Novell Home

Novell Cool Solutions

Tag Archives: ZENworks Full Disk Encryption

Why Enterprise-Oriented Solutions Are Ideal for Education Collaboration

Gil Cattelain

By:

July 14, 2015 1:56 pm

Reads:1,066

Score:Unrated

It’s easy to think of the needs for education enterprise environments as being pretty minimal. Other than email and some collaboration tools, what could educators really need? Sometimes, you don’t know how much you need something until it’s gone. For instance, many GroupWise users say one of the reasons they’ll never move to another platform …

+read more

Tags: , , , ,
Categories: Expert Views, GroupWise, GroupWise Blog, PR Blog, Vibe, ZENworks

Medical Devices: The New Target for Cybercriminals

Gil Cattelain

By:

June 11, 2015 1:50 pm

Reads:1,791

Score:Unrated

When it comes to hacking, no device is off limits from cyberthieves—including medical devices—a new report from TrapX Security shows. According to Dark Reading, the report—set to be released at some point next week—names at least three separate instances where malware has recently been discovered lurking on critical hospital medical equipment—specifically systems such as an …

+read more

Tags: , ,
Categories: Expert Views, PR Blog, ZENworks

ZENworks Full Disk Encryption: Five Frequently Asked Questions

Gil Cattelain

By:

May 3, 2015 11:12 am

Reads:1,137

Score:Unrated

Managing encrypted devices at the large enterprise level can seem like a full-time job in and of itself when you consider the sheer volume of encrypted devices that may exist in any one organization. Yet, it’s one of the most important responsibilities in endpoint management. After all, once an organization loses control of its digital …

+read more

Tags: , , , , ,
Categories: Expert Views, PR Blog, ZENworks

The One-Step Plan to Stronger Digital Workspace Security in Your Enterprise

Gil Cattelain

By:

March 2, 2015 1:43 pm

Reads:1,473

Score:Unrated

The digital business landscape has changed dramatically during the past few years, and this has led to more challenges facing IT departments than ever before. New threats like malware, ransomware and hacks are increasing by the day. Furthermore, next-generation technologies like the Internet of Things are weaving their way into the digital fabric of your …

+read more

Tags: , , , , , ,
Categories: Expert Views, PR Blog, ZENworks

From Gold to Fool’s Gold: Transform Your Data Through Encryption to Make It Useless to Hackers

Gil Cattelain

By:

February 19, 2015 1:31 pm

Reads:1,865

Score:Unrated

Your business harbors a trove of sensitive data in its back-end servers that hackers would love to exploit for monetary value. These files can range drastically in value, depending on factors such as the type of information they contain and the industry. In healthcare, for instance, stolen patient records can sell for as much as …

+read more

Tags: , , , ,
Categories: Expert Views, PR Blog, ZENworks

Your Business’s Network Is Bigger Than You Think

Gil Cattelain

By:

February 12, 2015 2:06 pm

Reads:1,709

Score:Unrated

You head the IT department of a small to midsized business (SMB) with 1,000 employees or less. But is this the true size of your network? It could actually be much larger than the total number of employees in your organization due to the amount of devices that your workers use to access your business’s …

+read more

Tags: , , , , ,
Categories: Expert Views, PR Blog, ZENworks

Forrester Names Novell ZENworks a ‘Strong Performer’ in Endpoint Encryption

Gil Cattelain

By:

February 5, 2015 11:17 am

Reads:1,736

Score:Unrated

There are two ways that you can store sensitive corporate information in your database: in a regular format using plain text or in a protected format using advanced ciphering. In information technology (IT), the act of ciphering digital information is called encryption, and it’s one of the safest and strongest methods of devaluing private data …

+read more

Tags: , , , , , ,
Categories: Expert Views, PR Blog, ZENworks

How to Keep Your Data Safe in a Collaborative Work Environment

Gil Cattelain

By:

October 23, 2014 11:48 am

Reads:2,600

Score:Unrated

Your business just created a confidential document outlining a groundbreaking new product it is developing. This document will be used to educate your core team members in marketing, sales and customer support about your business’s new product prior to its release. You might also have to share the top secret file with one or more …

+read more

Tags: , , , , ,
Categories: Expert Views, General, PR Blog, ZENworks

Security: A Growing Concern in the U.S. Financial Sector

Gil Cattelain

By:

October 9, 2014 10:15 am

Reads:1,995

Score:Unrated

Right now all eyes are on the financial services industry following the recent high-profile cyber attacks on JPMorgan Chase and nine other U.S. banking institutions. As of this writing, at least 83 million U.S. households and businesses are confirmed to have been affected by the attack. This number is expected to grow as more information …

+read more

Tags: , , , , , ,
Categories: Expert Views, General, PR Blog, ZENworks

Want to Protect Your Remote PC Endpoints? Focus on Securing Your Data

Gil Cattelain

By:

July 31, 2014 12:31 pm

Reads:1,753

Score:Unrated

Each remote endpoint in your enterprise, whether it is a laptop or desktop computer, is like a virtual door that leads directly to your organization’s data. When left unsecured through lackadaisical endpoint management policies, these endpoints can pose a major security threat to your organization. Each unsecured machine could be the potential source of a …

+read more

Tags: , , , , , ,
Categories: Endpoint Management, Expert Views, Novell, ZENworks, ZENworks Endpoint Security Management, ZENworks Suite

RSS

© Micro Focus