IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from  … 
Definition continues below.
Data EncryptionReports
51 - 75 of 199 Matches Previous Page  | Next Page
Privacy and Big Data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

ComputerWeekly.com

Needle in a Datastack: The rise of big security data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: Read on to find an executive checklist that will help you ensure that you are ready to handle both enterprise mobility and bring-your-own-device programs.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Citrix

Challenges With Data Protection in the Cloud
sponsored by SearchSecurity.com
ANALYST BRIEF: This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

SearchSecurity.com

Security University: Database Security Issues
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

SearchSecurity.com

Information Governance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

ComputerWeekly.com

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Iron Mountain

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Essential Enterprise Mobile Security Controls
sponsored by SearchSecurity.com
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

SearchSecurity.com

Secure your data – protect your business
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

ComputerWeekly.com

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

Data Security vs. Performance: Balancing Competing Requirements with New Encryption Capabilities
sponsored by SEPATON
EGUIDE: This e-guide elaborates on new features and benefits of backup and recovery and explains why they are especially critical in IT environments with large volumes of data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

SEPATON

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY: This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013

Ipswitch File Transfer

Global Deduplication: How it Works and Who Can Benefit
sponsored by Essextec
EGUIDE: This expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Essextec

McAfee Endpoint Encryption
sponsored by McAfee, Inc.
WHITE PAPER: This resource will introduce you to a solution that can offer you multiple layers of protection against data loss and unauthorized access while also providing centralized deployment, management, shared policy administration, password recovery, and more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

Healthcare Network Security with Fewer House Calls: Solution Brief
sponsored by Intel
WHITE PAPER: By evaluating offerings and finding the right investment, a struggling IT campus-based IT department they were able to install a remote management solution that allowed them to simplify IT and better secure the sensitive patient data residing in their on-campus health center.
Posted: 30 May 2013 | Published: 30 May 2013

Intel

How Deduplication Fits into Your Data Backup Plan
sponsored by SearchDataBackup.com
EBOOK: This exclusive E-Book provides insight into the things you must consider about the way dedupe is performed as well as the ways in which it integrates with other data protection processes such as replication, encryption/compression and archiving.
Posted: 03 May 2013 | Published: 03 May 2013

SearchDataBackup.com

Intel Laptop Processor Comparison Tool
sponsored by Intel
ASSESSMENT TOOL: See how you can use this handy comparison tool to evaluate the performance, security, and manageability features and benefits of different laptop processors. Strategically choose the solution that best matches your business needs -- click through now to get started!
Posted: 31 Dec 2012 | Published: 31 Dec 2012

Intel

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

GeoTrust, Inc.

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012

Venafi

FAQ Guide: Data Backup & Security Pain Points
sponsored by Quantum Corporation
EGUIDE: This FAQ Guide can help you get started on the right path to securing your stored and backed up data. Access it now to find questions and answers about data encryption challenges and appliances, cloud storage security, and tape, host-based or disk encryption approaches.
Posted: 31 Oct 2012 | Published: 31 Oct 2012

Quantum Corporation

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.
51 - 75 of 199 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA ENCRYPTION DEFINITION (continued): …  obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals.In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm … 
Data Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement