Standards  >   Security Standards  >  

Data Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
Data Encryption Standards Reports
 
Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: In this research report, discover just how complicated SSL/TLS decryption and inspection methodologies have become and learn why you should make encrypted traffic management a near-term priority to address sophisticated SSL cyber threats.
Posted: 15 Apr 2015 | Published: 27 Feb 2015

Blue Coat Systems

SSL 101: A Guide to Fundamental Web Site Security
sponsored by GeoTrust, Inc.
WHITE PAPER: Discover why Secure Sockets Layer (SSL) technology is the backbone of your web security strategy as you explore what it does, how it work, and how it can help you build credibility online.
Posted: 12 Dec 2012 | Published: 30 Dec 2011

GeoTrust, Inc.

Dell Data Protection Infographic
sponsored by Dell, Inc. and Intel®
DATA SHEET: This infographic details how Dell technology allows you keep systems and data protected, even for those systems that are missing. Learn how it continuously monitors the security state of all systems and how if a system detects an attempted attack, encryption keys can be automatically destroyed so your information can't be stolen.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Dell, Inc. and Intel®

E-commerce 101: A Guide to Successful Selling on the Web
sponsored by GeoTrust, Inc.
WHITE PAPER: In this informative white paper, get help setting up, securing, and promoting your e-commerce site as you uncover the basics of e-commerce and learn how to avoid the pitfalls that can distress even the savviest of planners.
Posted: 11 Dec 2012 | Published: 30 Dec 2011

GeoTrust, Inc.

Enterprise Mobile Device Security Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Encryption in the cloud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses challenges of providing effective encryption to data stored in the cloud.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Optimal care for patients and their data
sponsored by Dell, Inc. and Intel®
CASE STUDY: Access this case study to learn how FastMed Urgent Care combined leading encryption technology to encrypt all endpoint devices with file-level encryption in order to protect patient data with the highest level of encryption.
Posted: 30 Apr 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

The Power of Self-Encrypting SSD
sponsored by Toshiba
WHITE PAPER: This video examines a self-encrypting SSD offering that addresses the performance drains of CPU software-based encryption in order to greatly improve storage speed and operability.
Posted: 07 Apr 2015 | Published: 01 Feb 2015

Toshiba

Controlling Keys - How to Prevent Data Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.
Posted: 04 May 2015 | Published: 22 Apr 2015

IntraLinks, Inc

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by Symantec Corporation
EGUIDE: Web security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement