IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from  … 
Definition continues below.
Data EncryptionReports
26 - 50 of 199 Matches Previous Page  | Next Page
Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Kicking off an e-health revolution
sponsored by ComputerWeekly.com
EGUIDE: It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

ComputerWeekly.com

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

All Flash Array Data Services Software Teaser
sponsored by Violin Memory
WEBCAST: Watch the following teaser to learn more about a new software storage solution and its benefits, including flexible and powerful business continuity, data efficiency technologies, data protection features, and more.
Posted: 07 Jul 2014 | Premiered: Jun 11, 2014

Violin Memory

Eric Herzog Presents New Enterprise Data Services Software
sponsored by Violin Memory
WEBCAST: Watch this webcast to learn and utilize new economic opportunities. Take advantage of the many benefits that come with this storage solution, including business continuance, data efficiency, data scaling, data protection, and more.
Posted: 07 Jul 2014 | Premiered: Jun 24, 2014

Violin Memory

Developing Your Authentication Strategy
sponsored by i-Sprint Innovations
WHITE PAPER: This white paper offers advice for protecting your data with several authentication strategies.
Posted: 03 Jun 2014 | Published: 31 Dec 2013

i-Sprint Innovations

The future of digital forensics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Detecting the use of TrueCrypt
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Holistic Data Protection Center
sponsored by CommVault Systems, Inc.
VIRTUAL ENVIRONMENT: This rich virtual environment provides videos and a white paper discussing the vital need for optimal data management in all organizations worldwide.
Posted: 24 Feb 2014 | Premiered: 21 Feb 2014

CommVault Systems, Inc.

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

What's New in Symantec Data Loss Prevention
sponsored by Symantec Corporation
DATA SHEET: This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
Posted: 25 Jun 2014 | Published: 30 Apr 2014

Symantec Corporation

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

Secure Access and Continuity in a Virtualized and BYOD World
sponsored by Hewlett-Packard Company
WHITE PAPER: This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Dell Data Protection
sponsored by Dell, Inc.
WEBCAST: This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
Posted: 13 Mar 2014 | Premiered: Mar 13, 2014

Dell, Inc.

Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
WHITE PAPER: This data sheet highlights the benefits of a backup solution for built for laptops and desktops.
Posted: 24 Feb 2014 | Published: 31 Mar 2013

Acronis

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Corporation
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Corporation
26 - 50 of 199 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA ENCRYPTION DEFINITION (continued): …  obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals.In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm … 
Data Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement