IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from  … 
Definition continues below.
Data EncryptionReports
101 - 125 of 178 Matches Previous Page  | Next Page
Five Best Practices for Protecting Backup Data
sponsored by Iron Mountain.
WHITE PAPER: Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Iron Mountain.

Information Security Magazine – June 2010: Laptop Lockdown
sponsored by Information Security Magazine
EZINE: This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
Posted: 16 Jun 2010 | Published: 16 Jun 2010

Information Security Magazine

CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO: Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010

arcserve

Securing Data Stored on Tape with Encryption
sponsored by Quantum Corporation
IT BRIEFING: Considering company data needs to be stored for longer periods of time and the high cost of a data breach; the need to encrypt data stored on tape is becoming increasingly important. Read this paper now to learn about why companies are moving in this direction, and what technologies are out there to help.
Posted: 03 May 2010 | Published: 30 Apr 2010

Quantum Corporation

6 Reasons Why Software-Based Encryption Doesn’t Stack Up
sponsored by MXI Security
WHITE PAPER: Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

MXI Security

E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH
sponsored by SearchHealthIT.com
EBOOK: Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

SearchHealthIT.com

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Insight

Smarter Deduplication with CommVault® Simpana® Software
sponsored by CommVault Systems, Inc.
WHITE PAPER: Business and IT are both struggling with how to protect, monitor, maintain and recover business-critical data when it continues to grow at 30-50 percent per year. Read this white paper to learn how CommVault® Simpana® software provides a holistic approach to data deduplication.
Posted: 08 Mar 2010 | Published: 08 Mar 2010

CommVault Systems, Inc.

Expert Analyst Reviews the Ins and Outs of Database Encryption
sponsored by Guardium, an IBM Company
EGUIDE: In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project.
Posted: 16 Feb 2010 | Published: 16 Feb 2010

Guardium, an IBM Company

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Encryption Key Management: A Technical White Paper
sponsored by Quantum Corporation
WHITE PAPER: Securing data from unauthorized access is a critical issue for businesses in all industries. Regulatory compliance and customer loyalty all depend on keeping sensitive information safe and secure. Businesses must take steps to improve data confidentiality and integrity.
Posted: 03 Feb 2010 | Published: 01 Oct 2007

Quantum Corporation

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
sponsored by Lumension
WHITE PAPER: Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

Lumension

Lumension® Device Control for Microsoft® System Center
sponsored by Lumension
DATA SHEET: Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.
Posted: 21 Jan 2010 | Published: 21 Jan 2010

Lumension

Accelerating IBM z/OS Global Mirror with the Cisco MDS 9000 Family
sponsored by Cisco Systems, Inc.
WHITE PAPER: This document describes how users of IBM z/OS Global Mirror can reduce costs and improve performance with a tightly integrated Cisco® MDS 9000 Family solution.
Posted: 29 Dec 2009 | Published: 29 Dec 2009

Cisco Systems, Inc.

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

The Business Impact of Data Security Regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Remote Encryption Management SDK
sponsored by Intel
SOFTWARE DOWNLOAD: Remote Encryption Management Software Development Kit (SDK) provides the tools to allow FDE or software based encrypted hard drives to be unlocked remotely out of band using vPro. This allows computers with vPro and encrypted hard drives to be managed out-of-band. Learn more about this SDK and download your free copy today.
Posted: 10 Nov 2009 | Premiered: 21 Sep 2009

Intel

Data Deduplication – Different Approaches for Different Environments
sponsored by Hewlett-Packard Company
PRESENTATION TRANSCRIPT: There are so many different types of deduplication: source, target, hash-based, delta differential-based, and global dedupe, for example. Read this presentation transcript for a discussion of data backup methods, data security, and data storage strategies for various environments.
Posted: 29 Oct 2009 | Published: 26 Oct 2009

Hewlett-Packard Company

Presentation Transcript: State of New York Government Case Study
sponsored by McAfee, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript to see how the State of New York saved millions of dollars, reduced management time, and improved compliance by standardizing on McAfee for complete system protection.
Posted: 14 Oct 2009 | Published: 14 Oct 2009

McAfee, Inc.

Securing Data Stored On Tape With Encryption
sponsored by Quantum Corporation
WHITE PAPER: With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

Data Security Laws in the US
sponsored by Quantum Corporation
ASSESSMENT TOOL: This list features a selection of Data Security laws in the US. As Quantum is a computer storage company, we cannot be held responsible for the accuracy of this list. Please check with your local government or legal advisors on the laws in your own location. Thank you.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

2009 Annual Study: UK Enterprise Encryption Trends
sponsored by PGP Corporation
ANALYST REPORT: Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection.
Posted: 24 Sep 2009 | Published: 25 Jul 2009

PGP Corporation

2009 Annual Study: U.S. Enterprise Encryption Trends
sponsored by PGP Corporation
ANALYST REPORT: Check out this study, which analyzes survey results from 997 U.S. business and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

PGP Corporation

Five Truths About Enterprise Data Protection
sponsored by PGP Corporation
WHITE PAPER: How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy.
Posted: 17 Sep 2009 | Published: 22 Dec 2008

PGP Corporation
101 - 125 of 178 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA ENCRYPTION DEFINITION (continued): …  obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals.In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm … 
Data Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement