1.800.219.7290 / Careers / About Us / Contact Us / Partner Login / Shop Online

Categories

Popular Tags

Archives

Our Authors

Subscribe

Recent blog posts
A totally integrated solution for data reduction, security and authentication in a single secure data container PKWARE offers complete portability for reducing, securing, moving and storing data across the extended enterprise…both internally and externally, from mainframes to desktops and into the c...
Hits: 489
0
Cloud computing and mobile technology have allowed employees to move out of the traditional office and access critical data from anywhere. However, those technologies have also created an evolution of the threat landscape because data is no longer locked down in an unconnected data center. With sign...
Hits: 545
0

Posted by on in Compliance
Technology professionals often have to come face-to-face with the reality that it may be impossible to establish a 100 percent secure system. Even with the best firewalls and antivirus solutions in place, weaknesses can emerge from improper configuration or out-of-date software versions. However, wh...
Hits: 444
0
Effective data security is closer than many organizations may think. In fact, effectively guarding data may just be a matter of implementing affordable technology and ensuring that it is configured properly. In an interview with GovInfoSecurity, Rebecca Herold, head of Rebecca Herold & Ass...
Hits: 549
0
Costs can quickly escalate for you and your partners when multiple vendors are needed to accommodate differing infrastructures, policies and software. Add to that varying security requirements and the scenario can soon become an integration nightmare or worse yet… a deal breaker. In response to the...
Hits: 616
0