Standards  >   Security Standards  >   Encryption Standards  >  

Digital Encryption Standards

RSS Feed   
Digital Encryption Standards White Papers (View All Report Types)
 
In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Top Threats to Cloud Computing: The Egregious 11
sponsored by ExtraHop
WHITE PAPER: Because cloud environments continue to be a lucrative target for cyberattacks, organizations need to be aware of the potential threats they face and how to defend against them. Download this Top Threats report from the Cloud Security Alliance (CSA) for a look at 11 of the most significant threats, risks and vulnerabilities to keep an eye on.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

ExtraHop

The Evolving Role of SaaS and IT Outsourcing in SMB IT Security
sponsored by Kaspersky Lab
WHITE PAPER: For SMBs, getting the maximum use out of every resource is critical to long term success and profitability. However, SMBs are not immune to the security risks that come from embracing evolving IT capabilities. Download this white paper to learn more about the security challenges, threats and opportunities as they relate to SMBs.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Kaspersky Lab

Remote Working: How to Make the Laptop Lifestyle Flow Sweetly (and Securely) for Your Business
sponsored by Kaspersky Lab
WHITE PAPER: 58% of staff are motivated by the flexibility offered by working from home. Take a glimpse at this white paper released before the outbreak of COVID-19 outlining WFH benefits, trends and challenges.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Kaspersky Lab

Capsule8 Protect Product Whitepaper
sponsored by Capsule8
WHITE PAPER: Responsiveness, SecOps productivity and cost savings are just a few of the areas for improvements when it comes to security management in today’s constantly evolving business environment. Download this white paper for an in-depth look at Capsule8 Protect and discover how it may be able to help you reach your cybersecurity objectives.
Posted: 22 Jun 2020 | Published: 22 Jun 2020


Machine Learning in the SOC
sponsored by Micro Focus
WHITE PAPER: Most challenges that afflict security operations centers (SOCs) can addressed by machine learning. However, as with any new technology, it needs to be selected and deployed strategically. In this white paper you’ll learn how to achieve the best threat detection results with machine learning (including how to select the right tool).
Posted: 15 Jun 2020 | Published: 15 Jun 2020

Micro Focus
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info