Standards  >   Security Standards  >   Encryption Standards  >  

Encryption Protocols

RSS Feed   
Encryption Protocols Reports
 
Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Evaluating Data-Centric Protection Solutions
sponsored by Comforte AG
EBOOK: Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Comforte AG

The Ultimate Guide to Data Encryption in the Cloud
sponsored by Rubrik
EBOOK: In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Rubrik

Reconsidering PKI and its Place in your Enterprise Encryption Strategy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

ComputerWeekly.com

Thales Data Protection for a Multi-Cloud World
sponsored by Arrow & Thales
WHITE PAPER: The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.
Posted: 26 Feb 2021 | Published: 31 Dec 2020


Comforte SecurDPS: Enterprise Solution for GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

The Massachusetts Data Protection Law
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

SearchSecurity.com & SearchCompliance.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences