Software  >   Systems Software  >   Security Software  >  

Data Base Encryption Software

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Encryption Software Reports
 
Reconsidering PKI and its Place in your Enterprise Encryption Strategy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

ComputerWeekly.com

Building Trust in a Cloudy Sky Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.
Posted: 11 Apr 2017 | Published: 31 Jan 2017

McAfee, Inc.

2009 Annual Study: UK Enterprise Encryption Trends
sponsored by PGP Corporation
ANALYST REPORT: Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection.
Posted: 24 Sep 2009 | Published: 25 Jul 2009

PGP Corporation

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine

eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap
sponsored by SearchExchange.com
EBOOK: Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
Posted: 19 Jun 2009 | Published: 19 Jun 2009

SearchExchange.com

Reduce the Risk of Costly Data Breaches: Three Pillars of Data Protection
sponsored by Iron Mountain
WHITE PAPER: Download this white paper to learn about the elements beyond PC encryption that are necessary for a complete data protection solution and how Iron Mountain Digital's solutions address the three pillars of data protection.
Posted: 21 Feb 2007 | Published: 21 Feb 2007

Iron Mountain

2009 Annual Study: U.S. Enterprise Encryption Trends
sponsored by PGP Corporation
ANALYST REPORT: Check out this study, which analyzes survey results from 997 U.S. business and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

PGP Corporation

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

6 Reasons Why Software-Based Encryption Doesn’t Stack Up
sponsored by MXI Security
WHITE PAPER: Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

MXI Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement