Standards  >   Security Standards  >  

Cryptography Standards

RSS Feed   
Cryptography Standards White Papers (View All Report Types)
 
Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER: Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020

Thales

Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud
sponsored by Intel
WHITE PAPER: Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

Intel

Strengthening Enterprise Security through Notebook Encryption
sponsored by Intel Corporation
WHITE PAPER: Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.
Posted: 02 Apr 2009 | Published: 01 Dec 2008

Intel Corporation

Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

Cloud-Stored Offsite Database Backups
sponsored by Oracle Corporation
WHITE PAPER: Cloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.
Posted: 06 Oct 2010 | Published: 17 May 2010

Oracle Corporation

Website Security Threat Report, Part Two
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report focuses on the threats that impact your website and online business. Access this resource to understand the threat landscape and understand how you can protect your company and your infrastructure.
Posted: 14 Oct 2013 | Published: 11 Oct 2013

Symantec Corporation

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER: This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences