Software  >   Systems Software  >   Security Software  >  

Database Encryption Software

RSS Feed    Add to Google    Add to My Yahoo!
Database Encryption Software Reports
 
Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Reduce the Risk of Costly Data Breaches: Three Pillars of Data Protection
sponsored by Iron Mountain
WHITE PAPER: Download this white paper to learn about the elements beyond PC encryption that are necessary for a complete data protection solution and how Iron Mountain Digital's solutions address the three pillars of data protection.
Posted: 21 Feb 2007 | Published: 21 Feb 2007

Iron Mountain

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

Enabling Compliance with the PCI Data Security Standards
sponsored by Vormetric
WHITE PAPER: Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
Posted: 19 May 2008 | Published: 01 Jan 2007

Vormetric

2009 Annual Study: UK Enterprise Encryption Trends
sponsored by PGP Corporation
ANALYST REPORT: Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection.
Posted: 24 Sep 2009 | Published: 25 Jul 2009

PGP Corporation

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY: This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013

Ipswitch File Transfer

New eGuide: How to Fully Protect Your Storage Environment
sponsored by Quantum Corporation
WHITE PAPER: Storage systems are severely susceptible to attack and it is time for organizations to rethink their security tactics. Read this eGuide to learn about concepts regarding storage security and solutions like encryption that can help defend against attack.
Posted: 28 Jan 2008 | Published: 28 Jan 2008

Quantum Corporation

6 Reasons Why Software-Based Encryption Doesn’t Stack Up
sponsored by MXI Security
WHITE PAPER: Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

MXI Security

byREQUEST®: Automatically Sweeps Files into Sharepoint
sponsored by Hillary Software
TRIAL SOFTWARE: From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.
Posted: 21 Jul 2009 | Premiered: 21 Jul 2009

Hillary Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement