What New Mobile Technology Means for Your Company's Data Security Policy
[ Source: 3M ]
July 2012-
The prevalence of mobile technology has led to unprecedented work efficiencies and a growing trend to "work anywhere, deliver anytime." Can your data security plan keep mobility from becoming a liability? Learn how to get the most out of today's mobile marketplace.
Visual Privacy in Healthcare
[ Source: 3M ]
July 2012-
In this age of electronic health records, we look to high-tech computer technology to help us implement privacy and security control for confidential data. However, many privacy incidents and breaches occur because human error and low-tech, rather than high-tech, shortcomings. The exposure of confidential patient information on a computer or smartphone display is a good example and highlights an important and often overlooked privacy and security risk - the issue of visual privacy.
Mitigating Risk - Visual Privacy in Practice
[ Source: 3M ]
July 2012-
The increasing mobility of workers, coupled with the growth of cloud-based services that allow access to data anytime, has forced security professionals to reexamine enterprise defense. On critical are of data-in-use protection is Visual Privacy - the defense of data as it is displayed on a screen. Enterprises need to rethink their security strategy to include the protection of data as it is displayed. This paper examines three in-practice approaches for integrating visual privacy controls ...
Neutralizing the Spyware Threat
[ Source: 8e6 Technologies ]
January 2008-
Spyware is an executable program with a single objective: to secretly monitor a computer and surreptitiously report information on activity to anyone willing to pay for it. R3000 Enterprise Filter network appliance is a flexible, highly scalable approach to identifying known spyware sites and blocking installation of suspicious programs. R3000 Enterprise Filter network appliance is a flexible, highly scalable approach to identifying known spyware sites and blocking installation of suspicious programs. 8e6s continuously updated ...
Web Filtering Appliances Heat Up the Hardware Vs. Software Debate
[ Source: 8e6 Technologies ]
January 2008-
Few constants in the IT and security industries - besides the relentless rate of change - is the recurring battle between advocates of dedicated hardware appliances and backers of software-based devices. Predictably, these arguments occur when a product or technology begins to gain critical mass and the associated market starts to show some profit potential. Web filters are the latest products to be caught in this war of words. These devices are the only effective ...
Social Security: A Background Briefing
[ Source: AARP ]
January 2008-
Social Security is the most successful program in American history. People look upon it as a promise - without an expiration date - that their nation has made to Americas workers, their families, and to the retirees. Social Security is financially strong and in no danger of ""Going broke"" anytime in the next couple of decades. However, it is true that the program is in need of long-term measures to keep it in fiscal ...
7 Trends in Video Security
[ Source: ADT ]
April 2011-
In order to meet the regulatory and security compliance mandates of CFATS, OSHA, and other agencies, businesses are demanding more and more of their video surveillance technology investment. As the technology improves and images become crisper, seven trends are emerging that security experts believe will grow in strength over the coming year. They include:
• The ability to reduce the cost of false alarms and compliance
• A favorable ROI on remote guarding <...
Managed Video Solutions Reduced Vandalism and Security Costs for a School Bus Company
[ Source: ADT ]
April 2011-
Responsible for transporting millions of students a day, this diversified transportation company maintains a fleet of several thousand school buses stored in multiple bus yards. Despite fencing and live security guards, buses were subjected to costly vandalism and theft, with estimated losses of $50,000 per incident. By installing and deploying a managed video solution they were able to virtually eliminate the problem. Solutions included:
• Video guard tours: Regularly scheduled visual sweeps ensure proper security ...
Microsoft Security Overview
[ Source: ARC Advisory Group ]
January 2008-
Security is a defensive maneuver that requires major new processes, such as rapid response patch management, and fundamental changes to software and devices that use every day such as Windows, the PC, and infrastructure. Security concerns are not new to manufacturing but increased risk and the inability to rapidly eliminate vulnerabilities in legacy systems is making industry progress difficult and more expensive. This paper from ARC Advisory Group concerns is impacting the design and management ...
The Directory-Enabled PKI Appliance: Digital Signatures Made Simple
[ Source: ARX, Inc. ]
February 2007-
This paper presents a novel approach for a PKI-based digital signature system for documents in an enterprise setting. A centralized appliance securely stores users' private signing keys. The appliance interfaces with the existing enterprise directory to automatically provision users' keys and certificates. Users authenticate to the appliance using their existing directory credentials in order to access their signing keys. Client applications send document hash values to the appliance to be signed, therefore the signing keys ...