You've requested...

The Growing Need for Self-Encrypting Drives

If a new window did not open, click here to view this asset.

Download this next:

2 types of endpoint encryption to protect data

Encryption is the key layer in any data security strategy as it ensures data cannot be read by unauthorized users. Even if multiple layers of protection fail or are breached, encrypted data stays protected.

Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.

These are also closely related to: "The Growing Need for Self-Encrypting Drives"

  • Cloud computing storage key management

    Advances in technology in a commercial market have changed the shape of the traditional cloud concepts. Cloud computing has been of commercial interest not only because it offers cost-effective services, but also the easy adaptation of new technology.

    Many cloud services have advertised the high security of cloud data; however, consumers have limited access to operability in the cloud. The growth of interconnected networks has also increased the security threats on the data.

    Key management between an organisation and its data stored in the cloud infrastructure is one of the biggest challenges in achieving the assurance of the integrity and confidentiality of cloud data.

  • E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses

    Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. Microsoft promised a breadth of new security features with this release, but are they all as good as they sound? This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.

Find more content like what you just read:

  • Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

    In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.

    Download

  • Defining "evil maid" attacks, how to stop them

    In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.

    Download

  • How Consumerization Affects Security and Compliance

    The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.

    Download

  • Mobile Data Security and Compliance Challenges in the Enterprises

    The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.

    Download

  • Learn application security in a practical way

    Application security is a hot topic in the digital-first era. Developers today face more cyber threats than ever before. Because of that, it is critical that all developers continue to enhance their skillset. For those developers who want to learn more about app security, but in a practical way, this eBook is what you need. Read on to learn more.

    Download

  • Securing the perimeter-less network with increased visibility

    With the death of the network perimeter, cybercriminals have proven that every asset is a potential entry point for an attack. FortiGate Next-Generation Firewalls

    Download

  • A Security Assessment of Android Full-disk Encryption

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • 7 NAS encryption best practices to protect data

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

    Download

  • The exploitation of flaws in the HTTPS protocol

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

    Download

  • Buyer’s guide to ransomware resilience

    On average it takes 3.5 weeks for an organization to recover their operations after a ransomware attack. Can your organization afford such a setback? This white paper presents an in-depth buyer’s guide to ransomware resilience, highlighting the key criteria you need to look for in a potential offering. Read on to learn more.

    Download

  • Security and efficiency with entry-level hardware security modules (HSMs)

    Security is often constrained by limited resources, but with entry level hardware security modules (HSMs), tailored to function seamlessly within these limitations, security doesn’t have to come at the expense of efficiency. Unlock Utimaco’s catalogue of offerings and find the HSM that’s right for your organization.

    Download

  • How to use a public key and private key in digital signatures

    Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents.

    Download

  • Views from the c-suite: why endpoint management is more critical than ever before

    What were once your successful defense strategies have been outpaced by advancements in cyberthreats, leaving your endpoints vulnerable to attacks. So, how can you strengthen your endpoint security? By setting in motion 10 strategies for endpoint management. Dig into this white paper to unlock them.

    Download

  • SWG: Answering FAQs

    To battle proliferating web-based threats, many organizations have adopted a secure web gateway (SWG) in order to filter malicious content. For leaders interested in augmenting their SWG knowledge, this e-book can serve as a comprehensive guide. Tap into the book to unlock answers to FAQs about SWGs.

    Download

  • CW ANZ - December 2018: Rise to cloud and data management challenges

    In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges.

    Download

  • Secure Voting

    This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.

    Download

  • Mobile Device Security Best Practices for BYOD

    This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.

    Download

  • Securing Data, Not Endpoints: The Best Way to Control Consumerization

    Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.

    Download

  • Is your infrastructure orchestration platform secure?

    Because infrastructure orchestration platforms have access to data and configurations throughout a network, organizations must ensure that these platforms are secure. To learn about four key security components of such a platform, take a look through this overview.

    Download

  • Infographic: 4 types of ransomware

    Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.

    Download

  • eGuide: Expert Tips for Deploying Secure Messaging Technologies

    This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.

    Download

  • Jargon Buster Guide to Post Quantum Cryptography

    This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.

    Download

  • Technical guide on Web Security Gateways

    Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.

    Download

  • A Computer Weekly buyer's guide to optimising storage

    The implementation of effective storage optimisation has becomean important factor in business. In this 12-page buyer's guide,Computer Weekly looks at cost implications, the hyper-convergedinfrastructure minefield and the alternatives to shared storage

    Download

  • 8 secure file transfer services for the enterprise

    Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.

    Download

  • Digital secure remote payment: How Apple Pay can change the future of remote payments

    Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • MicroScope – October 2020: Get in touch with remote network security

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

    Download

  • Focus: IT Security in the Middle East

    In this issue, we look at the challenges facing organisations in the Middle East as they increasingly rely on digital technologies to engage with customers and citizens.We also analyse specific risks to enterprises, such as malware sneaking into networks under the guise of encryption.

    Download

  • Why deep visibility is essential to stopping cyberthreats

    In the current threat landscape, deep observability is essential for security teams looking to secure lateral movement over encrypted channels. This infographic contrasts the differences in potential threat detection with and without plaintext visibility from Precryption. Download now to learn more.

    Download

  • Preventing identity theft in a data breach

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

    Download

  • Desktop Admin for BYOD: Security Chapter

    The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the most out of this trend.

    Download

  • Surviving Ransomware: What You Need to Know

    Ransomware attacks dominate headlines in a seemingly endless parade of compromises in numerous sectors. From Trojan.Gpcoder, the first modern ransomware exploit, to high-profile hits on Colonial Pipeline, it’s becoming clear that security practitioners are up against formidable foes. Read this white paper to learn how to survive ransomware.

    Download

  • Explaining How Trusted SSL Certificates and Forged SSL Certificates Work

    This expert e-guide explores how trusted and forged SSL certificates work, as well as the dangers that arise from compromised Certification Authorities (CAs). Discover what you need to know about the state of the digital marketplace today – read on to learn more.

    Download

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • Data Center & Hybrid Cloud Security

    Data Center & Hybrid Cloud Security helps you rethink your approach to security to better protect your data and workload in the on-premises data center and across multi-cloud environments. Download the 83-page chapter book today.

    Download

  • Technical Guide on Mobile Security

    Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.

    Download

  • The automobile root of trust for device attestation and data security

    As automobile development becomes increasingly complex, the potential vulnerability and threat landscape also grows. This white paper further explores the complexities of automobile compliance, advocating for car manufacturers to apply a zero-trust approach to take device attestation and data security seriously. Read on to learn more.

    Download

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

    Download

  • Email security: Never more important

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

    Download

  • Combatting the spread of unstructured data

    The tendency for organizations to continue using legacy storage systems to manage escalating data volumes has resulted in the prevalence of unstructured data.CloudFS is designed to transform complex, multicomponent, and often multi-vendor environments into a simplified data management solution. Download now to learn more.

    Download

  • Ransomware threats, behavior & costs in 2022

    Between DoS attacks, ransomware as a service (RaaS), and double-extortion, hackers are becoming more resourceful with their ransomware campaigns. This report looks at the state of ransomware, analyzing how the landscape has evolved in recent years, and what strategies and opportunities there are for overcoming it. Read on to learn more.

    Download

  • What is Third-Party Maintenance in the data center?

    Third-party maintenance can give back control of your equipment life cycle, reduce long-term maintenance costs, and help maximize data center investments. Inside, learn how to accurately weigh the pros and cons of switching away from traditional OEM support.

    Download

  • Shedding Light on OEM Storage Support

    If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.

    Download

  • Beating web application security threats

    Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.

    Download

  • Expert recommendations for addressing the spike in extortion

    Although recovering from offline backups can provide some protection against encryption-only ransomware attacks, organizations must take additional measures to prepare for threat actors who extort victims. Browse a detailed view of the observations of Unit42 and discover expert recommendations for addressing them.

    Download