You've requested...

Datenverschlüsselung im und außerhalb des Unternehmens

If a new window did not open, click here to view this asset.

Download this next:

Meeting the demands of modern data management

Today’s organizations are in possession of more data than ever before, necessitating new means of storing, organizing, and utilizing data.

This product overview looks at Panzura CloudFS, a global file system purpose-built to meet the challenges of modern data management.

Download now to learn how Cloud FS transforms complex, multicomponent, and often multi-vendor environments into a singular, scalable, and efficient approach to data management.

These are also closely related to: "Datenverschlüsselung im und außerhalb des Unternehmens"

  • Jargon Buster Guide to Post Quantum Cryptography

    Post-quantum cryptography is appearing on a growing number of security-related conference agendas as a range of different countries invest in quantum computing and report progress in this regard because viable quantum computers pose a direct threat to most of the encryption systems currently used to protect the most sensitive information by governments and military and commercial organisations.

    The problem lies in the fact that most public key cryptography is based on asymmetric encryption systems that are based on complex mathematical problems that would even take a super computer a long time to solve. However, computers based on quantum mechanics will theoretically be able to able to carry out integer factorisation of very large prime numbers and compute discrete logarithms very quickly, allowing attackers to be able to discover the encryption keys for targeted systems.

    To ensure that extremely sensitive data held by governments and military and commercial organisations is still secure in a post-quantum era, when attackers will be able to access quantum computers, many experts in the field believe that organisations that rely on encryption to keep data safe should be investigating post-quantum alternatives already so that they are ready to switch to these systems as soon as they are necessary.

    The definitions and articles in this e-guide Jargon Buster will help you understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

  • IBM vs. Oracle: Data security platforms

    Data security has grown in importance over the entire data lifecycle, especially with Digital Personal Data Protection (DPDP) bill approved, the cost of failing to protect one’s data expands far beyond the effort companies put into recovering lost information.

    The Leadership Compass report from KuppingerCole, provides an overview of the Data Security Platforms market, along with guidance and recommendations for finding the sensitive data protection and governance products that best meets clients’ requirement.

    The report examines the broad range of technologies involved, vendor product and service functionality, relative market shares and more.

    Read the data security report here.

Find more content like what you just read:

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

    Download

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

    Download

  • The exploitation of flaws in the HTTPS protocol

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

    Download

  • 8 secure file transfer services for the enterprise

    Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.

    Download

  • Computer Weekly – 15 October 2019: Securing the internet of things

    In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.

    Download

  • Backup deduplication: a complete guide

    There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.

    Download

  • An introduction to quantum computing

    Quantum computing promises to revolutionise the capabilities of IT and take it to the next level beyond Moore's Law. But we're not there yet, and there is much to do before it reaches the mainstream. In this guide, we examine the challenges and opportunities of quantum computing.

    Download

  • Computer Weekly – 12 September 2023: The dangers of breaking encryption

    In this week's Computer Weekly, we detail the concerns of IT experts about the UK's Online Safety Bill's proposals to weaken end-to-end message encryption. Our buyer's guide continues to look at the issues around integrating SaaS applications, with a particular eye to the proliferation of SaaS during the Covid pandemic. Read the issue now.

    Download

  • Streamline cloud security across all environments

    Secure your hybrid cloud with consistent security policies across Red Hat Enterprise Linux and AWS. Learn how to mitigate risks, implement layered security, and streamline compliance. Download this product overview to discover the integrated security capabilities.

    Download

  • A strategic approach to maintaining PCI DSS 4.0 compliance

    As PCI DSS 4.0 brings new compliance requirements, organizations need a streamlined approach to address them. This whitepaper outlines how Cloudflare's connectivity cloud can help you meet PCI DSS 4.0 with security, visibility, and automation. Read the full whitepaper to learn more.

    Download

  • Key security findings: Over 1,000 IT and Security decision makers interviewed

    To uncover the true state of Hybrid Cloud Security, Gigamon conducted a study with over 1,000 IT and Security decision makers from across 6 key global markets. This white paper provides a summary of the research, highlighting the most important findings in order to deliver key takeaways. Read on to learn more.

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • Preventing identity theft in a data breach

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

    Download

  • Examining the Healthcare Industry's Potential for Confidential Computing

    Confidential computing will become key to protecting patient data as healthcare organizations seek to leverage cloud computing environments.

    Download

  • A Security Assessment of Android Full-disk Encryption

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • 2 types of endpoint encryption to protect data

    Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

    Download

  • 7 NAS encryption best practices to protect data

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

    Download

  • Royal Holloway: Secure connected and autonomous vehicles - the long road ahead

    Advances in technology have led to  safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.

    Download

  • Why 85% of organizations worry about cloud security in 2024

    Discover in this product overview how using Red Hat Enterprise Linux as your operating foundation across environments can help you create the consistency needed to maintain security and compliance in the cloud.

    Download

  • Bolster signature-based malware detection with machine learning

    Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.

    Download

  • Views from the c-suite: why endpoint management is more critical than ever before

    What were once your successful defense strategies have been outpaced by advancements in cyberthreats, leaving your endpoints vulnerable to attacks. So, how can you strengthen your endpoint security? By setting in motion 10 strategies for endpoint management. Dig into this white paper to unlock them.

    Download

  • CW Nordics August 2018

    In April 2017, the Swedish capital Stockholm was the scene of a terrorist attack which saw a truck used as a weapon on a pedestrianised street. It left five people dead and 14 seriously injured.

    Download

  • Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans

    In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.

    Download

  • Confidential computing: What it is and why it matters

    Today, with increased compliance and regulation, ensuring the privacy and security of sensitive data throughout its lifecycle has never been more crucial. In this report, IDC explores the core concepts of confidential computing, and explores the important role it has to play in the future of data security. Read on to learn more.

    Download

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

    Download

  • A guide to where mainframes fit in the cloud

    Far from being legacy IT, the mainframe is a driving force in modern computing. In this e-guide we look at its place in cloud computing.

    Download

  • CIO Trends #7: Nordics

    This e-guide features articles outlining how Norway's tax office is fighting economic crime through the use of the latest IT, why Nokia has been at the centre of an investigation following a blackmail scandal and what caused Visa's global payment system to go offline in June 2018.

    Download

  • Cyber Liability Insurance

    Like health insurance, cyber insurance is a line of coverage designed to mitigate losses from cyber incidents. This white paper looks at how cyber insurance can help in the case of a cyber incident, highlighting how security controls such as MFA and endpoint security can bolster the effects of insurance, and lower rates. Read on to learn more.

    Download

  • Print security: An imperative in the IoT era

    Analyst group Quocirca gives the perspective on the risks and best practices of print security.

    Download

  • The vulnerability of backup in a predominantly remote + cloud world

    Backup is fundamental to IT, but things have changed a lot recently. The pandemic has had a key impact in this. In this e-guide we look at the effects of the pandemic on backup, including the increased prevalence of remote working and use of the cloud.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • CW Europe – September 2018: Costs stack up for Dutch government IT projects

    In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.

    Download

  • PowerEdge - Cyber Resilient Infrastructure for a Zero Trust World

    PowerEdge - Cyber Resilient Infrastructure for a Zero Trust World is a new interactive eBook from Dell Technologies and Intel®.

    Download

  • Cyber Resilient Infrastructure for a Zero Trust World

    Your organization must combat a multitude of cyberthreats every day. Learn how an in-depth security stance that begins with Dell PowerEdge servers, powered by Intel© Xeon© scalable processors can help you win.

    Download

  • $265 billion: The projected cost of ransomware in 2031

    According to McKinsey, ransomware costs are projected to reach a staggering $265 billion by 2031. This white paper will show you how Panzura Detect compliments the robust passive protections inherent in Panzura CloudFS. Read on to learn more.

    Download

  • 4 types of server hardware and their pros and cons

    Servers host applications, manage files and perform analytics. Any organization can benefit from the power and versatility that servers provide, but it can be difficult to know which types of server hardware to choose. In this infographic, we take a look into the major types of servers, their advantages and disadvantages.

    Download

  • Navigating Cybersecurity as a Service: A Buyer's Guide

    As cloud adoption grows, cybersecurity is a critical concern. This buyer's guide examines factors to consider when selecting a Cybersecurity as a Service solution, including vendor trust, security requirements, and cost. Learn how to secure your digital business with Utimaco's Trust as a Service. Read the full guide.

    Download

  • Quantum computing in action

    In this e-guide, we look at Finland and how state investment is being used in a milestone project involving public and private sector organisations to understand the applications of the technology. And we hear how Spanish bank BBVA is examining the complex financial problems that could be solved by quantum computing.

    Download

  • Infographic: Bitdefender's security solutions for healthcare, finance, & more

    Bitdefender offers a robust security suite tailored to industries like healthcare, finance, and manufacturing. The solutions provide comprehensive threat prevention, detection, and response capabilities. Learn how Bitdefender can strengthen your security posture and improve compliance by reading the full infographic.

    Download

  • Benefits of Bitdefender's Unified Security & Risk Analytics Built for MSPs

    Bitdefender's unified security platform, GravityZone Cloud MSP, provides advanced endpoint protection, including EDR, XDR, and cloud security. The platform delivers deep security context and offers 24/7 managed detection and response services. Explore the full portfolio to enhance your MSP security with Bitdefender.

    Download

  • Explore 10 security design principles for medical systems

    This white paper outlines 10 key security principles for designing secure medical systems, including data encryption, secure boot, hardware partitioning, and input validation. Implementing these principles can help protect against cyberattacks and safeguard patient health. Read the full white paper to learn more.

    Download

  • Computer Weekly – 26 September 2023: Preparing for post-quantum cryptography

    In this week's Computer Weekly, our latest buyer's guide assesses the challenges for cryptography in the emerging era of quantum computing. Google Cloud experts explain how the internet giant is preparing its datacentres for a world of AI. And we examine the privacy, compliance and backup issues from generative AI. Read the issue now.

    Download

  • 8 ways Linux supports modern IT and business goals

    In this e-book, discover an extensive overview of why the operating system—and specifically the Linux operating system—still matters today and how it meets modern IT and business demands.

    Download

  • GDPR: Risk, opportunity and what it means for security professionals

    This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.

    Download

  • MicroScope – October 2020: Get in touch with remote network security

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

    Download

  • Data protection modernization strategies for healthcare

    Healthcare payers must safeguard data amidst rising costs and member demands. This report details security-first storage solutions for rapid data recovery, including ransomware recovery guarantees and container-level protection for cloud apps. Discover data protection modernization strategies.

    Download