Premium Content

Access "Protect laptop data"

Published: 01 Nov 2012

Regular remote backups, data encryption and a two-stage authentication sign-on process are the best ways to secure laptop data. In June 23, 2006, the White House's Office of Management and Budget (OMB) ordered government agencies to get their laptop security act together and encrypt their data within 45 days. Although the OMB order applied only to the federal government, analysts consider it a wake-up call to private-sector enterprises, which face the same risks when it comes to data on laptops. "I've been recommending that companies encrypt their laptops for 10 years," says Jeff Moss, director at Black Hat, a Seattle-based security consulting firm that uses WinMagic SecureDoc to encrypt its own laptops. "Back then, it was way too esoteric," he says, but now he believes companies will take laptop data security seriously. If the OMB memo wasn't enough to grab the attention of IT, regulations emanating from California and rippling through dozens of states across the country are spurring companies to protect laptop data. California SB 1386 requires any ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Integrating iSCSI and FC storage

      Mixing iSCSI with Fibre Channel (FC) allows you to make more efficient use of installed storage capacity, but marrying the two protocols isn't without its challenges. Bringing iSCSI into existing FC SANs raises integration issues and leads to a somewhat more complex storage infrastructure that requires IP and FC knowledge, as well as the ability to manage and troubleshoot a multiprotocol storage environment.

    • Clustering ERP apps

      For mission-critical apps, availability is the key. Clustering those applications can ensure they stay up and running, but clustering often conjures up images of complex technologies and an environment that's fragile and complex. Still, for most companies, the benefits of clustering are profound enough to mitigate its risks.

    • Automated tiering awaits standards

    • Doubts about CDP persist

    • Best storage products of 2006 by Editors of Storage and SearchStorage.com

      Our fifth annual Products of the Year awards recognize the 15 new or enhanced storage products that rose to the top in 2006. The editors of Storage and SearchStorage.com, along with a panel of users and industry experts, selected these winning products based on their innovation and performance.

  • Columns
    • Classified data: For your eyes only

      Classified data: For your eyes only

    • Are you taking the iSCSI plunge?

      iSCSI has grown from a theoretical standard into a real technology with real storage products. Although once considered by many to be a Fibre Channel killer, iSCSI has gained a substantial foothold without necessarily displacing Fibre Channel. Companies of all sizes are taking the plunge, and the iSCSI juggernaut appears to be unstoppable.

    • Latest technological innovations coming from Europe

      Storage Bin: If you want to know where the latest technological innovations are coming from, go to Europe.

    • From worm to worst by Stephen Foskett

      Everyone thinks about online data in the same way: You write it, read it, rewrite it and keep it forever. But many organizations have far more data that's written once, read a few times and kept alive forever. You might say this bulk data is "write once, read several times" (WORST), and it can bloat your storage environment.

More Premium Content Accessible For Free