Skip to main content
 

password protection

Results 1 - 25 of 36Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : 
business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration
    
Citrix ShareFile
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
account security, data security, data loss prevention, device security, cloud security, confidential data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
financial services, financial security, data security, cloud security, network security, business protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Mar 31, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, cloud security, data storage, network security, device protection, information protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
DigitalPersona UK
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : 
layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam
    
Entrust Datacard
Published By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016
This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.
Tags : 
vasco, identitiy management, portal security, patient security, password protection, cybersecurity, electronic health records, privacy and security
    
VASCO Data Security International, Inc.
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
pdf protection, data security, password protection, hacker prevention
    
Citrix ShareFile
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
Tags : 
pdf security, pdf passwords, pdf drm, adobe pdf security
    
LockLizard
Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
    
Tripwire
Published By: Ping Identity     Published Date: Jan 29, 2013
Expecting your employees to remember strong passwords for every application they use is unrealistic. Learn how identity federation provides a secure, private mechanism for businesses to share user identities, eliminating the username/passwords issue
Tags : 
passwords, password protection, unrealistic passwords, complex passwords, eliminating password confusion
    
Ping Identity
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.