Standards  >   Security Standards  >   Encryption Standards  >  

Symmetric Cryptography

RSS Feed    Add to Google    Add to My Yahoo!
Symmetric Cryptography Reports
 
Security First Insurance Handles Disaster Recovery with State-of-the-Art Technology for Business Insights
sponsored by IBM
CASE STUDY: To ensure your organization is effectively accessing your unstructured data check out this exclusive case study. Learn more about the challenges faced by organizations looking to leverage technology to access their content and receive recommendations for overcoming them.
Posted: 20 Mar 2015 | Published: 31 Dec 2014

IBM

Encrypting data with confidence, across the enterprise and beyond
sponsored by IBM
WHITE PAPER: This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.
Posted: 20 Mar 2015 | Published: 31 Jul 2013

IBM

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

Five Truths About Enterprise Data Protection
sponsored by PGP Corporation
WHITE PAPER: How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy.
Posted: 17 Sep 2009 | Published: 22 Dec 2008

PGP Corporation

Enabling Compliance with the PCI Data Security Standards
sponsored by Vormetric
WHITE PAPER: Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
Posted: 19 May 2008 | Published: 01 Jan 2007

Vormetric

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Securing Data Stored On Tape With Encryption
sponsored by Quantum Corporation
WHITE PAPER: With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

2009 Annual Study: UK Enterprise Encryption Trends
sponsored by PGP Corporation
ANALYST REPORT: Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection.
Posted: 24 Sep 2009 | Published: 25 Jul 2009

PGP Corporation

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement