Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center at PC Connection
Kurt Hildebrand - Director of Practices and Initiatives for Enterprise Storage
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC for PC Connection, Inc. Solutions and Services Division
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
Sort by: Relevance Date
Found 132 posts matching the search term "security".
Data Security

Security is first on everyone’s list of priorities in the digital landscape, and Microsoft is trying to make it easier for you with their three new star features. Windows 10 is offering three big-deal security changes—all are free with the upgrade, too, which may be one way Microsoft intends upon making up to everyone who was disappointed in Windows 8. Read on to find out more.

Tags:Device GuardHelloMicrosoftPassportSecurityWindows 10

Data Loss Prevention Security Assessment

Create a Strategy to Protect Your Critical Information

What Is Data Loss Prevention (DLP)?

Data loss prevention refers to combination of technology, policy, and process that helps your organization monitor and control critical information, and develop a complete data security strategy. The technology monitors, detects, and blocks sensitive data exfiltration while data is in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage). The objective of a successful DLP strategy is to prevent sensitive data from being disclosed to unauthorized personnel, either by malicious intent or inadvertent mistake.

Remember when Windows Server 2003 debuted? A highlight that had us all excited were the advances in IT security built in by design. We’re talking about a re-engineered Internet Information Services with strong administrator control both over how Web applications run and user authentication to websites, folders and documents; a standards-based TCP/IP infrastructure, including support for IPv6; and software restriction policies to thwart inadvertently introduced gotcha code and unauthorized program installs.

Tags:BudgetComplianceGovernmentHealthcare ITITMicrosoftMigrationNext-generation serverOS EfficiencySecuritySupportTechnologyVirtualizationWindows Server 2003 EOSWindows Server 2012

BYOD Security

BYOD, Security, and You

Make Sure You Cover All Your Bases

by Rich Faille | 09.06.13

By now, you’re probably well aware of the growing trend of BYOD and how important it is to put a security plan in place for the employee-owned devices that will be accessing your organization’s network and data. Read on, and I’ll give you a rundown of five things to make sure you consider before you begin to implement BYOD at your organization. 

Tags:BYOD

Data Center Servers

Overcome Your Cloud Security Woes

Cisco and Intel Are Here to Help

by Justin Zuill | 10.24.13

There is no one-size-fits-all version of cloud technology when it comes to real-world applications. Cloud computing technologies are like raw materials that you can combine in multiple ways to achieve your desired business outcomes. Like many IT professionals, you’re probably considering cloud computing in your organization, but you’re also worried about keeping your data and assets secure.

Tags:Cloud ComputingSecurity

Follow Us
RSS Feed
Featured Bloggers
Kurt Hildebrand - Director of Practices and Initiatives for Enterprise Storage
Director of Practices and Initiatives for Enterprise Storage
Jonathan Clark - Product Line Manager for Microsoft
Product Line Manager for Microsoft
Lane Shelton - Vice President of Software Business Development
Vice President of Software Business Development
Tag Cloud
Loading Loading...