Standards  >   Security Standards  >  

Encryption Standards

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 198 Matches Previous Page  |  Next Page
Dynamic Multipoint Virtual Private Network (DMVPN)
sponsored by Global Knowledge
WHITE PAPER: Access this white paper to learn different approaches to network design with DMVPN.
Posted: 21 May 2015 | Published: 30 Apr 2015

Global Knowledge

Best Practices for FTP in the Enterprise
sponsored by IBM
EGUIDE: In this expert guide, you'll find the information you need to decide whether or not it's time to move on from FTP. Additionally, this guide offers tips for achieving best practice if you do stick with FTP.
Posted: 21 May 2015 | Published: 21 May 2015

IBM

Avoid Risks by Keeping Secure FTP Policies Straightforward
sponsored by IBM
EGUIDE: In this e-guide, discover why most users fail to securely transfer files and what you can do to stop their risky behavior.
Posted: 21 May 2015 | Published: 21 May 2015

IBM

The Value of Encryption When Deploying Cloud File-Sharing Services
sponsored by Signiant, Inc.
WHITE PAPER: In this expert e-guide, discover tips for efficiently rolling out your cloud file-sharing service and for ensuring that you're using smart encryption practices while doing so.
Posted: 20 May 2015 | Published: 20 May 2015

Signiant, Inc.

The Keys to BYOD Security Success
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, you'll learn how to plan for BYOD security and discover tips for minimizing risk by enforcing solid policies with encryption.
Posted: 18 May 2015 | Published: 18 May 2015

Dell, Inc. and Intel®

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Secure Federal Data and Support Your Mobile Workforce
sponsored by Absolute Software
WHITE PAPER: This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.
Posted: 06 May 2015 | Published: 06 May 2015

Absolute Software

Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

Controlling Keys - How to Prevent Data Leaks
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.
Posted: 04 May 2015 | Published: 22 Apr 2015

IntraLinks, Inc

Dell Data Protection Infographic
sponsored by Dell, Inc. and Intel®
DATA SHEET: This infographic details how Dell technology allows you keep systems and data protected, even for those systems that are missing. Learn how it continuously monitors the security state of all systems and how if a system detects an attempted attack, encryption keys can be automatically destroyed so your information can't be stolen.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Dell, Inc. and Intel®

Optimal care for patients and their data
sponsored by Dell, Inc. and Intel®
CASE STUDY: Access this case study to learn how FastMed Urgent Care combined leading encryption technology to encrypt all endpoint devices with file-level encryption in order to protect patient data with the highest level of encryption.
Posted: 30 Apr 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER: In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Absolute Software

Mobile Device Management Policy Best Practices
sponsored by IBM
WHITE PAPER: In this white paper, you'll discover the 10 best practices for developing a successful mobile device management plan.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER: Follow the evolution of HIPAA-HITECH regulations over the past few years, learn why compliance is more important than ever before, and gain knowledge on how to avoid violations inside this resource.
Posted: 29 Apr 2015 | Published: 31 Dec 2013

Absolute Software

Flexible, secure solutions to keep unauthorized users out of your data
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Inside this white paper, find out how to go beyond passwords with advanced authentication measures in order to secure data at every endpoint in your organization. Discover security tools that are designed to provide an end-to-end coverage and support for advanced hardware authentication.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

Dell, Inc. and Intel®

Secure network traffic between hosts systems and remote PCs/web browsers
sponsored by OpenText
PRODUCT OVERVIEW: Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.
Posted: 24 Apr 2015 | Published: 31 Mar 2015

OpenText

Critical Factors to Endpoint Security
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.
Posted: 24 Apr 2015 | Published: 31 Dec 2013

Dell, Inc. & Intel®

Device and Data Protection - Part 2
sponsored by Dell, Inc. and Intel®
WEBCAST: Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Device and Data Protection - Part 1
sponsored by Dell, Inc. and Intel®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Beginner's Guide to SSL Certificates
sponsored by Symantec
WHITE PAPER: The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.
Posted: 23 Apr 2015 | Published: 31 Oct 2013

Symantec

New Encryption Algorithm Put to the Test
sponsored by Symantec
WHITE PAPER: This white paper presents the results of several research tests performed on elliptic curve cryptography (ECC), a new and promising SSL/TSL encryption algorithm.
Posted: 23 Apr 2015 | Published: 31 Dec 2013

Symantec

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015

CloudPassage

Your Quick Reference Guide to Always-On SSL
sponsored by Symantec
WHITE PAPER: This white paper explains the benefits of always-on SSL and how you can implement it on your sites.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Symantec

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: Explore this white paper to learn how decryption is a necessary tool in network security and monitoring.
Posted: 16 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems
1 - 25 of 198 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement