Standards  >   Security Standards  >   Encryption Standards  >  

Triple Data Encryption Standard

RSS Feed   
Triple Data Encryption Standard White Papers (View All Report Types)
 
Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

How to Prevent Data Breaches
sponsored by SkOUT
WHITE PAPER: How can you keep your organization and its employees safe from data breaches? Download this paper to find out, with 6 strategies you can put to use right away and shore up your defenses.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

SkOUT

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime
sponsored by Unitrends
WHITE PAPER: This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.
Posted: 01 May 2019 | Published: 01 May 2019

Unitrends

How ThreatConnect Leverages DNSDB to Track Down Grizzly Steppe
sponsored by Farsight Security
WHITE PAPER: Find out how ThreatConnect used a passive DNS database intelligence approach to extend Grizzly Steppe data from the Joint Analysis Report and discover new indicators that expose cyberespionage activity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Farsight Security

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement