Standards  >   Security Standards  >  

Data Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
Data Encryption Standards White Papers (View All Report Types)
 
Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

The Truth About MPLS Security
sponsored by Certes Networks
WHITE PAPER: If you are sending data over a “private” Wide Area Network (WAN) there is a dirty little secret your service provider doesn’t want you to know about. The truth is that these so-called private WANs offer no inherent security and they aren't really even private.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

Certes Networks

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.

The Complete Guide to Backup and Recovery for the SMB
sponsored by Nexsan
WHITE PAPER: Small and mid-sized businesses are a market that has been underserved by data protection software, appliances and online backup services until the last few years.Yet, these organizations have the same needs as large enterprises to protect their data. Full-time, dedicated IT resources are often beyond their means.
Posted: 23 Sep 2011 | Published: 23 Sep 2011

Nexsan

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation

Server-Gated Cryptography: Providing Better Security for More Users
sponsored by Thawte Inc.
WHITE PAPER: Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace.
Posted: 10 May 2013 | Published: 10 May 2013

Thawte Inc.

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

Magic Quadrant for Mobile Data Protection
sponsored by Sophos, Inc.
WHITE PAPER: This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Sophos, Inc.

Data Loss Prevention Stops Data Leaks Where They Start
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro Data Loss Prevention is a family of advanced DLP solutions that provide maximum protection for an enterprise’s critical information at endpoints, the point of use. The new built-in encryption module provides protection against unauthorized access to sensitive data on removable devices, one of the greatest risk areas for data loss.
Posted: 16 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement