Home
 > Research and Reports > White Papers > Pod Slurping-An Easy Technique for Stealing Data

Pod Slurping-An Easy Technique for Stealing Data

Source: GFI Software
Just when you thought you had all your security measures figured out, along comes the portable storage device to make you question them all over again. With the popularity of portable consumer products—and their ever-increasing storage space—comes a greater risk of losing sensitive corporate data. To secure corporate data, companies must not only focus on perimeter security, but on internal security weaknesses as well.


Featured publications:

4 Steps to Choosing the Right Device for Field Service Mobility
Source: IFS Choosing the right device for field service management needs is not easy. This white paper will guide you through the different factors, including your organization’s technology outlook, how a customer’s perceptions of you might be affected by the device, and how the hardware features make your employees more efficient. Know the four steps to consider for choosing the right device for your field service mobility needs. Read More...
7 Signs You Need Advanced Analytics for Salesforce.com (or Any CRM)
Source: Birst Customer relationship management (CRM) applications provide reports and dashboards, but if you rely on the built-in analytic capabilities of CRM, you’re not extracting the true value of the information in your CRM system. You need robust, easy-to-access analytics embedded right in your CRM solution. Download this white paper for seven signs that you are not operating efficiently. Read More...


You may also be interested in these related documents:

How to Prevent Data Leaks and Achieve PCI Compliance
Source: Rapid7 The greatest threat on the Internet involves increased data theft, data leakage, and targeted attacks for the purpose of stealing confidential information. To combat this, the payment card industry (PCI) has created a data security standard (DSS) that holds all merchants—regardless of size—to much higher standards of performance when it comes to protecting customers’ financial and personal information. Read More...
A Roadmap for Achieving Enterprise Mobility Security
Source: BT INS The latest threat plaguing the corporate office is clipped to the belts and purses of your workforce—their mobile devices. And while employees have the ability to keep in touch, in real time, with their clients and the office, it also increases the risk of security breaches. Finding weaknesses and securing your mobile network should be one of your highest priorities—someone may be stealing your sensitive data right now. Read More...
Types of Prefabricated Modular Data Centers
Source: APC by Schneider Electric Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.