app protection

Results 351 - 355 of 355Sort Results By: Published Date | Title | Company Name
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware
    
Secure Computing
Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
    
KACE
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15     Next   End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.