credant technologies

Results 1 - 3 of 3Sort Results By: Published Date | Title | Company Name
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption, vulnerability
    
CREDANT Technologies
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
    
CREDANT Technologies
Published By: CREDANT Technologies     Published Date: Apr 06, 2011
This whitepaper will examine some best practices for managing BitLocker®, as well as discuss how to more easily integrate BitLocker encryption into your security program and reduce the overhead of both key management and reporting.
Tags : 
credant technologies, bitlocker encryption, best practices, reporting
    
CREDANT Technologies
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept