Standards  >   Security Standards  >  

Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 211 Matches Previous Page  |  Next Page
Are you fully secure? Or are you still using weak authentication methods?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you the top 5 ways organizations are using SecurID Access to improve secure sign-ons.
Posted: 24 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

How to Secure Your IAM System
sponsored by Radiant Logic, Inc.
WEBCAST: Discover how to strengthen the security of your IAM system by encrypting data at rest, adding multi-factor authentication, and protecting key accounts.
Posted: 05 Aug 2016 | Premiered: Apr 28, 2016

Radiant Logic, Inc.

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

451 Research: Vormetric Enters Encryption Gateway Fray with Latest Extension to Its Platform Strategy
sponsored by Vormetric
ANALYST REPORT: This 451 Research report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway. The report also offers analysis of the Vormetric Data Security Platform strategy.
Posted: 29 Jul 2016 | Published: 01 Jun 2016

Vormetric

Bloor: For the EU's New Data Protection Regulation, Encryption Should Be the Default
sponsored by Vormetric
WHITE PAPER: This report by Bloor Research discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. Discover how you can make it part of a comprehensive, consistent data security strategy.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Aberdeen Group: Selecting Encryption for "Data at Rest" in Back-End Systems.
sponsored by Vormetric
WHITE PAPER: In this paper, the Aberdeen Group explores why full-disk encryption has become an attractive solution for the risks to data in use at the endpoints—and why file-level encryption is a better fit for the risks associated with data at rest in back-end systems.
Posted: 27 Jul 2016 | Published: 01 Jun 2015

Vormetric

7 Modern Encryption Problems
sponsored by Blue Coat Systems
RESOURCE: This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

A Technology Brief on SSL/TLS Traffic
sponsored by Blue Coat Systems
RESOURCE: In this resource, get a detailed breakdown of SSL/TLS traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

Eliminating Constraints to SSL Implementation
sponsored by Blue Coat Systems
RESOURCE: Find comprehensive information on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Uncover ways to increase its performance, scalability, and root out malicious activity using it as a cover.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems

Implementing Data Privacy Requirements For Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover how to create visibility to encrypted traffic, reducing the risk of malicious activity that goes unnoticed. Also find out how to achieve simple, effective policy enforcement.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems

Busting Myths About Encrypted Communications
sponsored by Blue Coat Systems
RESOURCE: We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

5 Foundations For Managing Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

SSL Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Encryption as an IT Service
sponsored by Gemalto
WHITE PAPER: To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

Gemalto

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Comparison Guide Email Encryption
sponsored by ZixCorp
WHITE PAPER: Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.
Posted: 01 Jun 2016 | Published: 01 May 2016

ZixCorp

Security Delivery Platform
sponsored by Gigamon
RESOURCE: The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Mobile Video Optimisation
sponsored by Ipoque
EBOOK: To win in mobile, operators know they must win in video delivery. Video usage is now more common on mobile devices than PCs. Access this eBook to discover how to optimize mobile video.
Posted: 27 May 2016 | Published: 27 May 2016

Ipoque

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

Simple, Secure Encryption in the Era of Big Data
sponsored by Gemalto
WHITE PAPER: Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE: It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Check Point Software Technologies Ltd.
1 - 25 of 211 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement