Home secure
 

Keywords :   


Tag: secure

Centrify and Dropbox Partner to Enable Secure Access for Dropbox for Business

2013-06-25 06:00:00| Industrial Newsroom - All News for Today

SUNNYVALE, Calif. – Centrify Corporation, a leader in Unified Identity Services across data center, cloud and mobile, today announced the availability of Centrify for Dropbox for Business, an easy-to-deploy cloud service that offers the industry's most comprehensive solution for Active Directory-based single sign-on (SSO), access control and mobile management.  Centrify eliminates password sprawl with Active Directory-based SSO for Dropbox for Business across users' various choices of ...This story is related to the following:ServicesSearch for suppliers of: Data Security Software | Application Service Providers (ASP's) Software | Mobile Application Software

Tags: for business access partner

 

How to secure files from other users on external disks

2013-06-25 01:39:54| CNET News.com

While OS X makes external drives available to all users on the system, you can change this to ensure your files are only accessible by you. [Read more]    

Tags: users files external secure

 
 

VIDEO: Osborne 'to secure the recovery'

2013-06-23 11:59:25| BBC News | Business | UK Edition

George Osborne has said the British economy is "out of intensive care", ahead of this week's spending review in which he will outline 11.5bn in public spending cuts.

Tags: video secure recovery osborne

 

Wireless Witch: How to Secure Your Wireless Network

2013-06-21 19:34:14| PC Magazine Wireless Networking Product Guide

Ten ways to harden wireless router security.

Tags: network secure wireless witch

 

Printed RFID Tag provides secure, dynamic traceability.

2013-06-20 14:29:18| Industrial Newsroom - All News for Today

Used for tracing parts throughout their life cycle, Augmented Traceability™ supports both direct part marking and marking on identification plate. RFID chip can be embedded in plate or applied directly onto part. Data stored on tag — part production, supply chain path, and maintenance — is digitally signed by tag itself, preventing any corruption/modification. RFID system features published cryptographic protocol, and tags are unclonable and compatible with EPC UHF Gen2 standard. This story is related to the following:Automatic IDSearch for suppliers of: Active & Passive RFID Tags

Tags: tag secure printed dynamic

 

Sites : [149] [150] [151] [152] [153] [154] [155] [156] [157] [158] [159] [160] [161] [162] [163] [164] [165] [166] [167] [168] next »