Standards  >   Security Standards  >  

Encryption Standards

RSS Feed   
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 161 Matches Previous Page  |  Next Page
Secure Modern Applications with Diamanti
sponsored by Diamanti
RESOURCE: Ensuring the security of business applications is a fundamental aspect of being a security leader. Volume encryption and SEDs provide excellent ways to secure application data, but which one should you choose? Read this article to learn more about the Diamanti platform, which comes with both measures already built-in.
Posted: 27 May 2020 | Published: 05 May 2020

Diamanti

Use Your Microsoft Certificate Authority for Passwordless Authentication
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

Public Key Infrastructure (PKI) Buyers Guide
sponsored by Entrust, Inc.
WHITE PAPER: When it comes to digital interactions, trust is a key deciding factor. A popular way of gaining trust is the use of public key infrastructures (PKIs), which enable organizations to ensure end-to-end trust across user networks. This buyers guide offers expert advice for organizations looking to implement PKI. Read on to learn more.
Posted: 04 May 2020 | Published: 04 May 2020

Entrust, Inc.

RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys?
sponsored by Thales
RESOURCE: As organizations continue to adopt cloud and SaaS models, ensuring cloud-specific security issues are addressed is paramount. This article highlights one of those key challenges, cloud key management, and explores how to ensure security during a cloud migration. Read on to learn more.
Posted: 29 Apr 2020 | Published: 17 Feb 2020

Thales

How Can I Lock Down my distributed SQL Server / SQL Express Application?
sponsored by NetLib Security
WHITE PAPER: In this article, discover a method, using Encryptionizer, where you can "lock down" your SQL database so that you can protect your intellectual property.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

NetLib Security

Automatic Whole Database Encryption – How It Works
sponsored by NetLib Security
WHITE PAPER: In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

NetLib Security

An Anchor of Trust in a Digital World: Risk Management Strategies for Digital Processes
sponsored by Thales
WHITE PAPER: A growing number of entities have integrated Hardware Security Modules (HSMs) into their information risk management deployments. In this white paper, learn about hardware security modules and the attributes that position HSMs as an attractive component in information risk management.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Thales

Decisive Technology for Decisive Moments
sponsored by Thales
WHITE PAPER: Regardless of your current strategic initiatives, a partnership with a trusted cybersecurity provider is critical to your overall success. This white paper highlights success Thales has had in the role of strategic partner for leading enterprises across industries. Read on to see what these industry leaders have to say about Thales.
Posted: 24 Apr 2020 | Published: 31 Mar 2020

Thales

Assess and Manage Cryptographic Security with Entrust Datacard™
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: In this data sheet, take a closer look at the key features and capabilities of AgileScan, one of Entrust Datacard’s offerings focused on ensuring the security of cryptographic inventories and life cycles. Read on to learn more about AgileScan.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Entrust, Inc.

It’s Gotta Be The Shoes! Or Is It? The Gold Is In The Data
sponsored by NetLib Security
CASE STUDY: Read this case study to learn how C Sharp Sports used NetLib Security’s data encryption solution, Encryptionizer, to meet their growing business needs.
Posted: 10 Apr 2020 | Published: 10 Apr 2020

NetLib Security

Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Beginners Guide to Encryption and Key Management (and Encryptionizer)
sponsored by NetLib Security
RESOURCE: Sensitive personal information and business data has become increasingly critical to defend as its value grows amongst ‘the bad guys’. But what is the best way to go about protecting data from falling into the wrong hands? Read on to find out.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

How Microsoft 365 Business Premium Protects Your Data
sponsored by TechData - Microsoft
VIDEO: Monitoring your network for potential risks is a lot like managing a large dam – one small leak can lead to a catastrophic breach. In this video, explore the capabilities of Microsoft Office 365 Business Premium, and discover if this is the right email security tool for your needs.
Posted: 02 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

Securing data across the enterprise while simplifying IT operations
sponsored by Thales
WHITE PAPER: The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.
Posted: 27 Mar 2020 | Published: 31 Aug 2019

Thales

Thales Data Protection on Demand
sponsored by Thales
CASE STUDY: In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Thales

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Thales
WHITE PAPER: Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Thales

CipherTrust Cloud Key Manager
sponsored by Thales
DATA SHEET: While it’s been common practice for the cloud provider to hold the key for encryption capabilities, industry best practices mandate that the keys be held by neither the cloud provider nor the end user. This data sheet takes a closer look at the key features and capabilities of the CipherTrust Cloud Key manager. Read on to get started.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Thales

TLS Versions: North-South and East-West Web Traffic Analysis
sponsored by Gigamon
ANALYST REPORT: The wide adoption of SSL/TLS — not only for public internet traffic, but for internal east-west traffic as well — underscores the criticality for inspecting encrypted traffic. In this report, explore key findings from Gigamon’s study of 275 billion HTTP and HTTPS live network flows.
Posted: 17 Mar 2020 | Published: 29 Feb 2020

Gigamon

Allina Health Ensures HIPAA Compliance
sponsored by Absolute Software Corporation
CASE STUDY: Major healthcare provider, Allina Health, employs a large, highly mobile team who use devices that are often off the corporate network. Therefore, having visibility and control of their entire device fleet at all times is a necessity. With Absolute, Allina Health has been able to do so. Read on to learn how.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

Absolute Software Corporation

The GoAnywhere Book of Secure File Transfer Project Examples
sponsored by Help/Systems
WHITE PAPER: Managed file transfer (MFT) software is primarily used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees. A robust MFT solution can also solve problems that fall outside your basic file transfer needs. In this white paper, learn how your peers use managed file transfer.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Help/Systems

Managed File Transfer Category Report
sponsored by Help/Systems
ANALYST REPORT: Selecting a managed file transfer software can be overwhelming and one of the biggest challenges facing organizations is understanding the marketplace. In this research report, explore a comprehensive list of 9 managed file transfer vendors to help you find the best fit for your organization.
Posted: 13 Feb 2020 | Published: 31 Mar 2019

Help/Systems

Secure Managed File Transfer: Ultimate Buyer's Guide
sponsored by Help/Systems
WHITE PAPER: Every day, organizations may exchange a considerable amount of files. Because of the sensitive information often contained in files, data transfers should be protected. In this white paper, learn how secure managed file transfer can help your organization protect the data your sharing.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Help/Systems

Replacing FTP Scripts with Managed File Transfer
sponsored by Help/Systems
WEBCAST: Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.
Posted: 12 Feb 2020 | Premiered: Feb 12, 2020

Help/Systems

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon

4 Critical Principles of Enterprise Security
sponsored by Smartsheet
WHITE PAPER: What's the key to effective enterprise security? In this white paper, explore the 4 critical principles of effective enterprise security. Review the importance of a multi-layered data security strategy, and learn how to manage your security at scale.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Smartsheet
1 - 25 of 161 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info