Ciphertrust Data Security Platform: Discover, Protect and Control
sponsored by Thales
DATA SHEET:
IT security organizations are seeking a data-centric solution that secures the data as it moves from networks to applications and the cloud. When perimeter network controls and endpoint security measures fail, protecting data at rest is the last line of defense. Learn more by reading this data sheet on the CipherTrust data security platform.
Posted: 30 Oct 2020 | Published: 30 Sep 2020
|
|
|
A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016
|
|
|
Evaluating Data-Centric Protection Solutions
sponsored by Comforte AG
EBOOK:
Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020
|
|
|
Enhancing Encryption Key Control and Data Security in Google Cloud Platform
sponsored by Arrow & Thales
DATA SHEET:
Google Cloud’s External Key Manager (EKM) API helps organizations enhance control of and ownership over their encryption keys. To help organizations benefit from this enhanced control, Thales has integrated their CipherTrust Key Broker service with Google’s Cloud EKM. Use this data sheet to how this partnership could benefit you.
Posted: 08 Mar 2021 | Published: 30 Oct 2020
|
|
|
Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012
|
|
|
In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER:
This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013
|
|
|
Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY:
This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013
|
|
|
byREQUEST®: Automatically Sweeps Files into Sharepoint
sponsored by Hillary Software
TRIAL SOFTWARE:
From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.
Posted: 21 Jul 2009 | Premiered: 21 Jul 2009
|
|
|
CA ARCserve Backup r12.5 Security Features
sponsored by arcserve
VIDEO:
Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.
Posted: 28 May 2010 | Premiered: 28 May 2010
|
|
|
Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER:
Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010
|
|
|
|
|