IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encription

RSS Feed    Add to Google    Add to My Yahoo!
Data Encription Reports
 
Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Five Things You Must Know About Microsoft BitLocker
sponsored by WinMagic
WHITE PAPER: This white paper presents a 5 step strategy to resolve all BitLocker security issues.
Posted: 25 Jun 2015 | Published: 17 Jun 2015

WinMagic

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

NetApp

Security in the Cloud Planning Guide
sponsored by Intel
WHITE PAPER: Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.
Posted: 23 Feb 2012 | Published: 01 Sep 2011

Intel

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall
sponsored by Riverbed Technology, Inc.
WHITE PAPER: PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

May Technical Guide on PCI DSS Guidance
sponsored by SearchSecurity.com
EGUIDE: This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012

SearchSecurity.com

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement