IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encryption

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: File Encryption, Electronic Security, Database Encryption, Data-encryption, Data Encription, Data Base Encryption, Encryption, Encryption Security
DEFINITION: Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from  … 
Definition continues below.
Data Encryption Reports
1 - 25 of 197 Matches Previous Page  |  Next Page
Next Generation Cloud Security
sponsored by Symantec
WHITE PAPER: In this white paper, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec

Self-encrypting Drives: You Don’t Have to Sacrifice Performance for Security
sponsored by SanDisk Corporation
WHITE PAPER: A complimentary white paper on high-performing, secure and affordable SanDisk SSDs.
Posted: 07 May 2015 | Published: 07 May 2015

SanDisk Corporation

Dell Wyse thin client all-in-one 5212
sponsored by Dell, Inc.
DATA SHEET: Access this informative data sheet to discover an all-in-one thin client architecture, combining the power of a thin client operating system with a thin client desktop. Explore five industry use cases for this technology and learn how it delivers an excellent virtual desktop experience for users while simplifying management for IT.
Posted: 04 May 2015 | Published: 04 May 2015

Dell, Inc.

Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013

Symantec

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 20 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide walks you through the importance of trusted certificates and the roles that Certificate Authorities (CAs) play. View now to explore the web security threat landscape and to learn the fine print about SSL and certificates.
Posted: 15 Apr 2015 | Published: 10 Dec 2014

GeoTrust, Inc.

5 Steps to SSL Decryption
sponsored by Gigamon
WHITE PAPER: This white paper explores an alternative, five step SSL decryption strategy.  View now to learn more
Posted: 13 Apr 2015 | Published: 15 Oct 2014

Gigamon

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

The Power of Self-Encrypting SSD
sponsored by Toshiba
WHITE PAPER: This video examines a self-encrypting SSD offering that addresses the performance drains of CPU software-based encryption in order to greatly improve storage speed and operability.
Posted: 07 Apr 2015 | Published: 01 Feb 2015

Toshiba

Using Backup Software For Secure, Offsite Data Protection
sponsored by Asigra
WEBCAST: Access this Q&A video to hear from Craig Cook, Director of OnDemand Services at Long View Systems, about why he chose Asigra for a secure backup solution that allowed the consulting and managed services provider to go to market with a cloud backup offering.
Posted: 07 Apr 2015 | Premiered: Aug 31, 2014

Asigra

6 Requirements for Enterprise Key Management
sponsored by HP Security Voltage
WHITE PAPER: This white paper walks you through the six requirements for a robust key management system. Explore why traditional key management architectures have fallen short and how to fill the gaps in your strategy.
Posted: 02 Apr 2015 | Published: 27 Oct 2014

HP Security Voltage

Protecting Sensitive Emails without Impacting the User Experience
sponsored by HP Security Voltage
WHITE PAPER: Explore how to implement an end-to-end email encryption strategy that remedies the flaws of traditional systems.
Posted: 01 Apr 2015 | Published: 14 Feb 2014

HP Security Voltage

Ensuring End-to-End Data Protection
sponsored by HP Security Voltage
WHITE PAPER: In this white paper, explore how encryption, tokenization, and data masking provide a comprehensive approach to data protection.
Posted: 01 Apr 2015 | Published: 14 Apr 2013

HP Security Voltage

Take Control of Your Business Environment With Several Integrated Solutions
sponsored by Novell Ltd.
WHITE PAPER: Access this white paper to discover a new strategy designed to facilitate and accelerate endpoint management.
Posted: 25 Mar 2015 | Published: 01 Oct 2014

Novell Ltd.

Security First Insurance Handles Disaster Recovery with State-of-the-Art Technology for Business Insights
sponsored by IBM
CASE STUDY: To ensure your organization is effectively accessing your unstructured data check out this exclusive case study. Learn more about the challenges faced by organizations looking to leverage technology to access their content and receive recommendations for overcoming them.
Posted: 20 Mar 2015 | Published: 31 Dec 2014

IBM

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Meet Health Industry Regulations and Secure Sensitive Health Files
sponsored by Ipswitch File Transfer
CASE STUDY: Access this case study to learn how one health insurance provider was able to securely manage, view and control all of their file transfer activity with an automated system.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

SSL Offloading and Acceleration in Virtualized Environments
sponsored by Array Networks
WHITE PAPER: Access this white paper to find out how you can ensure high performance in both virtualized cloud and data center environments.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Array Networks

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

The Current Chaotic State of Data Traffic Security
sponsored by Certes Networks
WHITE PAPER: This white paper explores the results of a survey of more than 6 million IT professionals that aimed to discover how companies across the globe handle data in motion and other IT security issues. The results made one thing apparent: Data traffic encryption is a mess.
Posted: 06 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Enterprise Endpoint Backup: Automatic Backup Solution
sponsored by Code42
WHITE PAPER: Access this white paper to find out about the single, scalable, cross-platform solution for enterprise endpoint backup that Genentech implemented to give them peace of mind.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Code42

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com
1 - 25 of 197 Matches Previous Page    1 2 3 4    Next Page
 
DATA ENCRYPTION DEFINITION (continued): …  obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals.In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm … 
Data Encryption definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement