SAN FRANCISCO--(BUSINESS WIRE)--Zettaset, a leading provider of data protection solutions, today announced an expanded collaboration with Red Hat to bring its next generation XCrypt Full Disk ...
HELSINKI--(BUSINESS WIRE)--Jetico, long-trusted pioneer in data encryption, announced today support for Mac computers with a T2 security chip. With this update, BestCrypt Volume Encryption – ...
There was a time, not all that long ago, when a fully-encrypted system disk was something only for people with money to burn. You bought a special disk controller which performed hardware-based ...
We have become a mobile computing society. Laptop computers now outsell desktop computers. Our handheld devices, which used to be simply phones and contact managers, now have the ability to create, ...
Lost devices and data theft remain a major worry for enterprise IT firms. One way to protect against data loss is full-device encryption, now made easier to implement via self-encrypting hard drives ...
I was considering purchasing hard drive encryption software for our consultants' laptops in case they were lost or stolen. Does anyone have any recommendations or tips on what to look for in a good ...
A new survey by the Ponemon Institute finds that enterprise-wide encryption strategies are accelerating but there are risks to consider I was talking about security with a good friend of mine who runs ...
A few years ago, I began writing and talking about data encryption management problems on the horizon. I was right about the issues but a bit aggressive on the timing. Based on what I’m seeing lately ...
WinMagic is bringing its full disk encryption technology to the Mac, the company announced this week. SecureDoc for Mac provides users of Mac OS X Tiger or Leopard with an enterprise class full disk ...
The new Transparent Data Encryption (TDE) feature will be shipped along with the company’s enterprise version of its database. Relational database provider EnterpriseDB on Tuesday said that it was ...
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that’s the direct successor to the widely popular, but now defunct, TrueCrypt. Users ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results