Standards  >   Security Standards  >  

Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards White Papers (View All Report Types)
1 - 25 of 103 Matches Previous Page  |  Next Page
8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

Six Golden Rules for Selecting an SSL or TLS Certificate
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides an overview of the SSL certificate market, the 6 golden rules of purchasing SSL certificates, and more.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

Symantec Corporation

The Top 10 TLS/SSL Client, Server, and Application Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This whitepaper provides an in-depth breakdown of the top 10 TLS/SSL client, server and application best practices.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Symantec Corporation

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Data Encryption Demystified: Seven Common Misconceptions and the Solutions that Dispel Them
sponsored by WinMagic
WHITE PAPER: This white paper presents the top 7 myths and misconceptions about encryption and how new approaches dispel them. Access this helpful resource now to get caught up on today's encryption technology and learn why it should be a part of your modern cybersecurity strategy.
Posted: 29 Jun 2015 | Published: 27 May 2015

WinMagic

A Guide to Managing Microsoft BitLocker in the Enterprise
sponsored by WinMagic
WHITE PAPER: This white paper explores how to ensure comprehensive FDE on all platforms and devices.
Posted: 29 Jun 2015 | Published: 10 Apr 2014

WinMagic

The Truth About Data-At-Rest Encryption & the Cloud
sponsored by FireHost Inc.
WHITE PAPER: This white paper explains why some methods of encryption are weaker than others and suggests ways to implement the strongest encryption standards for your data-at-rest.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

FireHost Inc.

Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

Simplicity and Security: Achieving Data Protection in Educational Institutions and State and Local Governments
sponsored by Pure Storage
WHITE PAPER: This white paper describes how you can achieve storage and tight security with one product – just the right strategy for the big security needs and small budgets of public institutions.
Posted: 23 Jun 2015 | Published: 31 Dec 2014

Pure Storage

Introduction to The EMC XtremIO Storage Array
sponsored by EMC Corporation
WHITE PAPER: View this informative white paper for an introduction to a storage array, with several detailed descriptions of the system architecture, theory of operation, and its various features.
Posted: 16 Jun 2015 | Published: 01 Dec 2014

EMC Corporation

Dynamic Multipoint Virtual Private Network (DMVPN)
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn different approaches to network design with DMVPN.
Posted: 21 May 2015 | Published: 30 Apr 2015

Global Knowledge

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Controlling Keys - How to Prevent Data Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.
Posted: 04 May 2015 | Published: 22 Apr 2015

IntraLinks, Inc

Critical Factors to Endpoint Security
sponsored by Dell and Microsoft
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell and Microsoft

Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013

Symantec

Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: This white paper explains the benefits of always-on SSL and how you can implement it on your sites.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Symantec

SSL Traffic Management to Meet Your Needs
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a tool that gives you the all the capabilities you need for effective traffic monitoring.
Posted: 09 Apr 2015 | Published: 28 Feb 2015

Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks
1 - 25 of 103 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement