Standards  >   Security Standards  >  

Data Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
Data Encryption Standards White Papers (View All Report Types)
 
Critical Factors in Endpoint Security
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 08 Apr 2015 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Overcoming exploits that use advanced evasion techniques and SSL encryption
sponsored by Dell, Inc.
WHITE PAPER: Discover a next-generation firewall solution to help you overcome obfuscation and advanced evasion techniques. Read this paper to learn about today's most advanced attacks and how to perform comprehensive SSL decryption and inspection.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell, Inc.

Flexible, secure solutions to keep unauthorized users out of your data
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Inside this white paper, find out how to go beyond passwords with advanced authentication measures in order to secure data at every endpoint in your organization. Discover security tools that are designed to provide an end-to-end coverage and support for advanced hardware authentication.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

Dell, Inc. and Intel®

Mobile Device Management Policy Best Practices
sponsored by IBM
WHITE PAPER: In this white paper, you'll discover the 10 best practices for developing a successful mobile device management plan.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

SSL 101: A Guide to Fundamental Web Site Security
sponsored by GeoTrust, Inc.
WHITE PAPER: Discover why Secure Sockets Layer (SSL) technology is the backbone of your web security strategy as you explore what it does, how it work, and how it can help you build credibility online.
Posted: 12 Dec 2012 | Published: 30 Dec 2011

GeoTrust, Inc.

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Securing Data Stored On Tape With Encryption
sponsored by Quantum Corporation
WHITE PAPER: With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement