Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

DSS (Digital Signature Standards)

RSS Feed    Add to Google    Add to My Yahoo!
DSS (Digital Signature Standards) Reports
 
Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

Top Security Concerns and Trends Takeaways
sponsored by Dropbox for Business
WHITE PAPER: These slides outline the state of information security and what you need to know to stay protected.  Read on to uncover insider tips for mitigating risks in the several computing environments.
Posted: 30 Mar 2015 | Published: 29 Aug 2013

Dropbox for Business

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Strategic Migration Planning Guide: Weblogic to JBoss Enterprise Application Platform
sponsored by Red Hat
WHITE PAPER: Read about the proven five-step process designed to identify migration opportunities, examine the risks associated with various migration scenarios, create a standard enterprise environment, and develop a comprehensive and strategic migration plan to the JBoss Enterprise Application Platform.
Posted: 28 Jul 2015 | Published: 30 Sep 2014

Red Hat

Gartner: Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover treat data encryption protection as a standard for all workstations.
Posted: 01 Feb 2016 | Published: 19 Oct 2015

Digital Guardian

10 Risky Security Behaviors to Avoid: Protect Your Organization
sponsored by Global Knowledge
WHITE PAPER: This exclusive whitepaper explores 10 risky behaviors end-users must avoid to keep your organization safe.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

Global Knowledge

Risk Report: Hacktivism and Encryption at the Forefront of Cyber-Attacks
sponsored by SurfWatch Labs
WHITE PAPER: This white paper illustrates the latest trends in the cyber risk landscape showing how unencrypted computers and other devices plague IT. Continue reading to learn why you can't afford to ignore data and device encryption.
Posted: 12 Jan 2016 | Published: 31 Aug 2015

SurfWatch Labs

Six Golden Rules for Selecting an SSL or TLS Certificate
sponsored by Symantec Website Security
WHITE PAPER: This white paper provides an overview of the SSL certificate market, the 6 golden rules of purchasing SSL certificates, and more.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

Symantec Website Security

Managing the Secure Deployment of Cloud Services
sponsored by IBM
WHITE PAPER: This white paper invites you to explore the possibilities of a SaaS-based approach to the secure deployment and use of cloud services. Access now and learn how to make it easier for business users to access sanctioned cloud services and introduce elements of identity and access management (IAM) that are often missing.
Posted: 22 Dec 2015 | Published: 27 Oct 2015

IBM

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement