Novell Home

Novell Cool Solutions

Tag Archives: ZENworks Full Disk Encryption

Medical Devices: The New Target for Cybercriminals

Gil Cattelain

By:

June 11, 2015 1:50 pm

Reads:962

Score:Unrated

When it comes to hacking, no device is off limits from cyberthieves—including medical devices—a new report from TrapX Security shows. According to Dark Reading, the report—set to be released at some point next week—names at least three separate instances where malware has recently been discovered lurking on critical hospital medical equipment—specifically systems such as an …

+read more

Tags: , ,
Categories: Expert Views, PR Blog, ZENworks

ZENworks Full Disk Encryption: Five Frequently Asked Questions

Gil Cattelain

By:

May 3, 2015 11:12 am

Reads:1,020

Score:Unrated

Managing encrypted devices at the large enterprise level can seem like a full-time job in and of itself when you consider the sheer volume of encrypted devices that may exist in any one organization. Yet, it’s one of the most important responsibilities in endpoint management. After all, once an organization loses control of its digital …

+read more

Tags: , , , , ,
Categories: Expert Views, PR Blog, ZENworks

The One-Step Plan to Stronger Digital Workspace Security in Your Enterprise

Gil Cattelain

By:

March 2, 2015 1:43 pm

Reads:1,393

Score:Unrated

The digital business landscape has changed dramatically during the past few years, and this has led to more challenges facing IT departments than ever before. New threats like malware, ransomware and hacks are increasing by the day. Furthermore, next-generation technologies like the Internet of Things are weaving their way into the digital fabric of your …

+read more

Tags: , , , , , ,
Categories: Expert Views, PR Blog, ZENworks

From Gold to Fool’s Gold: Transform Your Data Through Encryption to Make It Useless to Hackers

Gil Cattelain

By:

February 19, 2015 1:31 pm

Reads:1,686

Score:Unrated

Your business harbors a trove of sensitive data in its back-end servers that hackers would love to exploit for monetary value. These files can range drastically in value, depending on factors such as the type of information they contain and the industry. In healthcare, for instance, stolen patient records can sell for as much as …

+read more

Tags: , , , ,
Categories: Expert Views, PR Blog, ZENworks

Your Business’s Network Is Bigger Than You Think

Gil Cattelain

By:

February 12, 2015 2:06 pm

Reads:1,567

Score:Unrated

You head the IT department of a small to midsized business (SMB) with 1,000 employees or less. But is this the true size of your network? It could actually be much larger than the total number of employees in your organization due to the amount of devices that your workers use to access your business’s …

+read more

Tags: , , , , ,
Categories: Expert Views, PR Blog, ZENworks

Forrester Names Novell ZENworks a ‘Strong Performer’ in Endpoint Encryption

Gil Cattelain

By:

February 5, 2015 11:17 am

Reads:1,620

Score:Unrated

There are two ways that you can store sensitive corporate information in your database: in a regular format using plain text or in a protected format using advanced ciphering. In information technology (IT), the act of ciphering digital information is called encryption, and it’s one of the safest and strongest methods of devaluing private data …

+read more

Tags: , , , , , ,
Categories: Expert Views, PR Blog, ZENworks

How to Keep Your Data Safe in a Collaborative Work Environment

Gil Cattelain

By:

October 23, 2014 11:48 am

Reads:2,396

Score:Unrated

Your business just created a confidential document outlining a groundbreaking new product it is developing. This document will be used to educate your core team members in marketing, sales and customer support about your business’s new product prior to its release. You might also have to share the top secret file with one or more …

+read more

Tags: , , , , ,
Categories: Expert Views, General, PR Blog, ZENworks

Security: A Growing Concern in the U.S. Financial Sector

Gil Cattelain

By:

October 9, 2014 10:15 am

Reads:1,896

Score:Unrated

Right now all eyes are on the financial services industry following the recent high-profile cyber attacks on JPMorgan Chase and nine other U.S. banking institutions. As of this writing, at least 83 million U.S. households and businesses are confirmed to have been affected by the attack. This number is expected to grow as more information …

+read more

Tags: , , , , , ,
Categories: Expert Views, General, PR Blog, ZENworks

Want to Protect Your Remote PC Endpoints? Focus on Securing Your Data

Gil Cattelain

By:

July 31, 2014 12:31 pm

Reads:1,655

Score:Unrated

Each remote endpoint in your enterprise, whether it is a laptop or desktop computer, is like a virtual door that leads directly to your organization’s data. When left unsecured through lackadaisical endpoint management policies, these endpoints can pose a major security threat to your organization. Each unsecured machine could be the potential source of a …

+read more

Tags: , , , , , ,
Categories: Endpoint Management, Expert Views, Novell, ZENworks, ZENworks Endpoint Security Management, ZENworks Suite

Top Three Reasons to Invest in Remote Data Encryption

Gil Cattelain

By:

July 17, 2014 3:29 pm

Reads:1,392

Score:Unrated

Each user endpoint in your organization is like a door that leads directly into your enterprise. Just like your company protects its physical location using a robust security system, it needs to take the same measures online in order to prevent a data breach from occurring. An optimal way to do this is by using …

+read more

Tags: , , , , ,
Categories: Endpoint Management, Expert Views, Novell, PR Blog, ZENworks, ZENworks Endpoint Security Management, ZENworks Full Disk Encryption, ZENworks Suite

RSS

© 2015 Micro Focus