it security solutions and data protection
IT Security Solutions & Digital Data Protection
Security and Data Protection for the Digital World
Strengthening the weakest link
Renforcez le maillon faible
La sécurité d’une entreprise dépend toujours de son maillon le plus faible. Or, bien souvent, ce talon d’Achille s’appelle « chaîne logistique », ou « supply chain » pour les intimes. Pour garantir protection et conformité d’un bout à l’autre de cette chaîne, il vous faut une sécurité intégrée à chaque étape. Stuart Constable se penche pour nous sur la question.
SB1
Solutions Brochure: Approach to Security Available to You Off-the-Shelf
Protect Your Network, Devices and Data from Cyber Threats
Beastly Threats eGuide
eGuide: Physical threats to data security and how to defend against them
In this eGuide, we’ll look at physical security threats to which every computer – whether desktop PC, laptop or tablet – is vulnerable, and show you how to guard against them.
Security Large
Security–Protecting your priceless data
At Think we take security seriously, which is why our products have been the choice for the corporate market year after year.
Best practice guide
Guarding the Gates: Best Practice Guide
News reports sound regular alarms about massive data breaches in which millions of people’s personal and financial data is captured in a single online attack.
bluetooth security
Bluetooth Lock–Keeps your ThinkCentre secure whenever you're not around
Automatically prevent unauthorized access to your data
whitepaper banner
Whitepaper: Business Implications of GDPR and the Role of Technology
While data privacy regulation is hardly a new concept for the 21st century, the adoption of EU’s General Data Protection Regulation (GDPR) is a watershed event as it marks a seismic shift in the way data controllers and data processors handle personal dat
Pardon the Disruption
Pardon the Disruption: From Point A to XML
Eve Maler is perhaps best known as the co-creator of XML.
Sharing is Caring
Sharing is Caring: The benefits of User-Managed Access
UMA: The next generation of privacy and security standards is starting to emerge and is being implemented in industries such as patient-centric healthcare IT to help solve this problem.