IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Encryption Security

RSS Feed   
Encryption Security Reports
 
The future of digital forensics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Global De-Duplication for Encrypted Data
sponsored by Carbonite
WHITE PAPER: Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Carbonite

Tips for Accelerating EHR Systems and Improving Productivity
sponsored by Pure Storage
WHITE PAPER: When VDI implementations fail, the root cause is most often storage. This white paper highlights the ultimate storage strategy that provides the best virtual desktop experience for healthcare. Read now to find out how you can accelerate EHR systems, improve productivity, encrypt PHI, and more.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Pure Storage

SSL Offloading & Acceleration for Virtualized Environments
sponsored by Array Networks
WHITE PAPER: Download this white paper to learn how SSL offloading can cost-effectively improve performance for virtualized network functions.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Array Networks

IT Project: Storage Architecture ANZ
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.
Posted: 29 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Symantec & Blue Coat Systems

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012

Venafi

DLP and CASB Aren't Enough: A Better Model for Data Security
sponsored by Vera
VIDEO: Protecting the information that matters the most to your organization, such as sensitive customer data, is one of the main priorities and concerns when using cloud platforms. Listen to this webcast to uncover how you can ensure security of your company's data.
Posted: 18 Jun 2018 | Premiered: 12 Jun 2018

Vera
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement