Standards  >   Security Standards  >   Encryption Standards  >   Data Encryption Standard  >  

DSS (Digital Signature Standards)

RSS Feed   
DSS (Digital Signature Standards) Reports
 
Build your Content Security and Document Management Plan
sponsored by Adobe
EGUIDE: In this expert e-guide, we explore how you can create an effective content security and document management strategy. Discover 5 tips for a sound content security policy and learn about the differences between digital signature, e-signature, and digital certificates.
Posted: 27 Feb 2018 | Published: 22 Feb 2018

Adobe

Working Remotely is the New Normal
sponsored by Automox
RESOURCE: The shift towards a remote workforce isn’t a novel concept – however it wasn’t until the pandemic first arrived that it became such a widespread priority. To help ensure you’re on the right track, this infographic highlights 5 key considerations for securing your remote workforce without sacrificing efficiency.
Posted: 25 Aug 2020 | Published: 25 Aug 2020


SCCM Upgrade Checklist | Automate Patch Management in the Cloud
sponsored by Automox
RESOURCE: The digital landscape is constantly evolving, and traditional legacy tools are being replaced by cloud-based SaaS alternatives – and patch management is no exception. However, there are some key factors to consider prior to making the switch. Read this article to make sure you’re ready for cloud-based patch management.
Posted: 25 Aug 2020 | Published: 17 Aug 2020


Zero Trust Architecture
sponsored by PortSys
WHITE PAPER: Zero trust architecture is an evolution in the access control paradigm. Jump into this detailed document to learn how Total Access Control by PortSys maps to NIST SP 800-207, a special publication designed to provide detailed guidance for organizations on six areas of zero trust architecture.
Posted: 25 Sep 2020 | Published: 27 Aug 2020

PortSys

Thales Data Protection on Demand
sponsored by Thales
PRODUCT OVERVIEW: In this solution brief, take a closer look at the key features of Thales’ Data Protection on Demand, a cloud-based platform that provides a wide range of cloud hardware security module (HSM) and key management services – designed to simplify security, improve protection capabilities and reduce cost. Read on to learn more.
Posted: 10 Sep 2020 | Published: 30 Apr 2020

Thales

BotRx ProTx Mobile Application Security
sponsored by BotRX
DATA SHEET: Mobile applications have emerged as one of the most lucrative threat vectors for a cybercriminal interested in orchestrating a malicious bot attack. In order to protect your organization’s mobile app and subsequent data, security tactics need to be dynamic. Read this data sheet to learn how BotRx protects web and mobile apps against bot attacks.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

BotRX

Customer Case Bergman Clinics
sponsored by Zivver
CASE STUDY: In order to ensure scalable data privacy and security as they underwent a massive growth in their workforce, Bergman Clinics, a network of clinics in the Netherlands, turned to Zivver as their trusted partner. Read on to learn what led to this decision and discover the outcomes of their partnership.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Zivver

How Lookout Helps You Align with NIST Guidelines
sponsored by Lookout
CASE STUDY: When it comes to structuring cybersecurity strategies and initiatives, many organizations turn to guidelines and best practices outlined by the National Institute of Standard and Technology (NIST). In this case study, take a closer look at NIST’s updated mobile security guidelines and discover how Lookout can help get you aligned.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Lookout

How Okta's Cloud First IT Strategy Enables a Dynamic Work Environment
sponsored by Okta
VIDEO: Back in 2009, 30% of organizations were using some sort of cloud computing. Since then, it has erupted into one of the most important aspects of an organization’s work environment. Watch this webinar to discover how cloud has changed and role it plays in enabling today’s dynamic workforce.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Okta

Dunkirk Enhances Microsoft 365 Email Security with Vade Secure for Microsoft 365
sponsored by Vade Secure
CASE STUDY: The victim of targeted attacks, the city and urban community of Dunkirk sought to bolster their defenses against email-based cyberattacks. This case study provides an overview of Dunkirk’s selection criteria as well as the results of their email security project – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info