IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Hard-drive encryption is a technology that encrypts the data stored on a hard drive using sophisticated mathematical functions. Data on an encrypted hard drive cannot be read by anyone who does not have access to the appropriate key or password. This can help prevent access to data by unauthorized persons and provides a layer of security against hackers and other online threats.The concept of hard-drive  … 
Definition continues below.
Data Encryption Reports
1 - 25 of 204 Matches Previous Page  |  Next Page
Security into an IoT Device: Why & How?
sponsored by Inside Secure
WEBCAST: This webinar on December 8th will provide the valuable information needed to help you to understand just what the main IoT security concerns are and what to do about it. Sign up to this free webinar before November 30th and receive a free IoT Security for Dummies Book to download in December.
Posted: 19 Nov 2015 | Premieres: Dec 8, 2015

Inside Secure

Data Encryption and Redaction: A Review of Database Security
sponsored by Oracle Corporation
WHITE PAPER: This SANS report examines the importance of database security and discusses measures you can take to make your databases impenetrable.
Posted: 16 Nov 2015 | Published: 30 Sep 2014

Oracle Corporation

Announcing a Breakthrough Processor: Software in Silicon
sponsored by Oracle Corporation
WEBCAST: In this webinar, John Fowler, Executive Vice President of Systems at Oracle, will introduce to you the all-new family of M7 Systems built on the new 32-core, 256-thread SPARC M7 microprocessor. View this video now to understand how to use a broad set of ciphers for all your apps, complete with end-to-end security.
Posted: 12 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Security for Medical Equipment Makers and Healthcare Providers
sponsored by Symantec & Intuitive
WEBCAST: For healthcare organizations, securing medical devices and sensitive data on them/the network are two of the top security concerns. In this webcast, IT security experts Brian Witten of Symantec and Justin Ware of the Intuitive Technology Group discuss the security measures needed today.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Symantec & Intuitive

Cloud Data Encryption Made Easy
sponsored by Oracle Corporation
WEBCAST: This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Data Archiving for Financial Services
sponsored by Proofpoint, Inc.
WEBCAST: Discover how to simplify data privacy compliance and meet global financial regulation requirements in this informative webcast.
Posted: 09 Nov 2015 | Premiered: Dec 31, 2014

Proofpoint, Inc.

Empower Data Protection with File Encryption and Bring Your Own Collaboration
sponsored by FinalCode
EGUIDE: This e-guide examines a security software that will ensure the highest level of enterprise file protection by encrypting documents individually. Learn why breach training can minimize damage when hackers attack, and access exclusive tips for creating a data classification policy.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Gartner Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types. Discover the 5 key considerations for choosing the right EIA strategy.
Posted: 21 Oct 2015 | Published: 10 Nov 2014

Proofpoint, Inc.

Cloud Computing Without Security Compromises
sponsored by Intel and IBM
WHITE PAPER: In this resource, you'll discover how to guarantee data security in the cloud, from your servers to your applications without ad-hoc, cumbersome fortification. Read on to learn what bare-metal security measures your list of potential cloud providers should be offering to secure your sensitive data.
Posted: 12 Oct 2015 | Published: 23 Sep 2015

Intel and IBM

7 Cloud Security Risks That Will Ruin Your Day
sponsored by Intel and IBM
EGUIDE: This expert e-Guide presents today's top 7 cloud security risks that challenge organizations.
Posted: 29 Sep 2015 | Published: 09 Sep 2015

Intel and IBM

Prevent your SaaS provider from Handing Over Your Data
sponsored by Vaultive
WHITE PAPER: In this handy white paper, you'll learn how to mitigate the risks of blind subpoenas. Read on now to uncover how to use encryption to make it unreadable to authorities without your permission.
Posted: 17 Sep 2015 | Published: 05 Aug 2015


Reconsidering PKI and its Place in your Enterprise Encryption Strategy
sponsored by
ESSENTIAL GUIDE: Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

How Do Enterprise Data Protection Platform Vendors Stack Up?
sponsored by IBM
WEBCAST: In this webcast, Vinny Choinski, Senior Lab Analyst at Enterprise Strategy Group, examines a software solution designed to protect VMware environments by transferring block-level incremental data from snapshots between virtual environments and the TSM server.
Posted: 01 Sep 2015 | Premiered: Sep 8, 2014


How to Use SSL with Cloud Databases
sponsored by Rackspace
WHITE PAPER: This white paper explains how Secure Socket Layer protection (SSL) is now being used to encrypt data on all Cloud Database instances. Read on to see how ensure that your cloud data is encrypted in-transit.
Posted: 28 Aug 2015 | Published: 22 Oct 2014


The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


Four Steps to a Proactive Big Data Security Strategy
sponsored by IBM
WHITE PAPER: This white paper introduces four essential steps to proactively securing all the data in your enterprise.
Posted: 17 Aug 2015 | Published: 30 Jun 2014


HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER: Follow the evolution of HIPAA-HITECH regulations over the past few years, learn why compliance is more important than ever before, and gain knowledge on how to avoid violations inside this resource.
Posted: 04 Aug 2015 | Published: 15 Jul 2015


Enterprise Email Security: Introduction and Tips
sponsored by Mimecast
EGUIDE: In this resource, find expert advice on how to stay ahead of cybercriminals using modern tools and techniques.
Posted: 31 Jul 2015 | Published: 01 Jul 2015


Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014


Keep Your Data Secure: Fighting Back With Flash
sponsored by Micron Technology
WHITE PAPER: This white paper reveals the benefits of hardware encryption for strengthening data security across the enterprise while freeing up IT to take on other important data center tasks.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Micron Technology

Next Generation Cloud Security
sponsored by Symantec Corporation
DATA SHEET: In this data sheet, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec Corporation

Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013


5 Steps to SSL Decryption
sponsored by Gigamon
WHITE PAPER: This white paper explores an alternative, five step SSL decryption strategy.  View now to learn more
Posted: 13 Apr 2015 | Published: 15 Oct 2014


Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems
1 - 25 of 204 Matches Previous Page    1 2 3 4    Next Page
DATA ENCRYPTION DEFINITION (continued): …  encryption is simple enough. When a file is written to the drive, it is automatically encrypted by specialized software. When a file is read from the drive, the software automatically decrypts it while leaving all other data on the drive encrypted. The encryption and decryption processes are transparent to all common applications such as word processors, databases, spreadsheets or imaging programs. A computer equipped with hard-drive encryption appears, from the user's point of view, to function as any other computer would.Windows Vista Enterprise and Ultimate editions offer a hard-drive encryption … 
Data Encryption definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement