je.st
news
Tag: secure
Centrify and Dropbox Partner to Enable Secure Access for Dropbox for Business
2013-06-25 06:00:00| Industrial Newsroom - All News for Today
SUNNYVALE, Calif. – Centrify Corporation, a leader in Unified Identity Services across data center, cloud and mobile, today announced the availability of Centrify for Dropbox for Business, an easy-to-deploy cloud service that offers the industry's most comprehensive solution for Active Directory-based single sign-on (SSO), access control and mobile management. Centrify eliminates password sprawl with Active Directory-based SSO for Dropbox for Business across users' various choices of ...This story is related to the following:ServicesSearch for suppliers of: Data Security Software | Application Service Providers (ASP's) Software | Mobile Application Software
Tags: for
business
access
partner
How to secure files from other users on external disks
2013-06-25 01:39:54| CNET News.com
While OS X makes external drives available to all users on the system, you can change this to ensure your files are only accessible by you. [Read more]
Tags: users
files
external
secure
VIDEO: Osborne 'to secure the recovery'
2013-06-23 11:59:25| BBC News | Business | UK Edition
George Osborne has said the British economy is "out of intensive care", ahead of this week's spending review in which he will outline 11.5bn in public spending cuts.
Tags: video
secure
recovery
osborne
Wireless Witch: How to Secure Your Wireless Network
2013-06-21 19:34:14| PC Magazine Wireless Networking Product Guide
Ten ways to harden wireless router security.
Tags: network
secure
wireless
witch
Printed RFID Tag provides secure, dynamic traceability.
2013-06-20 14:29:18| Industrial Newsroom - All News for Today
Used for tracing parts throughout their life cycle, Augmented Traceability™ supports both direct part marking and marking on identification plate. RFID chip can be embedded in plate or applied directly onto part. Data stored on tag — part production, supply chain path, and maintenance — is digitally signed by tag itself, preventing any corruption/modification. RFID system features published cryptographic protocol, and tags are unclonable and compatible with EPC UHF Gen2 standard. This story is related to the following:Automatic IDSearch for suppliers of: Active & Passive RFID Tags
Tags: tag
secure
printed
dynamic
Sites : [149] [150] [151] [152] [153] [154] [155] [156] [157] [158] [159] [160] [161] [162] [163] [164] [165] [166] [167] [168] next »