Portable Data Protection Options

By | June 1, 2006

Companies also have to weigh where a password is enough and if not, assess what authentication method to use to access the device. And they also can consider software that either deletes sensitive information or traces the device if it is indeed stolen.

Many of the options in this last category are even built into existing products. Purdue, for instance, has taken advantage of a feature built into the popular BlackBerry that allows the device to be remotely reset if it´s lost or stolen.

To help you sort out all the options, we talked to David Friedlander, a senior analyst at Forrester Research, and Eric Maiwald, a senior analyst at the Burton Group. Then we did a whole lot of legwork and a little bit of shopping. The results are presented in our first-ever buyer´s guide to securing portable devices.Read Full Story

Leave a Reply