Standards  >   Security Standards  >  

Data Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
Data Encryption StandardsReports
 
How To Secure Online Activities
sponsored by Global Knowledge
WHITE PAPER: The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Accessing Your Cloud Risk
sponsored by Sophos, Inc.
WEBCAST: This webcast explains the best ways to assess your cloud risk and if it is a good fit for your organization.
Posted: 18 Jul 2014 | Premiered: Jul 10, 2014

Sophos, Inc.

Why Encryption without Authentication is Not Secure
sponsored by Certes Networks
WHITE PAPER: View this paper to explore why secure data communications solutions require both encryption and authentication, attack vectors against encryption-only solutions, key questions you should ask your network encryption vendor to ensure that your network is secure and your security objectives are met, and more.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

Certes Networks

Website Security Threat Report, Part Two
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation

Data Protection: Shedding the Light on Tape Encryption
sponsored by Iron Mountain
WHITE PAPER: Tape is an important part of organizations’ business continuity programs. However, since tape is portable, all of its contents − if not encrypted − are subject to exposure. Organizations must implement practices to ensure the security of its tapes’ contents. Read this white paper to learn more.
Posted: 12 May 2011 | Published: 12 May 2011

Iron Mountain

Securing the enterprise application layer: Expert Guidelines
sponsored by IBM
EGUIDE: If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Corporation
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Corporation

Digital Certificates and the Apache Web Server
sponsored by Thawte Inc.
WHITE PAPER: This guide offers support on how to test, purchase, install, and use digital certificates for SSL connections on your Apache web server. View now to learn more.
Posted: 07 May 2013 | Published: 07 May 2013

Thawte Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement