Standards  >   Security Standards  >  

Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 193 Matches Previous Page  |  Next Page
How Quantum Computing Will Change Browser Encryption
sponsored by F5 Networks
WHITE PAPER: This white paper provides insight into how quantum computing will affect the current global encryption standard, the Transport Layer Security (TLS), formerly known as SSL.
Posted: 21 Nov 2017 | Published: 13 Jul 2017

F5 Networks

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

BitLocker - A Strong First Step in Data Security
sponsored by WinMagic
WHITE PAPER: According to Crowd Research Partners' BYOD and Mobile Security Spotlight Report, 43% of respondents say device encryption is currently a part of their mobile device management policy. Learn how you can manage BitLocker from a single security window to protect data residing across desktops, mobile devices, and more.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

WinMagic

CloudVM
sponsored by WinMagic
WHITE PAPER: Don't defer the responsibility of protecting your enterprise – take responsibility for protecting your data and workloads in the cloud. Take a look at this technology overview to see if SecureDoc CloudVM is the right approach for your enterprise's cloud data protection and encryption needs.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

WinMagic

Fintech & the digital customer experience
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

ComputerWeekly.com

Managing BitLocker in the Enterprise with SecureDoc
sponsored by WinMagic
WHITE PAPER: Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

WinMagic

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

How to Close Security Gaps to Stop Ransomware and other Threats
sponsored by Fortinet, Inc.
EBOOK: In this e-book, gain a stronger understanding on how protecting your enterprise starts with ensuring coverage across different attack vectors through coordinated Advanced Threat Protection (ATP). Then, find out how IT network pros strive to overcome network security challenges to help increase performance, reliability, and scalability.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Fortinet, Inc.

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

CW ANZ - October 2017: Rise to the big data challenge
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

ComputerWeekly.com

Encrypting Data at Rest
sponsored by Amazon Web Services
WHITE PAPER: This white paper provides an overview of different methods for encrypting your data at rest. Uncover 3 approaches on how encryption keys are managed and where they are used, so you can decide which approach is best for you.
Posted: 09 Oct 2017 | Published: 30 Nov 2014

Amazon Web Services

Encryption Buyer's Guide: 5 Vendor Reviews
sponsored by TechTarget
RESOURCE: Read Encryption Buyer's Guide: 5 Vendor Reviews to find out which encryption strategy is right for you. Security expert, Karen Scarfone reviews 5 encryption vendors to help with your decision. See how these tools compare to fit your needs.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

TechTarget

When Cryptors Attack: Timeline of a Ransomware Infection
sponsored by Kaspersky Lab
WHITE PAPER: The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

Customer Success Story: National Insurance Company
sponsored by J2 Cloud Services
WHITE PAPER: Explore this case study to reveal how a large Fortune 500 insurance company overcame the issue of being at risk for regulatory noncompliance without a secure platform for faxing documents.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

J2 Cloud Services

SaaS-based Billing Provider with Encryption Requirements Turns to Flash
sponsored by Kaminario
CASE STUDY: Download this study to see a snapshot view of how one organization overcame their encryption and capacity conundrums by implementing an all-flash array for their production databases, executing a 10X performance improvement, with built-in encryption to handle data-at-rest requirements.
Posted: 10 Aug 2017 | Published: 31 Aug 2016

Kaminario

Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

HyperConvergence or Hyper-Security? What's Right for Your Enterprise?
sponsored by HyTrust
WHITE PAPER: To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

HyTrust

Making Data Encryption and Rekeying Easier
sponsored by HyTrust
WHITE PAPER: Data encryption is fundamental to successful cybersecurity in modern enterprises. But in a recent study, companies cited budget, performance concerns, and lack of deployment knowledge as the top 3 barriers to implementing an encryption tool. Inside, learn sweat-free secrets to performing critical data security functions.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Accelerating Mobile App Adoption with Frictionless Security
sponsored by Blue Cedar
WHITE PAPER: In this white paper, learn about a new kind of mobile security that injects security code directly into existing applications to encrypt data, provide authentication protocols, and more.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Blue Cedar

The Challenges of Managing SSL/TLS Encrypted Traffic
sponsored by Gigamon
RESEARCH CONTENT: Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.
Posted: 05 May 2017 | Published: 05 May 2017

Gigamon

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Understanding your Full Public Key Infrastructure (PKI) Potential
sponsored by DigiCert
EGUIDE: This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security.
Posted: 06 Sep 2017 | Published: 31 Aug 2017

DigiCert

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro
1 - 25 of 193 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement