Standards  >   Security Standards  >  

Data Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
Data Encryption Standards White Papers (View All Report Types)
 
Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management while granting complete visibility and control of SSL communications and the potential threats therein without requiring re-architecting the security infrastructure, nor impacting network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Introduction to the EMC XtremIO Storage Array
sponsored by emc first distribution
WHITE PAPER: While an attractive method for boosting I/O performance in the data center, flash storage comes at a hefty price both in high cost and loss of capabilities. Access this white paper to learn about one option that leverages flash to deliver value in performance, scalability and efficiency.
Posted: 23 Jun 2016 | Published: 30 Apr 2015

emc first distribution

Encrypted Traffic Management for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: In this e-book, you'll learn everything you need to know about keeping SSL-encrypted traffic both private and secure.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Blue Coat Systems

Data Protection: Shedding the Light on Tape Encryption
sponsored by Iron Mountain
WHITE PAPER: Tape is an important part of organizations’ business continuity programs. However, since tape is portable, all of its contents − if not encrypted − are subject to exposure. Organizations must implement practices to ensure the security of its tapes’ contents. Read this white paper to learn more.
Posted: 12 May 2011 | Published: 12 May 2011

Iron Mountain

Protect Your Data from Endpoint to the Cloud
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro Data Protection rises to the occasion with a robust solution that ensures the availability, integrity, and confidentiality of your business information. This comprehensive solution keeps your data safe from intentional or unintentional harm wherever it resides, protecting it against damage, loss, and unauthorized access. 
Posted: 22 Mar 2011 | Published: 21 Mar 2011

Trend Micro, Inc.

Six Golden Rules for Selecting an SSL or TLS Certificate
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper provides an overview of the SSL certificate market, the 6 golden rules of purchasing SSL certificates, and more.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

Symantec Website Security Solutions

Mainframe Tape Technology: Eight Myths, Realities and Best Practices
sponsored by CA Technologies.
WHITE PAPER: Read this paper to learn how organizations can mitigate risk, reduce TCO, address compliance requirements and optimize security and support by better managing and automating key tape-related processes, creating broad strategies for retention and encryption and implementing best practices.
Posted: 24 Feb 2010 | Published: 25 Jul 2008

CA Technologies.

Top 10 Ways to Assess The Risk of Data Loss
sponsored by Infrascale
WHITE PAPER: This white paper offers 10 signs of whether or not your employees are using free file sharing services and what kinds of risks these pose to your organization's sensitive data.
Posted: 15 May 2014 | Published: 15 May 2014

Infrascale

5 Ways To Secure Removable Media: Which Is Best For Your Enterprise?
sponsored by WinMagic
WHITE PAPER: This paper reviews the steps some organizations are taking to draft, implement, and enforce risk mitigation policies for removable media, and how technologies available today, and appearing on the horizon, are helping.
Posted: 14 Apr 2010 | Published: 14 Mar 2010

WinMagic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement