Standards  >   Security Standards  >   Encryption Standards  >  

Data Encryption Protocols

RSS Feed   
Data Encryption Protocols Reports
 
Evaluating Data-centric Protection Solutions
sponsored by Comforte AG
EBOOK: Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Comforte AG

Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY: A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020

Atakama

Reconsidering PKI and its Place in your Enterprise Encryption Strategy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

ComputerWeekly.com

COMFORTE SECURDPS: ENTERPRISE SOLUTION FOR GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

The Ultimate Guide to Data Encryption in the Cloud
sponsored by Rubrik
EBOOK: In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Rubrik

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences