Software  >   Systems Software  >   Security Software  >  

Message Authentication Software

RSS Feed    Add to Google    Add to My Yahoo!
Message Authentication SoftwareReports
 
Enabling Compliance with the PCI Data Security Standards
sponsored by Vormetric
WHITE PAPER: Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
Posted: 19 May 2008 | Published: 01 Jan 2007

Vormetric

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

2009 Annual Study: UK Enterprise Encryption Trends
sponsored by PGP Corporation
ANALYST REPORT: Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection.
Posted: 24 Sep 2009 | Published: 25 Jul 2009

PGP Corporation

Improving Regulatory Compliance with Encryption
sponsored by Utimaco Safeware
WHITE PAPER: This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions.
Posted: 02 Feb 2009 | Published: 01 Feb 2007

Utimaco Safeware

TrueCrypt
sponsored by TrueCrypt Foundation
TRIAL SOFTWARE: Free open-source disk encryption software for Windows XP/2000/2003 and Linux.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

2009 Annual Study: U.S. Enterprise Encryption Trends
sponsored by PGP Corporation
ANALYST REPORT: Check out this study, which analyzes survey results from 997 U.S. business and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

PGP Corporation

Five Truths About Enterprise Data Protection
sponsored by PGP Corporation
WHITE PAPER: How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy.
Posted: 17 Sep 2009 | Published: 22 Dec 2008

PGP Corporation

New eGuide: How to Fully Protect Your Storage Environment
sponsored by Quantum Corporation
WHITE PAPER: Storage systems are severely susceptible to attack and it is time for organizations to rethink their security tactics. Read this eGuide to learn about concepts regarding storage security and solutions like encryption that can help defend against attack.
Posted: 28 Jan 2008 | Published: 28 Jan 2008

Quantum Corporation

Reduce the Risk of Costly Data Breaches: Three Pillars of Data Protection
sponsored by Iron Mountain
WHITE PAPER: Download this white paper to learn about the elements beyond PC encryption that are necessary for a complete data protection solution and how Iron Mountain Digital's solutions address the three pillars of data protection.
Posted: 21 Feb 2007 | Published: 21 Feb 2007

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement