IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from  … 
Definition continues below.
Data EncryptionWhite Papers (View All Report Types)
26 - 50 of 85 Matches Previous Page  | Next Page
Leveraging a Unified Multi-Tiered Backup Design To Deliver a Stable Scalable Backup Infrastructure
sponsored by Quantum Corporation
WHITE PAPER: This DCIG report takes an in-depth look at Quantum’s DXi-Series and its ability solve today’s backup problems while putting in place a foundation for stable and sustainable growth. Access this report now to learn more.
Posted: 14 May 2010 | Published: 23 Jul 2009

Quantum Corporation

Oracle Database - The best choice for PeopleSoft Applications
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the business and technology reasons behind customers' continued choice of Oracle Database for their PeopleSoft application deployments.
Posted: 08 Jun 2011 | Published: 30 Apr 2010

Oracle Corporation

7 Reasons Businesses are Shifting to Cloud Backup
sponsored by CoreVault
WHITE PAPER: Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

CoreVault

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS)
sponsored by TITUS
WHITE PAPER: This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites.
Posted: 12 Nov 2010 | Published: 12 Nov 2010

TITUS

Best Practices in Data Protection: Encryption, Key Management and Tokenization
sponsored by nuBridges, Inc.
WHITE PAPER: Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Posted: 12 Oct 2010 | Published: 12 Oct 2010

nuBridges, Inc.

The Mezeo Cloud Storage Platform for the Enterprise
sponsored by Mezeo Software
WHITE PAPER: Cloud storage reduces the cost of storing less critical files, automating business processes and providing ubiquitous access to employees globally. The deployable Mezeo Cloud Storage Platform is an enterprise-class solution ideal for organizations looking to implement private clouds.
Posted: 21 Sep 2010 | Published: 21 Sep 2010

Mezeo Software

The Evolution of Data Loss Prevention: Reducing Complexity
sponsored by BlueCoat
WHITE PAPER: In recent years, organizations have come to recognize the critical importance of safeguarding sensitive information. Read this white paper to discover the important role Data Loss Prevention (DLP) plays in maintaining the security of sensitive data.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

BlueCoat

Data Encryption 101: A Pragmatic Approach to PCI Compliance
sponsored by Prime Factors, Inc.
WHITE PAPER: The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Prime Factors, Inc.

Five Best Practices for Protecting Backup Data
sponsored by Iron Mountain.
WHITE PAPER: Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Iron Mountain.

6 Reasons Why Software-Based Encryption Doesn’t Stack Up
sponsored by MXI Security
WHITE PAPER: Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

MXI Security

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Insight

Smarter Deduplication with CommVault® Simpana® Software
sponsored by CommVault Systems, Inc.
WHITE PAPER: Business and IT are both struggling with how to protect, monitor, maintain and recover business-critical data when it continues to grow at 30-50 percent per year. Read this white paper to learn how CommVault® Simpana® software provides a holistic approach to data deduplication.
Posted: 08 Mar 2010 | Published: 08 Mar 2010

CommVault Systems, Inc.

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Encryption Key Management: A Technical White Paper
sponsored by Quantum Corporation
WHITE PAPER: Securing data from unauthorized access is a critical issue for businesses in all industries. Regulatory compliance and customer loyalty all depend on keeping sensitive information safe and secure. Businesses must take steps to improve data confidentiality and integrity.
Posted: 03 Feb 2010 | Published: 01 Oct 2007

Quantum Corporation

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
sponsored by Lumension
WHITE PAPER: Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

Lumension

Accelerating IBM z/OS Global Mirror with the Cisco MDS 9000 Family
sponsored by Cisco Systems, Inc.
WHITE PAPER: This document describes how users of IBM z/OS Global Mirror can reduce costs and improve performance with a tightly integrated Cisco® MDS 9000 Family solution.
Posted: 29 Dec 2009 | Published: 29 Dec 2009

Cisco Systems, Inc.

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

The Business Impact of Data Security Regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Securing Data Stored On Tape With Encryption
sponsored by Quantum Corporation
WHITE PAPER: With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

Five Truths About Enterprise Data Protection
sponsored by PGP Corporation
WHITE PAPER: How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy.
Posted: 17 Sep 2009 | Published: 22 Dec 2008

PGP Corporation

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.
26 - 50 of 85 Matches Previous Page    1 2 3 4    Next Page
 
DATA ENCRYPTION DEFINITION (continued): …  obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals.In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm … 
Data Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement