Standards  >   Security Standards  >   Encryption Standards  >  

Triple DES

RSS Feed    Add to Google    Add to My Yahoo!
Triple DES Reports
 
Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

Security First Insurance Handles Disaster Recovery with State-of-the-Art Technology for Business Insights
sponsored by IBM
CASE STUDY: To ensure your organization is effectively accessing your unstructured data check out this exclusive case study. Learn more about the challenges faced by organizations looking to leverage technology to access their content and receive recommendations for overcoming them.
Posted: 20 Mar 2015 | Published: 31 Dec 2014

IBM

Enhancing Microsoft BitLocker for Your Enterprise
sponsored by WinMagic
WEBCAST: While BitLocker is a popular data encryption option, there are some gaps in the technology that need filling. This webcast explores how to enhance BitLocker to protect data at rest on any endpoint.
Posted: 30 Jun 2015 | Premiered: Dec 17, 2014

WinMagic

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Corporation
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Corporation

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Enabling Compliance with the PCI Data Security Standards
sponsored by Vormetric
WHITE PAPER: Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
Posted: 19 May 2008 | Published: 01 Jan 2007

Vormetric

Securing Data Stored On Tape With Encryption
sponsored by Quantum Corporation
WHITE PAPER: With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards
sponsored by Lumension
WHITE PAPER: Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Posted: 06 Apr 2009 | Published: 02 Mar 2009

Lumension

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement