Logan G. Harbaugh is a longtime technology journalist with experience reviewing a wide range of IT products. Every week, there are new reports of data breaches at organizations of every type.
Check Point Software Technologies responded to the mobility trend by offering three secure communications products. For starters, Check Point has its IPSec VPN Software Blade for remote access. Scott ...
Jason covers desktop applications and help desk utilities, including reviews geared toward the IT end-user support function. Jason is the PC infrastructure manager for Harcros Chemicals, a worldwide ...
Karen Schwartz is a freelance technology writer based in the Washington D.C. area. With more than 300,000 students and 356 school sites, Nevada’s Clark County School District is one of the largest in ...
General Data Protection Regulation (GDPR) together with the growing number of data breaches are the most pressing reasons why small and medium businesses are implementing data protection technologies ...
Trend Micro has released security updates to address multiple critical-severity remote code execution and authentication bypass vulnerabilities that impact its Apex Central and Endpoint Encryption ...
Endpoint security platforms have become commonplace on end-user devices and Internet-facing systems. In addition to malware and spyware protection, an enterprise-grade endpoint security platform ...
Pointsec Mobile Technologies last week released software designed to restrict or block data transfers over various ports on a mobile device. The new release of Pointsec Device Protector adds optional ...
Palo Alto, Calif., January 11, 2022 – Kiteworks, which governs and protects sensitive digital content moving within, into, and out of global enterprises, announced today its acquisition of totemo, the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results