IT Management  >   Systems Operations  >   Security  >   Data Security  >  

File Encryption

RSS Feed    Add to Google    Add to My Yahoo!
File Encryption White Papers (View All Report Types)
 
The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Securing Data Stored on Tape with Encryption: How to Choose the Right Encryption Key Management Solution
sponsored by Quantum Corporation
WHITE PAPER: Q-EKM software, is designed to generate and communicate encryption keys and it is a proven, easy-to-use, library-managed encryption solution designed to protect sensitive data throughout the enterprise.
Posted: 23 Oct 2008 | Published: 23 Oct 2008

Quantum Corporation

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Data Encryption 101: A Pragmatic Approach to PCI Compliance
sponsored by Prime Factors, Inc.
WHITE PAPER: The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Prime Factors, Inc.

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

McAfee Endpoint Encryption
sponsored by McAfee, Inc.
WHITE PAPER: This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

Accelerating IBM z/OS Global Mirror with the Cisco MDS 9000 Family
sponsored by Cisco Systems, Inc.
WHITE PAPER: This document describes how users of IBM z/OS Global Mirror can reduce costs and improve performance with a tightly integrated Cisco® MDS 9000 Family solution.
Posted: 29 Dec 2009 | Published: 29 Dec 2009

Cisco Systems, Inc.

Oracle Database - The best choice for PeopleSoft Applications
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the business and technology reasons behind customers' continued choice of Oracle Database for their PeopleSoft application deployments.
Posted: 08 Jun 2011 | Published: 30 Apr 2010

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement