Standards  >   Security Standards  >  

Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 193 Matches Previous Page  |  Next Page
Ransomware: Mitigating the Threat
sponsored by Zerto
WHITE PAPER: Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling affects don't threaten your business.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

Zerto

Ransomware: 3 Seconds to Encryption
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Guide to Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Security Overview: SSL/TLS Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Uncover an overview of Secure Socket Layer (SSL)/ Transport Layer Security (TLS) technology and find examples of how you can manage the increasing SSL traffic within your enterprise network and protect it from hidden threats.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Remove the Security Blind Spots Created by Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Top 10 Security Advantages of One Business Management Platform
sponsored by Acumatica
RESOURCE: Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Acumatica

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

Staying Secure in the Cloud Is a Shared Responsibility
sponsored by evident.io
ANALYST REPORT: The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.
Posted: 03 Oct 2016 | Published: 07 Apr 2016

evident.io

MYDIGIPASS for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover a unified identity proofing method and authentication tool that can be used throughout all healthcare IT applications and platforms. Access now to learn the five critical elements to support trusted digital identities and secure information exchange within healthcare organizations and HIT providers.
Posted: 30 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

Public Key Infrastructure: Traditional Deployments vs. IoT PKI
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

How Network Security Specialists Inspect Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: In the following resource, WhatWorks takes a look at NetTects' decision to deploy an SSL visibility tool to detect unwanted network traffic. Inside you'll uncover a Q&A, in which CTO Michael Weinstein reveals his process for network security decision-making.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Blue Coat Systems

Are You Fully Secure? Or Are You Using Weak Authentication Methods?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you the top 5 ways organizations are using authentication to improve secure access and protect valuable data.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

7 Modern Encryption Problems
sponsored by Blue Coat Systems
RESOURCE: This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems

Busting Myths About Encrypted Communications
sponsored by Blue Coat Systems
RESOURCE: We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

5 Foundations For Managing Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Case Study: Enable Care Providers While Protecting Patient Data
sponsored by Digital Guardian
WHITE PAPER: Follow St. Charles Health System's path from risk assessment to remediation of their problems using a data loss prevention technique to monitor their entire network to ensure no important information was being mishandled.
Posted: 06 May 2016 | Published: 01 Apr 2016

Digital Guardian

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by SearchSecurity.com
EZINE: How do you determine if your network is too flat? Without proper network segmentation attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure.
Posted: 02 May 2016 | Published: 02 May 2016

SearchSecurity.com

Does Your Firewall Help You Meet PCI DSS Requirements?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper neatly outlines how firewall deployment impacts PCI DSS standards for a PCI DSS merchant. Access now for information on PCI DSS standards and how you can achieve these requirements.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

WatchGuard Technologies, Inc.

The 5 Features You Absolutely, Positively Must Have to Secure Your Mobile Endpoints
sponsored by Commvault
WHITE PAPER: This white paper presents 5 critical security features that you need to confidently secure mobile devices and protect against would-be thieves and hackers – and forgetful employees.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

Commvault

Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE: It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Check Point Software Technologies Ltd.
1 - 25 of 193 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement