1421 total news stories found.
2012-03-07 | Today's off-shoring of data centers and IT jobs makes a virus like Stuxnet unnecessary when you wish to commit an act of terrorism against the global financial system. Read "Infinite Exposure" to find out why.
2012-03-04 | LastByte technology, an emerging advanced data recovery method that combines cutting-edge hardware with proprietary software, will allow Data Retrieval's engineers access to the raw data stored on the drive regardless of the condition of the media.
2012-03-02 | Fiberlink one of two vendor innovators named in Forrester Research Inc.'s "Market Overview: Cloud-Hosted Mobile Device Management Solutions and Managed Services" report.
2012-03-01 | An attractive option for those who want a hands-off hosting configuration is "fully managed" hosting.
2012-02-23 | FinallySecure Enterprise for large and medium-sized enterprises - central management with easy implementation.
2012-02-23 | SecureFolder Enterprise with content-filtering module and central management.
2012-02-21 | 4t Networks has upgraded its network security infrastructure to include Cisco ASA firewalls, which offer full redundancy and the best in data protection.
2012-02-17 | If you are currently in the process of planning a server implementation for your business, then you're probably thinking about the type of server and rack will be suitable to suit your business needs.
2012-02-17 | With Academy of Computer Education's hands-on, in depth training courses, they make it easier to make the transition into the IT world.
2012-02-13 | Everyone who uses the Internet today uses cloud computing in one way or another, even if they are not aware they are doing so.
2012-02-10 | WinMagic earns distinction through demonstrated technology success and customer commitment.
2012-02-03 | Making sure a business is running and productive in a disruption plays an important role in the modern, fast-paced, connected world.
2012-02-02 | The 7th annual Counter Terrorist Magazine's Homeland Security Professionals Conference expects record numbers - focus is on public and private partnerships in protecting the USA. Hosted by the Leon County Sheriff's Office Florida.
2012-01-30 | Supported sources include Microsoft Exchange Online, Gmail, Hotmail and Yahoo! Mail.
2012-01-26 | SSI tm is honored to announce that the Leon County Sheriff's Office will be hosting The Counter Terrorist Magazine's 7th Annual Homeland Security Professionals Conference at the Gaylord Palms in Orlando, November 5th-7th.
2012-01-26 | Business VOIP and Internet phone systems company announces over 2700% growth by helping small and medium sized businesses improve their communication, data sharing, and security while reducing overall telephony and networking costs.
2012-01-20 | Evolution Design Systems, a top provider of ID Card Systems and ID Badge accessories announced its launch of a new website - http://www.EIDBadges.com.
2012-01-12 | Harpreet Walia, recognized security industry expert, joins technical advisory board.
2012-01-11 | For the month of January, 2012 SoftwareMedia.com is giving away free software. Softwaremedia fans on Facebook and Twitter followers are eligible to enter in the software giveaways with prizes from Adobe, Microsoft, Total Training, Kaspersky and more.
2012-01-09 | The 7th annual Counter Terrorist Magazine's Homeland Security Professionals Conference expects record numbers - focus is on public and private partnerships in protecting the USA. Hosted by the Leon County Sheriff's Office Florida.