Hardware security

Results: 1760



#Item
401Data security / Encryption / DataLock Technology / Computing / USB 3.0 / Brute-force attack / Computer hardware / Computer security / USB / Disk encryption / Cryptographic software / Data management

Secure USB 3.0 Desktop Drive The world’s first PIN operated desktop hard drive with built-in hardware encryption and capacities of up to 6TB. Looking for the highest level of security for your data while utilising the

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2014-09-08 11:16:19
402Point of sale / Software / Technology / Business / Backup / Data security

Module 6 – Managing Pilot POS Software and Hardware Overview The Pilot POS system is made up of a number of software and hardware components and it is important that you know and understand how to perform some basic ma

Add to Reading List

Source URL: www.pilot.co.za

Language: English - Date: 2014-12-02 05:50:11
403Computer security / Identity management / Card reader / Wiegand interface / RS-485 / CompactFlash / Security / Access control / Computer hardware

Systems | AMC2 - Access Modular Controller AMC2 - Access Modular Controller ▶ Intelligent access manager for one to eight entrances ▶ Four interfaces include the reader power supply ▶ Standard 2 GB compact flash

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2010-08-04 05:02:39
404Certificate authority / Public key certificate / X.509 / Public key infrastructure / Transport Layer Security / Hardware security module / Self-signed certificate / GlobalSign / Dynamic SSL / Cryptography / Public-key cryptography / Key management

The Hidden Costs of Self-Signed SSL Certificates Why self-signed certificates are much costlier—and riskier—than working with a trusted security vendor Introduction Even when business is booming, smart companies alwa

Add to Reading List

Source URL: casecurity.org

Language: English - Date: 2013-10-03 16:16:50
405Electronics / Computer hardware / Computer architecture / Digital electronics / Mbed microcontroller / Firmware / ARM architecture / Embedded systems / Microcontrollers / Segger Microcontroller Systems

SEGGER Microcontroller – The Embedded Experts SEGGER adds security feature to Flasher: Authorized Flashing Hilden, Germany – February 23rd, 2015 SEGGER has developed a new security feature for its production flash p

Add to Reading List

Source URL: www.segger.com

Language: English - Date: 2015-02-23 07:41:41
406Computing / Remote administration software / Bomgar / Networking hardware / Help desk / Computer network security / Computer security / X Window System / Technical support / Software / Remote desktop / System software

CASE STUDY EAT’N PARK HOSPITALITY GROUP ASSURING SECURITY AND BETTER CUSTOMER SUPPORT FOR EVERY ENVIRONMENT Eat’n Park Hospitality Group, founded in 1949, began in Pittsburgh’s South Hills with the business model

Add to Reading List

Source URL: www.bomgar.com

Language: English - Date: 2013-11-04 17:26:55
407Warranty / Extended warranty / Security / Implied warranty / Henningsen v. Bloomfield Motors / Contract law / Law / Taser

TASER International, Inc.’s Hardware Warranty, Limitations and Release for Law Enforcement CEW Products and On-Officer Cameras for International Sales (Non-U.S. and Canada) (Effective March 12, 2014) The following TASE

Add to Reading List

Source URL: au.taser.com

Language: English - Date: 2014-08-26 19:17:01
408Backup / Public safety / Business continuity planning / Disaster recovery / Business continuity / Remote backup service / Management / Data security / Business

Backup & Disaster Recovery Is your data safe? Are you sure your backups really work? Would your business survive a fire, tornado, hurricane, earthquake or even a simple server hardware failure? Having any doubts? A recen

Add to Reading List

Source URL: www.perryman-sw.com

Language: English - Date: 2011-08-24 16:21:40
409Data security / Computer storage media / Backup / Serial ATA / Incremental backup / Hard disk drive / Virtual tape library / Uranium Backup / Computer hardware / Backup software / Computing

I d e a l s t o r Te r a l y t e The Idealstor Teralyte was designed with the SMB in mind and for the first time offers a truly portable disk backup solution. The Teralyte combines the speed of SATA disks with the porta

Add to Reading List

Source URL: www.newwavetech.com

Language: English - Date: 2014-02-14 14:05:26
410Computer security / FIPS 140-2 / Hardware security module / Disk encryption / Fox-IT / Virtual private network / Wireless security / Secure cryptoprocessor / Computer network security / Cryptography / Security

the next-generation cryptographic platform for high-security products RedFox Cryptographic Platform Creating certified cryptographic products used to be a complex task,

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:15
UPDATE