IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encription

RSS Feed    Add to Google    Add to My Yahoo!
Data EncriptionWhite Papers (View All Report Types)
 
Encryption Strategies: Decoded
sponsored by Iron Mountain
WHITE PAPER: Find out exactly how and why in this white paper. Discover best practices for determining what data is most important and should be encrypted, learn exactly how encryption works and receive a checklist of three critical aspects of any encryption plan. Read on to learn more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Data Encryption 101: A Pragmatic Approach to PCI Compliance
sponsored by Prime Factors, Inc.
WHITE PAPER: The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Prime Factors, Inc.

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations.
Posted: 10 Aug 2009 | Published: 10 Jun 2009

Sophos, Inc.

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Oracle Database - The best choice for Siebel Applications
sponsored by Oracle Corporation
WHITE PAPER: This white paper covers the business and technology reasons behind customers' continued choice of Oracle Database for their Siebel Applications deployments.
Posted: 08 Jun 2011 | Published: 30 Apr 2010

Oracle Corporation

Eliminating Security Trade-Offs with Cross-Platform Server Isolation
sponsored by Apani
WHITE PAPER: This paper will examine the challenges of using network firewalls and VLANs for security within the corporate network and introduce the many advantages of cross-platform server isolation as an alternative in protecting servers.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Apani

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

The New Encryption Generation: Closing the Gap
sponsored by CREDANT Technologies
WHITE PAPER: This white paper examines the limitations of first-generation encryption processes that often deliver less-than-promised performance, spur user resistance, conflict with operational infrastructure and process requirements.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

CREDANT Technologies

McAfee Endpoint Encryption
sponsored by McAfee, Inc.
WHITE PAPER: This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

6 Reasons Why Software-Based Encryption Doesn’t Stack Up
sponsored by MXI Security
WHITE PAPER: Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

MXI Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement