Kurt Hildebrand - Director of Practices and Initiatives for Enterprise Storage
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
VP VMware EUC for PC Connection, Inc. Solutions and Services Division
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
Sort by: Relevance Date
Found 90 posts matching the search term "security".

Data Loss Prevention Security Assessment

Create a Strategy to Protect Your Critical Information

What Is Data Loss Prevention (DLP)?

Data loss prevention refers to combination of technology, policy, and process that helps your organization monitor and control critical information, and develop a complete data security strategy. The technology monitors, detects, and blocks sensitive data exfiltration while data is in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage). The objective of a successful DLP strategy is to prevent sensitive data from being disclosed to unauthorized personnel, either by malicious intent or inadvertent mistake.

Remember when Windows Server 2003 debuted? A highlight that had us all excited were the advances in IT security built in by design. We’re talking about a re-engineered Internet Information Services with strong administrator control both over how Web applications run and user authentication to websites, folders and documents; a standards-based TCP/IP infrastructure, including support for IPv6; and software restriction policies to thwart inadvertently introduced gotcha code and unauthorized program installs.

Tags:BudgetComplianceGovernmentHealthcare ITITMicrosoftMigrationNext-generation serverOS EfficiencySecuritySupportTechnologyVirtualizationWindows Server 2003 EOSWindows Server 2012

BYOD Security

BYOD, Security, and You

Make Sure You Cover All Your Bases

by Rich Faille | 09.06.13

By now, you’re probably well aware of the growing trend of BYOD and how important it is to put a security plan in place for the employee-owned devices that will be accessing your organization’s network and data. Read on, and I’ll give you a rundown of five things to make sure you consider before you begin to implement BYOD at your organization. 

Tags:BYOD

Data Center Servers

Overcome Your Cloud Security Woes

Cisco and Intel Are Here to Help

by Justin Zuill | 10.24.13

There is no one-size-fits-all version of cloud technology when it comes to real-world applications. Cloud computing technologies are like raw materials that you can combine in multiple ways to achieve your desired business outcomes. Like many IT professionals, you’re probably considering cloud computing in your organization, but you’re also worried about keeping your data and assets secure.

Tags:Cloud ComputingSecurity

Infrared Security Image - Securing Your BYOD Environment

Security: The Biggest BYOD Challenge

You Can Keep Your Data Safe and Your Employees Happy

by Rich Faille | 04.11.14

Obviously, security is a very big concern for organizations as they begin to implement a bring your own device (BYOD) strategy. Many IT managers fear a loss of company or client data, unauthorized access to the network, and malware infections. They may also lack the resources needed to properly address these security concerns. We’re here to share some tips and strategies to ensure your data remains secure as you implement a BYOD policy.

Tags:BYODMobilitySecurity