Logan G. Harbaugh is a longtime technology journalist with experience reviewing a wide range of IT products. Every week, there are new reports of data breaches at organizations of every type.
Jason covers desktop applications and help desk utilities, including reviews geared toward the IT end-user support function. Jason is the PC infrastructure manager for Harcros Chemicals, a worldwide ...
Check Point Software Technologies responded to the mobility trend by offering three secure communications products. For starters, Check Point has its IPSec VPN Software Blade for remote access. Scott ...
Karen Schwartz is a freelance technology writer based in the Washington D.C. area. With more than 300,000 students and 356 school sites, Nevada’s Clark County School District is one of the largest in ...
General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies ...
Trend Micro has released security updates to address multiple critical-severity remote code execution and authentication bypass vulnerabilities that impact its Apex Central and Endpoint Encryption ...
Encryption secures information by translating it into computer code that’s unreadable to those who don’t have the means to access the information. These means of access can include passwords, ...
Endpoint security platforms have become commonplace on end-user devices and Internet-facing systems. In addition to malware and spyware protection, an enterprise-grade endpoint security platform ...
Encryption of data at rest is essential for securing portable endpoints (e.g. laptops) in the event they are lost, stolen or inappropriately decommissioned. It isn’t optional; it’s a fundamental ...
Pointsec Mobile Technologies last week released software designed to restrict or block data transfers over various ports on a mobile device. The new release of Pointsec Device Protector adds optional ...