All resources sponsored by:

Vormetric

9 Matches
2016 Data Threat Report: Trends in Encryption and Data Security
sponsored by Vormetric
WHITE PAPER:Access this report now to learn statistics from around the globe describing how large enterprises are misplacing their security dollars and what you can do to best protect your sensitive data in today's hostile cyber environment.
Posted: 15 Sep 2016 | Published: 01 Aug 2016
Get This Now


451 Research: Vormetric Enters Encryption Gateway Fray with Latest Extension to Its Platform Strategy
sponsored by Vormetric
ANALYST REPORT:This 451 Research report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway. The report also offers analysis of the Vormetric Data Security Platform strategy.
Posted: 29 Jul 2016 | Published: 01 Jun 2016
Get This Now


Securosis: Securing Hadoop: Security Recommendations for Hadoop Environments
sponsored by Vormetric
ANALYST REPORT:This research paper lays out a series of recommended security controls for Hadoop, along with the rationale for each. The analysis is based upon conversations with dozens of data scientists, developers, IT staff, project managers, and security folks from companies of all sizes; as well as decades of security experience the Securosis team brings.
Posted: 28 Jul 2016 | Published: 01 Jun 2016
Get This Now


Market Guide for Merchant and Acquirer Tokenization of Payment Card Data
sponsored by Vormetric
WHITE PAPER:The tokenization of sensitive data is a key component in the ensuring of payment system security. Chief Information Security Officers at cardacceptors and payment processors should use this Market Guide to choose the most appropriate products for their tokenization projects.
Posted: 28 Jul 2016 | Published: 01 Jun 2016
Get This Now


Bloor: For the EU's New Data Protection Regulation, Encryption Should Be the Default
sponsored by Vormetric
WHITE PAPER:This report by Bloor Research discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. Discover how you can make it part of a comprehensive, consistent data security strategy.
Posted: 28 Jul 2016 | Published: 01 Jun 2016
Get This Now


Aberdeen Group: Selecting Encryption for "Data at Rest" in Back-End Systems.
sponsored by Vormetric
WHITE PAPER:In this paper, the Aberdeen Group explores why full-disk encryption has become an attractive solution for the risks to data in use at the endpoints—and why file-level encryption is a better fit for the risks associated with data at rest in back-end systems.
Posted: 27 Jul 2016 | Published: 01 Jun 2015
Get This Now


A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER:This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012
Get This Now


The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER:This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014
Get This Now


Enabling Compliance with the PCI Data Security Standards
sponsored by Vormetric
WHITE PAPER:Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
Posted: 19 May 2008 | Published: 01 Jan 2007
Get This Now


9 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement