Standards  >   Security Standards  >  

Data Encryption Standards

RSS Feed   
Data Encryption Standards Reports
 
Global Payments Technology Company Achieves PCI Compliance
sponsored by Comforte AG
CASE STUDY: An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Comforte AG

SSL Certificate Management: Common Mistakes and How to Avoid Them
sponsored by SearchSecurity.com
EGUIDE: Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes by reading this expert e-guide by penetration tester at First Base Technologies, Rob Shapland.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

SearchSecurity.com

De-risking IT Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

Cloud Security Gateways, Q1 2019
sponsored by Symantec
RESEARCH CONTENT: Protecting cloud applications from data loss or theft, privacy abuses, and other risks is challenging. In the evolving market for cloud security gateways (CSGs), enterprises want to monitor and secure all their cloud workloads using few solutions. In this report, learn more about the top CSG vendors and what you should look for in a provider.
Posted: 21 Jun 2019 | Published: 20 Feb 2019

Symantec

Privacy: Data Protection and Identity Management
sponsored by Micro Focus
WEBCAST: To help enterprises meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. In this webcast, Nathan Turajski, Director of Product Marketing at Micro Focus provides an overview of their Data Protection and Identity Management solution.
Posted: 10 Jul 2019 | Premiered: Feb 28, 2019

Micro Focus

Mobile: The Technology Game-Changer in 2013
sponsored by SearchSecurity.com
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Agari

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business.
Posted: 16 May 2013 | Published: 16 May 2013

GeoTrust, Inc.

Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER: This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement