IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Encryption Security

RSS Feed    Add to Google    Add to My Yahoo!
Encryption Security White Papers (View All Report Types)
 
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

SearchSecurity.com

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Simplify SSL Certificate Management Across the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
Posted: 07 May 2012 | Published: 07 May 2012

Symantec Corporation

Strengthening Enterprise Security through Notebook Encryption
sponsored by Intel Corporation
WHITE PAPER: Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.
Posted: 02 Apr 2009 | Published: 01 Dec 2008

Intel Corporation

Oracle Database 11g Release 2 High Availability
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 12 Mar 2012 | Published: 31 Oct 2010

Oracle Corporation

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos, Inc.
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos, Inc.

Five Truths About Enterprise Data Protection
sponsored by PGP Corporation
WHITE PAPER: How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy.
Posted: 17 Sep 2009 | Published: 22 Dec 2008

PGP Corporation

Five Best Practices for Protecting Backup Data
sponsored by Iron Mountain.
WHITE PAPER: Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Iron Mountain.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement