Standards  >   Security Standards  >  

Cryptography Standards

RSS Feed    Add to Google    Add to My Yahoo!
Cryptography Standards Multimedia (View All Report Types)
Masood Heydari Discusses the Key to Securing and Accelerating Databases and Applications
sponsored by Oracle Corporation
WEBCAST: In this webinar, Masood Heydari discusses the next phase of hardware and software engineering. Tune in and find out how, by converging elements of database software onto processor silicon, technology has made a giant leap forward in making a fully encrypted data center.
Posted: 11 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation University: Why SSL Certificate Security Matters
sponsored by
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

An Innovative Approach to Encrypted Network Security
sponsored by Unisys
VIDEO: This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.
Posted: 30 Sep 2015 | Premiered: 11 Sep 2015


Cloud Data Encryption Made Easy
sponsored by Oracle Corporation
WEBCAST: This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015


The Business Case for Tokenization
sponsored by Patrick Townsend Security Solutions
PODCAST: Tokenizing data eases compliance and saves money. In this podcast, Patrick Townsend, Townsend Security Founder and CTO, explains how tokenization and encryption differ, and how making it part of your data security strategy decreases your chance of data loss, saves you time and hassles.
Posted: 09 Aug 2010 | Premiered: Aug 9, 2010

Patrick Townsend Security Solutions

Industry Trends & Perspectives - Data Protection for Virtual Server Environments
sponsored by Quantum Corporation
WEBCAST: This webcast by Quantum technologies highlights the challenges of integrating server virtualization into an existing computing environment and shows you solutions for dramatically improving the efficiency of your backup operation.
Posted: 22 Jul 2008 | Premiered: Jul 23, 2008, 14:00 EDT (18:00 GMT)

Quantum Corporation

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012


Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE: Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010

Identity Finder, LLC

Disable Lost PCs and Data Remotely
sponsored by Intel
VIDEO: Learn how the all new 2010 Intel® Core™ vPro™ processor family can help by disabling lost or stolen PCs via a poison pill, and how they can be easily reactivated via server-generated passwords thanks to Intel® Anti-Theft Technology and WinMagic.
Posted: 27 Apr 2010 | Premiered: 22 Jan 2010

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement