Downloads
-
Copy Machines: The Unlikely Threat To Your Health IT Network
4/1/2010
Last month we talked about how we are similar and this month I’m going to highlight one of those similarities: printer/copiers. Or as they are referred to by the vendors and leasing companies: multifunction devices. By Mark Kadrich, president and CEO, The Security Consortium
-
Guest Column: Copy Machines: The Unlikely Threat To Your Health IT Network
4/1/2010
Last month we talked about how we are similar and this month I’m going to highlight one of those similarities: printer/copiers. Or as they are referred to by the vendors and leasing companies: multifunction devices. By Mark Kadrich, president and CEO, The Security Consortium
-
DCR-8 - Dual-Controlled Remote Broadband Switch
3/30/2010
The DCR-8 is an eight port switch remotely controllable via USB or Ethernet. The switch automatically recognizes either type of control connection. Control microwave signals with a laptop or PC using the USB interface or remotely over the internet.
-
DCR-8 — Dual-Controlled Remote Broadband Switch
3/30/2010
The DCR-8 is an eight port switch remotely controllable via USB or Ethernet. The switch automatically recognizes either type of control connection. Control microwave signals with a laptop or PC using the USB interface or remotely over the internet.
-
A Smarter Approach To Protecting Data In Motion
2/15/2010
Protecting data in motion has become a high priority for a growing number of companies. As more companies face the real and growing threat of data theft, along with increased regulatory pressure to protect their data, encryption of data in motion has gone from a “nice to have” technology to a budgeted project. By CipherOptics, Inc.
-
White Paper: A Smarter Approach To Protecting Data In Motion
2/15/2010
Protecting data in motion has become a high priority for a growing number of companies. As more companies face the real and growing threat of data theft, along with increased regulatory pressure to protect their data, encryption of data in motion has gone from a “nice to have” technology to a budgeted project. By CipherOptics, Inc.
-
NetVault®: SmartDisk™
11/2/2009
NetVault: SmartDisk takes disk-based backup and data deduplication to new levels of cost savings with a state of the art capability to squeeze more data on disk while driving expenses down further by not requiring specific types of storage drives or appliances.
-
Disk-Based Backup And Restore Reaching The Next Level
10/21/2009
This paper outlines conventional disk-based backup and restore methods and the paradigm shift needed to keep up with escalating data growth, shrinking backup windows, overburdened IT Administrators, and overtaxed IT budgets. By Strategic Storage Solutions
-
White Paper: Fibre Channel Security
6/24/2009
By itself, Fibre Channel is not a secure protocol. Without implementing certain security measures within a Fibre Channel SAN, application servers will be able to see all devices on the SAN and could even write to the same physical disk! The two most common methods of providing security on a Fibre Channel SAN are zoning and LUN masking. By Falconstor
-
Fibre Channel Security
6/24/2009
By itself, Fibre Channel is not a secure protocol. Without implementing certain security measures within a Fibre Channel SAN, application servers will be able to see all devices on the SAN and could even write to the same physical disk! The two most common methods of providing security on a Fibre Channel SAN are zoning and LUN masking. By Falconstor
This website uses cookies to ensure you get the best experience on our website. Learn more