I was considering purchasing hard drive encryption software for our consultants' laptops in case they were lost or stolen. Does anyone have any recommendations or tips on what to look for in a good ...
How Apricorn's hardware-encrypted drives protect against keyloggers and malware ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...
HELSINKI--(BUSINESS WIRE)--Jetico, long-trusted pioneer in data protection, has announced the release of its Mac drive encryption software. Expanding on many years of Windows support, BestCrypt Volume ...
Now that the capacities of small form-factor drives have hit hundreds of gigabytes, just about any corporate database can easily fit on a laptop. That affordable capacity gives users the opportunity ...
Apricorn has introduced a 32TB model in its Aegis Padlock DT FIPS encrypted storage line, offering hardware-based PIN authentication and real-time encryption that bypasses host systems. The launch ...
Hitachi Global Storage Technologies today announced availability of what it is touting as the highest-capacity, highest-performing notebook hard drive. The Travelstar 7K200 doubles the capacity of its ...
In last week’s look at Kingston’s DataTraveler Locker+ thumb drive, I stressed the importance of keeping personal data safe. There are a multitude of reasons why you should take this seriously, but ...
Flash drives, or thumb drives, are portable devices that provide easy access to flash storage. Commonly used to take backups, transfer files between devices, and install operating system images, these ...
The Gizmo USB flash drive operates to 480 Mbits/s and includes software for password protection and data encryption. The device measures 66.5 x 16.5 mm, so multiple drives fit into neighboring USB ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results