Standards  >   Security Standards  >  

Cryptography Standards

RSS Feed    Add to Google    Add to My Yahoo!
Cryptography StandardsReports
 
Australian Insurance Provider Securely Launches Customer Web Services in the Cloud
sponsored by CipherCloud
CASE STUDY: This case study features Australia's largest provider of private health insurance, and describes their use of Salesforce as the cloud-based platform to house its phone and web-based healthcare services.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

CipherCloud

Detecting the use of TrueCrypt
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

11 Best Practices for Mobile Device Management (MDM)
sponsored by IBM
WHITE PAPER: This paper presents 11 best practices for mobile device management (MDM).
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM

Compliance and Cloud Security eBook
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

SearchSecurity.com

Get Unprecedented Visibility, Control, and Policy Creation Options with Encrypted Traffic Management
sponsored by Blue Coat Systems
RESOURCE: This concise info graphic presents a new encrypted traffic management solution that provides organizations with unprecedented visibility, control, and policy creation options.
Posted: 16 Sep 2014 | Published: 09 Dec 2013

Blue Coat Systems

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER: This white paper reveals the evolution of HIPAA-HITECH regulations over the past few years, and explains what type of information needs to be locked down.
Posted: 17 Sep 2014 | Published: 31 Dec 2013

Absolute Software

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Agari

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

EMC Integration of PKI and Authentication Services for Securing VMWare Vcloud Suite 5.1 Environments
sponsored by EMC & Arrow
WHITE PAPER: This Proven Solutions Guide provides procedures for integrating hardened components including VMware vSphere, and unifying the environment's authentication mechanisms with a centralized directory. This guide details a secure multitenant Compute-as-a-Service cloud solution.
Posted: 21 Feb 2014 | Published: 31 Jul 2013

EMC & Arrow

eBook: Trends in Healthcare Data Protection
sponsored by LANDesk Software
EBOOK: This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
Posted: 22 Mar 2012 | Published: 22 Mar 2012

LANDesk Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement