All resources sponsored by:

Voltage Security, Inc.

5 Matches
Smart Devices, Smart Security
sponsored by Voltage Security, Inc.
WHITE PAPER:This short white paper explores the top 5 tips for protecting your organization against new looming security threats from smartphones and tablets. These 5 tips can make or break mobile data security efforts. Read now to learn more.
Posted: 12 Jul 2012 | Published: 09 Jul 2012
Get This Now


Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER:This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012
Get This Now


Protecting Customer Data: Moving Beyond Compliance
sponsored by Voltage Security, Inc.
WHITE PAPER:The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection.
Posted: 30 Mar 2012 | Published: 29 Mar 2012
Get This Now


Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER:Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012
Get This Now


Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER:With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008
Get This Now


5 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement