Standards  >   Security Standards  >  

Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 208 Matches Previous Page  |  Next Page
Eliminating Constraints to SSL Implementation
sponsored by Blue Coat Systems
RESOURCE: In this resource you'll find a comprehensive and quick to digest info cache on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Inside you'll also find ways to increase its performance, scalability, and root out malicious activity using it as a cover.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems

Implementing Data Privacy Requirements For Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover how to give visibility to encrypted traffic, reducing the risk of malicious activity to go unnoticed. Also find out how to achieve simple, effective policy enforcement.
Posted: 26 Jul 2016 | Published: 26 Jul 2016

Blue Coat Systems

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems

Busting Myths About Encrypted Communications
sponsored by Blue Coat Systems
RESOURCE: We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

5 Foundations For Managing Encrypted Traffic
sponsored by Blue Coat Systems
RESOURCE: Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

SSL Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Introduction to the EMC XtremIO Storage Array
sponsored by emc first distribution
WHITE PAPER: While an attractive method for boosting I/O performance in the data center, flash storage comes at a hefty price both in high cost and loss of capabilities. Access this white paper to learn about one option that leverages flash to deliver value in performance, scalability and efficiency.
Posted: 23 Jun 2016 | Published: 30 Apr 2015

emc first distribution

Encryption as an IT Service
sponsored by Gemalto
WHITE PAPER: To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

Gemalto

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com

Comparison Guide Email Encryption
sponsored by ZixCorp
WHITE PAPER: Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.
Posted: 01 Jun 2016 | Published: 01 May 2016

ZixCorp

Security Delivery Platform
sponsored by Gigamon
RESOURCE: The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Mobile Video Optimisation
sponsored by Ipoque
EBOOK: To win in mobile, operators know they must win in video delivery. Video usage is now more common on mobile devices than PCs. Access this eBook to discover how to optimize mobile video.
Posted: 27 May 2016 | Published: 27 May 2016

Ipoque

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

Simple, Secure Encryption in the Era of Big Data
sponsored by Gemalto
WHITE PAPER: Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Gemalto SafeNet KeySecure
sponsored by Gemalto
WHITE PAPER: This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform
sponsored by Gemalto
WHITE PAPER: With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

A Step-By-Step Guide to Finding the Right Data Protection System
sponsored by Gemalto
WHITE PAPER: Learn how to deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it be data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides
sponsored by Gemalto
WHITE PAPER: Stuck in the data protection dilemma? How do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats? Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest.
Posted: 17 May 2016 | Published: 01 Apr 2016

Gemalto

Application Awareness: The Critical Enabler in Virtualized Networks
sponsored by Ipoque
WHITE PAPER: Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.
Posted: 17 May 2016 | Published: 29 Apr 2016

Ipoque

Everything You Need to Know About Crypto Management
sponsored by Gemalto
WHITE PAPER: The best way to secure sensitive information is by placing safeguards around the data itself through encryption. Learn how to better manage your encrypted data to enable greater security enforcement and overall better efficiency.
Posted: 13 May 2016 | Published: 01 Apr 2016

Gemalto

It's Time to Re-evaluate Your Email Encryption Solution
sponsored by ZixCorp
VIDEO: Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.
Posted: 12 May 2016 | Premiered: 18 Dec 2013

ZixCorp

Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE: It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Check Point Software Technologies Ltd.
1 - 25 of 208 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement