All resources sponsored by:

Gemalto

13 Matches
The State of IoT Security: Security Takes a Back Seat
sponsored by Gemalto
WHITE PAPER:With IoT being a top concern, explore this white paper to find out how you can commit to the IoT journey, while still keeping security in mind.
Posted: 26 Jul 2018 | Published: 31 Dec 2017
Get This Now


2018 Data Security Confidence Index Report
sponsored by Gemalto
RESOURCE:Uncover some key findings from both IT decision makers and consumers about the security of their most sensitive corporate data. Read on to see how your organization could benefit from a change in security measures.
Posted: 26 Jul 2018 | Published: 26 Jul 2018
Get This Now


The Year of Internal Threats and Accidental Data Breaches
sponsored by Gemalto
RESEARCH CONTENT:According to the Breach Level Index report, there were 2,600,968,280 records breached in 2017 making it a record year for stolen data. Explore the report to gain insight into why 2017 is being referred to as the year of internal threats and accidental data breaches.
Posted: 20 Apr 2018 | Published: 18 Apr 2018
Get This Now


The 2018 Global Cloud Data Security Study
sponsored by Gemalto
RESEARCH CONTENT:According to a Ponemon Institute Study, 53% of respondents believe their organization does not have a proactive approach to managing compliance with privacy and data protection regulations in the cloud. Explore the report to gain insight into enterprises' cloud data security measures and how they plan to protect sensitive data within the cloud.
Posted: 20 Apr 2018 | Published: 18 Apr 2018
Get This Now


Access Management Handbook
sponsored by Gemalto
EBOOK:When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 20 Apr 2018 | Published: 16 Aug 2017
Get This Now


Crypto-Agility: Security Without Compromise
sponsored by Gemalto
WHITE PAPER:Cryptographic protocols and algorithms evolve over time to counter new security threats. This resource explores Gemalto's encryption strategy, which can help you gain certified high-assurance network security, maximum network and application performance, and more.
Posted: 20 Apr 2018 | Published: 18 Apr 2018
Get This Now


2018 Identity and Access Management Index Report
sponsored by Gemalto
RESEARCH CONTENT:According to the Identity and Access Management Index, 90% of respondents admit that their organization's security policies around access management have been influenced by breaches of consumer services. Take a look at this report to learn about where organizations stand in terms of IAM and how they plan to augment security in the near future.
Posted: 18 Apr 2018 | Published: 18 Apr 2018
Get This Now


Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER:This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017
Get This Now


Encrypt Everything: How to Unshare and Secure Your Sensitive Data
sponsored by Gemalto
WHITE PAPER:Learn how to find a way to balance critical business needs and requirements for data-driven initiatives while protecting your data from malicious threats.
Posted: 15 Mar 2017 | Published: 15 Mar 2017
Get This Now


Three Steps to Securing Data in Any Cloud Environment
sponsored by Gemalto
WHITE PAPER:In this white paper learn the big benefits, and big risks, of utilizing the cloud for your organization as well as 3 ways to maintain control in the cloud.
Posted: 13 Mar 2017 | Published: 13 Mar 2017
Get This Now


Building a Trusted Foundation for the Internet of Things
sponsored by Gemalto
WHITE PAPER:Find out how to set up your enterprise for future Internet of Things success, how to handle common data security problems, and what the future looks like for IoT.
Posted: 13 Mar 2017 | Published: 13 Mar 2017
Get This Now


Is Onboard Key Storage the Right Corporate Strategy?
sponsored by Gemalto
WHITE PAPER:Learn the answer to the question: "Is onboard key storage a 'good enough' solution, or is an external key management system something that should be deployed?"
Posted: 09 Mar 2017 | Published: 09 Mar 2017
Get This Now


E-Book: Red Flag Rules Compliance
sponsored by Gemalto
EBOOK:SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
Posted: 09 Sep 2010 | Published: 09 Sep 2010
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement