EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
EBOOK:
NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
INFOGRAPHIC:
Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
TRIAL SOFTWARE:
From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.
EBOOK:
Get the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
WEBCAST:
Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)
PRODUCT LITERATURE:
Read a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.