Standards  >   Security Standards  >  

Encryption Standards

RSS Feed   
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 190 Matches Previous Page  |  Next Page
Certificate Management: Policy & Automation
sponsored by Entrust, Inc.
WHITE PAPER: PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. This white paper offers best practices for PKI certificate management policy and how organizations can simplify and streamline their implementation process.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

Public Key Infrastructure (PKI) Buyer's Guide
sponsored by Entrust, Inc.
RESOURCE: Implementing cost-effective security strategies that meet operational needs of end-users while complying with regulatory requirements is challenging. This resource assists organizations in the selection of the best PKI strategy to meet business and security needs.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

Filling the Gaps in Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper provides information from an Osterman Research survey regarding users' experience with Office 365 security.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

Closing the Cloud Security Gap
sponsored by West UC
WHITE PAPER: According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

West UC

A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
sponsored by Delphix
WEBCAST: Learn about the top 10 data security trends that developed throughout 2017. Plus, uncover 5 predictions about the future of data privacy and learn about a platform that integrates data masking and delivery to simplify security.
Posted: 15 Dec 2017 | Premiered: Dec 6, 2017

Delphix

How to deploy cloud storage without compromising on security
sponsored by Nasuni
WHITE PAPER: In this white paper learn how you can remove these challenges by adopting this enterprise file system, which provides a security model that combines strong encryption and local authentication with the native capabilities of top-tier cloud storage providers.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Nasuni

Effective Isolation and Workload Security in the Multi-Tenant Cloud
sponsored by HyTrust
RESOURCE: A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

HyTrust

Security Solutions for Public Sector Virtual Infrastructure
sponsored by HyTrust
RESOURCE: Explore this product overview to evaluate if this cloud security strategy, which secures critical environments in the cloud, is right for your organization's needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

HyTrust

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

Fintech & the digital customer experience
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

ComputerWeekly.com

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

CW ANZ - October 2017: Rise to the big data challenge
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

ComputerWeekly.com

Encrypting Data at Rest
sponsored by Amazon Web Services
WHITE PAPER: This white paper provides an overview of different methods for encrypting your data at rest. Uncover 3 approaches on how encryption keys are managed and where they are used, so you can decide which approach is best for you.
Posted: 09 Oct 2017 | Published: 30 Nov 2014

Amazon Web Services

Encryption Buyer's Guide: 5 Vendor Reviews
sponsored by TechTarget
RESOURCE: Discover data protection measures your organization can take to lessen the risks of being attacked by ransomware by utilizing your data protection guide: Two Quick Data Protection Steps for Ransomware. Take our survey to gain access to this guide as well as Encryption Buyers Guide: 5 Vendor Reviews.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

TechTarget

When Cryptors Attack: Timeline of a Ransomware Infection
sponsored by Kaspersky Lab
WHITE PAPER: The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab

Cybersecurity Myths Debunked
sponsored by HelpSystems
WEBCAST: What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.
Posted: 04 Aug 2017 | Premiered: Aug 4, 2017

HelpSystems

HyperConvergence or Hyper-Security? What's Right for Your Enterprise?
sponsored by HyTrust
WHITE PAPER: To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

HyTrust

Making Data Encryption and Rekeying Easier
sponsored by HyTrust
WHITE PAPER: Data encryption is fundamental to successful cybersecurity in modern enterprises. But in a recent study, companies cited budget, performance concerns, and lack of deployment knowledge as the top 3 barriers to implementing an encryption tool. Inside, learn sweat-free secrets to performing critical data security functions.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

Encryption Hiding Malware in Half of Cyber Attacks
sponsored by A10 Networks
EGUIDE: A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Understanding your Full Public Key Infrastructure (PKI) Potential
sponsored by DigiCert
EGUIDE: This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security.
Posted: 06 Sep 2017 | Published: 31 Aug 2017

DigiCert

EU GDPR Compliance Puts Focus on Data Tracking, Encryption
sponsored by Ivanti
EGUIDE: In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.
Posted: 05 Sep 2017 | Published: 31 Aug 2017

Ivanti

Enhance Your Endpoint Security Protection
sponsored by TrendMicro
EGUIDE: Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.
Posted: 10 Nov 2016 | Published: 09 Nov 2016

TrendMicro

Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE: It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Check Point Software Technologies Ltd.
1 - 25 of 190 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement