Standards  >   Security Standards  >  

Cryptography Standards

RSS Feed    Add to Google    Add to My Yahoo!
Cryptography Standards White Papers (View All Report Types)
 
Embracing Secure BYOD. What you need to know
sponsored by Acronis
WHITE PAPER: This white paper highlights the challenges that come with the BYOD trend. It also describes a solution that delivers a secure approach to BYOD without sacrificing end-user experience.
Posted: 22 Jul 2014 | Published: 31 Jan 2014

Acronis

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER: In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013

Absolute Software

Best Practices for Protecting Laptop Data
sponsored by i365, makers of Evault
WHITE PAPER: As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these can help you keep IT costs in check and more.
Posted: 03 Jun 2011 | Published: 03 Jun 2011

i365, makers of Evault

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER: This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Intel

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

Delivering corporate data securely on employee iPads™
sponsored by Citrix
WHITE PAPER: This white paper provides detailed insight into the latest iPad adoption trends and examines the issues that often accompany these devices from an IT perspective. Find out how the iPad differs from a traditional PC with respect to security and obtain helpful recommendations to help you balance user preferences with security and control.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

Citrix

How to choose the right tape library
sponsored by Quantum Corporation
WHITE PAPER: Getting the right tape library isn't black magic, but it does take some care and thought. An expandable, modular tape library supported by sophisticated management features and tied to modern backup software will support your enterprise for years to come. Read this tutorial to find out so much more.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

Quantum Corporation

Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud
sponsored by Intel
WHITE PAPER: Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

Intel

Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement