We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to instal...
The PCI Security Standards Council today is expected to issue guidelines on use of point-to-point encryption in protecting sensitive payment card data, but the narrow approach — which is focused on hardware — is raising questions.
Dell Wednesday announced its first endpoint encryption product, along with the possibility of factory installation on certain Dell PCs.
Today's state-of-the-art network security appliances do a great job of keeping the cyber monsters from invading your business. But what do you do when the monster is actually inside the security perimeter? Unfortunately, all of the crosses, garlic, w...
The organization in charge of defining security for the payment-card industry's merchants and service providers Tuesday issued two guidance papers, the first on end-to-end encryption and the second on payment card technology used more commonly in Eur...
Whitepapers about endpoint security
Closing the circle: Why you need to protect endpoints and mobile devices together Endpoint protection has gotten more complicated In this white paper we will discuss: • Why traditional endpoints and mobile devices require overlapping (but not identical) security solutions. • How to enhance the protection of all endpoints by adding web security. • Why today’s threats require that endpoint protection and mobile device protection activities be moved to the cloud. • How Webroot makes it easy to “close the circle” by managing endpoint protection, mobile device protection and web security through one infrastructure.
Latest News Articles
- Google has to face US privacy suit over new user data policy
- Apple hit with class action lawsuit for alleged labor rule violations
- Panasonic Lumix DMC-FZ1000 digital camera with 4K video shooting
- Seafaring robot shrugs off monster Typhoon Rammasun
- Zero-day flaws in Tails aren't for sale, vulnerability broker says
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.