matière de sécurité. Plus la durabilité pour garder vos utilisateurs en mouvement et productifs à chaque étape de leur journée de travail. En savoir plus dans notre infographie. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, le logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, le logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside et Intel Optane sont des marques commerciales d'Intel Corporation ou de ses filiales aux États-Unis et/ou dans d'autres pays.
Tags : 
     Lenovo UK
Previous    1 2     Next   
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com