Software  >   Systems Software  >   Security Software  >  

Data Encryption Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Message Authentication Software, Data Base Encryption Software, Encryption Software, Database Encryption Software
DEFINITION: Software that mathematically scrambles (encrypts) e-mail so that it is unreadable to anyone without the mathematical key to unscramble (decrypt) it.
Data Encryption SoftwareWhite Papers (View All Report Types)
14 Matches
In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

The Evolution of Data Loss Prevention: Reducing Complexity
sponsored by BlueCoat
WHITE PAPER: In recent years, organizations have come to recognize the critical importance of safeguarding sensitive information. Read this white paper to discover the important role Data Loss Prevention (DLP) plays in maintaining the security of sensitive data.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

BlueCoat

6 Reasons Why Software-Based Encryption Doesn’t Stack Up
sponsored by MXI Security
WHITE PAPER: Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

MXI Security

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Five Truths About Enterprise Data Protection
sponsored by PGP Corporation
WHITE PAPER: How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy.
Posted: 17 Sep 2009 | Published: 22 Dec 2008

PGP Corporation

Improving Regulatory Compliance with Encryption
sponsored by Utimaco Safeware
WHITE PAPER: This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions.
Posted: 02 Feb 2009 | Published: 01 Feb 2007

Utimaco Safeware

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

Enabling Compliance with the PCI Data Security Standards
sponsored by Vormetric
WHITE PAPER: Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
Posted: 19 May 2008 | Published: 01 Jan 2007

Vormetric

New eGuide: How to Fully Protect Your Storage Environment
sponsored by Quantum Corporation
WHITE PAPER: Storage systems are severely susceptible to attack and it is time for organizations to rethink their security tactics. Read this eGuide to learn about concepts regarding storage security and solutions like encryption that can help defend against attack.
Posted: 28 Jan 2008 | Published: 28 Jan 2008

Quantum Corporation

Reduce the Risk of Costly Data Breaches: Three Pillars of Data Protection
sponsored by Iron Mountain
WHITE PAPER: Download this white paper to learn about the elements beyond PC encryption that are necessary for a complete data protection solution and how Iron Mountain Digital's solutions address the three pillars of data protection.
Posted: 21 Feb 2007 | Published: 21 Feb 2007

Iron Mountain
14 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement