Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER:
PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020
|
|
|
Evaluating Data-Centric Protection Solutions
sponsored by Comforte AG
EBOOK:
Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020
|
|
|
A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016
|
|
|
Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY:
A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020
|
|
|
Data Security vs. Performance: Balancing Competing Requirements with New Encryption Capabilities
sponsored by SEPATON
EGUIDE:
This e-guide elaborates on new features and benefits of backup and recovery and explains why they are especially critical in IT environments with large volumes of data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013
|
|
|
Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER:
Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008
|
|
|
eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap
sponsored by SearchWindowsServer.com
EBOOK:
Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
Posted: 19 Jun 2009 | Published: 19 Jun 2009
|
|
|
Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER:
Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010
|
|
|
Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012
|
|
|
TrueCrypt
sponsored by TrueCrypt Foundation
TRIAL SOFTWARE:
Free open-source disk encryption software for Windows XP/2000/2003 and Linux.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007
|
|
|
|
|