IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password. This can help prevent access to data by unauthorized persons and provides a layer of security against hackers and other online threats.The concept of hard-drive  … 
Definition continues below.
Data Encryption Reports
26 - 50 of 208 Matches Previous Page  |  Next Page
Reconsidering PKI and its Place in your Enterprise Encryption Strategy
sponsored by
ESSENTIAL GUIDE: Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Tips for Accelerating EHR Systems and Improving Productivity
sponsored by Pure Storage
WHITE PAPER: When VDI implementations fail, the root cause is most often storage. This white paper highlights the ultimate storage strategy that provides the best virtual desktop experience for healthcare. Read now to find out how you can accelerate EHR systems, improve productivity, encrypt PHI, and more.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Pure Storage

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

SSL Offloading and Acceleration in Virtualized Environments
sponsored by Array Networks
WHITE PAPER: Access this white paper to find out how you can offload SSL encryption from virtual servers and virtual load balancers to efficiently achieve high levels of performance and scalability in cloud and virtualized environments.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Array Networks

Kicking off an e-health revolution
sponsored by
EGUIDE: It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems

Putting the Pieces Together: The Complete Picture of Hybrid Cloud Storage
sponsored by Microsoft
RESOURCE: This resource explains how the Microsoft HCS solution manages storage capacity and archives data by leveraging fingerprints as data objects that are accessed directly on Windows Azure Storage and on-premises. Read on now to access multiple deployment scenarios for Microsoft HCS.
Posted: 07 Jan 2016 | Published: 07 Jan 2016


An Expert Guide to Data Archiving with the Hybrid Cloud
sponsored by Microsoft
RESOURCE: In this resource, you will discuss the newest technologies used for digital archiving, and discover how the Microsoft hybrid cloud solution (HCS) can be used to archive data to Windows Azure Storage. Access this resource chapter to utilize cloud replication services that provide DR protection.
Posted: 07 Jan 2016 | Published: 07 Jan 2016


Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

Enterprise Mobile Security for Dummies
sponsored by Skycure
WEBCAST: In this webcast, you'll gain insight into the confusing and evolving mobile security landscape. View now to learn a step-by-step guide to achieve holistic mobile security and review a checklist for evaluating mobile security strategies.
Posted: 07 Dec 2015 | Premiered: Mar 19, 2015


Empower Data Protection with File Encryption and Bring Your Own Collaboration
sponsored by FinalCode
EGUIDE: This e-guide examines a security software that will ensure the highest level of enterprise file protection by encrypting documents individually. Learn why breach training can minimize damage when hackers attack, and access exclusive tips for creating a data classification policy.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


Data Loss Prevention: Decision Time
sponsored by
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Data Loss Prevention: RFP Technology Decisions
sponsored by
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET: This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014

Symantec Corporation

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014


A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012


The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014


Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise
26 - 50 of 208 Matches Previous Page    1 2 3 4 5    Next Page
DATA ENCRYPTION DEFINITION (continued): …  encryption is simple enough. When a file is written to the drive, it is automatically encrypted by specialized software. When a file is read from the drive, the software automatically decrypts it while leaving all other data on the drive encrypted. The encryption and decryption processes are transparent to all common applications such as word processors, databases, spreadsheets or imaging programs. A computer equipped with hard-drive encryption appears, from the user's point of view, to function as any other computer would.Windows Vista Enterprise and Ultimate editions offer a hard-drive encryption … 
Data Encryption definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement