Standards  >   Security Standards  >   Encryption Standards  >  

Data Encryption Protocols

RSS Feed   
Data Encryption Protocols White Papers (View All Report Types)
 
Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Managing Digital Risk: The Security Challenge Beyond Your Perimeter
sponsored by Mimecast
WHITE PAPER: Today’s security leaders are feeling the pressure that cyber risks presents to their organization’s reputation. But managing digital risk can sometimes be resource exhaustive. Read this Mimecast guide for an overview of modern challenges and how to overcome them.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Mimecast

How to Approach an Identity Management & Governance Program
sponsored by Quest
WHITE PAPER: Although already widespread in use, identity and access management (IAM) programs are expected to continue to grow in popularity, especially among remote workforces. This white paper underlines the importance of a diligent IAM program and provides readers with the 5 basic tenets of an effective approach to IAM.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Quest

The Key To Successful Digital Transformation In Banking
sponsored by Onegini
WHITE PAPER: In order to compete with FinTechs, banks need to rethink their digital presence to ensure a secure and user-friendly experience. But digital transformations are far from simple. This helpful guide explores some of the challenges of going digital, as well as an overview of their Onegini’s Identity Cloud offering – read on to get started.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

Onegini

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Protecting Privileged Access in DevOps & Cloud Environments
sponsored by CyberArk Software, Inc
WHITE PAPER: Privileged access credentials are an especially attractive target amongst cybercriminals – putting DevOps and cloud environments at great risk. This research report was written to help CISOs and security leaders address these challenges by highlighting key attack types and specific risks targeting these environments.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info