Novell Home

Novell Cool Solutions

Tag Archives: ZENworks Full Disk Encryption

The One-Step Plan to Stronger Digital Workspace Security in Your Enterprise

Gil Cattelain

By:

March 2, 2015 1:43 pm

Reads:667

Score:Unrated

The digital business landscape has changed dramatically during the past few years, and this has led to more challenges facing IT departments than ever before. New threats like malware, ransomware and hacks are increasing by the day. Furthermore, next-generation technologies like the Internet of Things are weaving their way into the digital fabric of your …

+read more

Tags: , , , , , ,
Categories: Expert Views, PR Blog, ZENworks

From Gold to Fool’s Gold: Transform Your Data Through Encryption to Make It Useless to Hackers

Gil Cattelain

By:

February 19, 2015 1:31 pm

Reads:817

Score:Unrated

Your business harbors a trove of sensitive data in its back-end servers that hackers would love to exploit for monetary value. These files can range drastically in value, depending on factors such as the type of information they contain and the industry. In healthcare, for instance, stolen patient records can sell for as much as …

+read more

Tags: , , , ,
Categories: Expert Views, PR Blog, ZENworks

Your Business’s Network Is Bigger Than You Think

Gil Cattelain

By:

February 12, 2015 2:06 pm

Reads:790

Score:Unrated

You head the IT department of a small to midsized business (SMB) with 1,000 employees or less. But is this the true size of your network? It could actually be much larger than the total number of employees in your organization due to the amount of devices that your workers use to access your business’s …

+read more

Tags: , , , , ,
Categories: Expert Views, PR Blog, ZENworks

Forrester Names Novell ZENworks a ‘Strong Performer’ in Endpoint Encryption

Gil Cattelain

By:

February 5, 2015 11:17 am

Reads:895

Score:Unrated

There are two ways that you can store sensitive corporate information in your database: in a regular format using plain text or in a protected format using advanced ciphering. In information technology (IT), the act of ciphering digital information is called encryption, and it’s one of the safest and strongest methods of devaluing private data …

+read more

Tags: , , , , , ,
Categories: Expert Views, PR Blog, ZENworks

How to Keep Your Data Safe in a Collaborative Work Environment

Gil Cattelain

By:

October 23, 2014 11:48 am

Reads:1,754

Score:Unrated

Your business just created a confidential document outlining a groundbreaking new product it is developing. This document will be used to educate your core team members in marketing, sales and customer support about your business’s new product prior to its release. You might also have to share the top secret file with one or more …

+read more

Tags: , , , , ,
Categories: Expert Views, General, PR Blog, ZENworks

Security: A Growing Concern in the U.S. Financial Sector

Gil Cattelain

By:

October 9, 2014 10:15 am

Reads:1,442

Score:Unrated

Right now all eyes are on the financial services industry following the recent high-profile cyber attacks on JPMorgan Chase and nine other U.S. banking institutions. As of this writing, at least 83 million U.S. households and businesses are confirmed to have been affected by the attack. This number is expected to grow as more information …

+read more

Tags: , , , , , ,
Categories: Expert Views, General, PR Blog, ZENworks

Want to Protect Your Remote PC Endpoints? Focus on Securing Your Data

Gil Cattelain

By:

July 31, 2014 12:31 pm

Reads:1,210

Score:Unrated

Each remote endpoint in your enterprise, whether it is a laptop or desktop computer, is like a virtual door that leads directly to your organization’s data. When left unsecured through lackadaisical endpoint management policies, these endpoints can pose a major security threat to your organization. Each unsecured machine could be the potential source of a …

+read more

Tags: , , , , , ,
Categories: Endpoint Management, Expert Views, Novell, ZENworks, ZENworks Endpoint Security Management, ZENworks Suite

Top Three Reasons to Invest in Remote Data Encryption

Gil Cattelain

By:

July 17, 2014 3:29 pm

Reads:1,086

Score:Unrated

Each user endpoint in your organization is like a door that leads directly into your enterprise. Just like your company protects its physical location using a robust security system, it needs to take the same measures online in order to prevent a data breach from occurring. An optimal way to do this is by using …

+read more

Tags: , , , , ,
Categories: Endpoint Management, Expert Views, Novell, PR Blog, ZENworks, ZENworks Endpoint Security Management, ZENworks Full Disk Encryption, ZENworks Suite

TrueCrypt Disappears, But the Usefulness of Full Disk Encryption Carries On

Jon_Giffard

By:

June 2, 2014 3:02 pm

Reads:1,799

Score:5

As you may have read, TrueCrypt has become the Norwegian blue parrot of the software world and is no longer with us. A message on the TrueCrypt website suggests that the project ended due to ‘unfixed security issues’ and yet an independent project that is auditing TrueCrypt has yet to find any. There is intense speculation that …

+read more

Tags: , , , ,
Categories: Endpoint Management, Expert Views, Novell, PR Blog, ZENworks Full Disk Encryption, ZENworks Suite

RSS

© 2015 Novell