USB Reports

Royal Holloway: An enhanced approach for USB security management
sponsored by TechTarget ComputerWeekly.com
RESOURCE: USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 08 Feb 2021 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

Nucleus RTOS
sponsored by Mentor Graphics
SOFTWARE DEMO: Complex microprocessors lie at the heart of every electronic device and embedded system in use today - from mobile phones to brain scanners. Such products demand sophisticated software to get the job done, and that's where operating systems come in.
Posted: 14 Apr 2009 | Premiered: 14 Apr 2009

Mentor Graphics

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Dell ProSupport Hard Drive Data Recovery Service
sponsored by DellEMC and IntelĀ®
DATA SHEET: Dell's Hard Drive Data Recovery Service gives customers of all sizes - from small businesses to large public companies and government agencies - the opportunity to recover data from a failed hard drive.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

DellEMC and IntelĀ®

The SAP Virtualization Ecosystem
sponsored by VMware and Intel
PRESENTATION TRANSCRIPT: This paper discusses the options available to you for virtualizing SAP, the big cost savings you can expect from virtualization, and why you should go virtual right away.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

VMware and Intel

Citrix XenApp 5.0: Preparing for a Successful Migration
sponsored by visionapp
WHITE PAPER: Citrix XenApp 5.0 offers new functionality: with preferential load balancing, preset values can now be applied to both specific users and particular applications.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

visionapp

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Paramount Foods Upgrades Store Technology
sponsored by Hewlett Packard Enterprise
CASE STUDY: Read how the owner of a North Carolina based food company found a way to keep up with major supermarket chains with HP POS hardware and servers.
Posted: 18 Mar 2008 | Published: 01 Oct 2006

Hewlett Packard Enterprise

HP - rp5700 Point of Sale System
sponsored by Hewlett Packard Enterprise
DATA SHEET: The HP rp5700 Point of Sale System gives you a flexible point-of-sale platform that can go from the front of the store to the back office.
Posted: 18 Mar 2008 | Published: 01 Aug 2008

Hewlett Packard Enterprise

Tera1100 PC-over-IP Portal Processor Product Brief
sponsored by Teradici Corporation
PRODUCT LITERATURE: The TERA1100 Portal Processor is designed to be integrated into a Desktop Portal, a small device at the end-user's desk.
Posted: 10 Mar 2008 | Published: 10 Mar 2008

Teradici Corporation

The Threats Posed by Portable Storage Devices
sponsored by GFI Software
PRODUCT LITERATURE: This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007

GFI Software

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY: This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006

SecureWave