Standards  >   Security Standards  >  

Encryption Standards

RSS Feed   
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 171 Matches Previous Page  |  Next Page
Thales Data Protection on Demand
sponsored by Thales
PRODUCT OVERVIEW: In this solution brief, take a closer look at the key features of Thales’ Data Protection on Demand, a cloud-based platform that provides a wide range of cloud hardware security module (HSM) and key management services – designed to simplify security, improve protection capabilities and reduce cost. Read on to learn more.
Posted: 10 Sep 2020 | Published: 30 Apr 2020

Thales

Enterprise Key Management Solutions
sponsored by Thales
WHITE PAPER: In order to meet encryption needs, organizations often create multiple, independent encryption systems – which results in fractured silos and can lead to security complications. In this resource, take a closer look at Thales’ various key management offerings and discover the capabilities of each function.
Posted: 10 Sep 2020 | Published: 31 Aug 2020

Thales

Protect Your Sensitive Data
sponsored by Thales
EGUIDE: When it comes to integrating a data protection solution, there are several considerations organizations need to understand prior to choosing a partner, namely – are you looking to protect data at rest, data in motion or both? Read on to unlock a step-by-step guide to finding the right data protection solution for your organization.
Posted: 09 Sep 2020 | Published: 09 Sep 2020

Thales

Law Enforcement Technology Provider Bolsters Security and Improves Productivity for Diverse Customer Base
sponsored by Fortinet, Inc.
CASE STUDY: Law enforcement technology providers work within a niche market, so many of them operate as small businesses. As a result, it can be difficult to navigate security given its often complex architecture. Read this case study to learn how one of these providers was able to simplify their security with the help of Fortinet’s next-generation firewalls.
Posted: 20 Aug 2020 | Published: 10 Mar 2020

Fortinet, Inc.

Keeping Up with the Performance Demands of Encrypted Web Traffic
sponsored by Fortinet, Inc.
RESOURCE: Encryption has become a key element in the security of sensitive and confidential data in motion. However, it’s recently been discovered that cybercriminals are using encryption to deliver malware or exfiltrate stolen data. The following article overviews this growing risk and offers insight into how to identify and isolate malicious activity.
Posted: 18 Aug 2020 | Published: 04 Aug 2020

Fortinet, Inc.

Cybersecurity Law and Latest Security Compliance Trends in China
sponsored by Alibaba Cloud
WEBCAST: The world’s approach to data privacy has evolved quickly over time. Nations have developed their own standards and regulations on the matter. GDPR is the most newsworthy example of cybersecurity law, but countries around the world are looking into their data use laws. View this webcast for a look at compliance trends in China.
Posted: 14 Aug 2020 | Premiered: Aug 14, 2020

Alibaba Cloud

Powerful and secure data transmission as key element of IT security
sponsored by Rohde & Schwarz
WHITE PAPER: Organizations are becoming increasingly aware of the need to prioritize IT security in order to ensure protection grows at the same rate as productivity. However, the constantly changing nature of IT security can make it unclear where to start. This white paper provides an overview of the IT security fundamentals – read on to get started.
Posted: 11 Aug 2020 | Published: 11 Aug 2020


What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Leading healthcare provider protects vital client assets with help from Thales
sponsored by Thales
CASE STUDY: This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Thales

Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER: Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020

Thales

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Quantum Computing and Quantum-Safe Security
sponsored by Thales
WHITE PAPER: Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

Avoiding Data Leaks with Scalable Encryption and Access Controls
sponsored by Thales
PRODUCT OVERVIEW: Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Thales

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Network Independent Encryption: Flexible, Policy-Based Network Encryption Security for Today’s High-Performance Network Architectures
sponsored by Thales
WHITE PAPER: Thales is a global leader in the development of end-to-end encryption technologies. Their solutions protect sensitive data for a wide range of commercial, government, industrial and defense customers. Read this white paper to learn more about Network Independent Encryption, the basis of a new technology by Thales called Transport Independent Mode.
Posted: 30 Jun 2020 | Published: 30 Apr 2020

Thales

The Facts Around Zoom and Encryption for Meetings/Webinars
sponsored by Zoom Video Communications
RESOURCE: In light of recent interest in Zoom’s encryption practices, they released a blog post apologizing for the confusion they had caused by incorrectly suggesting that Zoom meetings were capable of using end-to-end encryption. Download the blog to learn more about how Zoom encrypts the content that moves across their network.
Posted: 12 Jun 2020 | Published: 01 Apr 2020

Zoom Video Communications

Our First ‘Ask Eric Anything’ Webinar Addresses Users’ Security & Privacy Concerns
sponsored by Zoom Video Communications
RESOURCE: As part of Zoom’s commitment to creating a safe meeting experience for their users, Zoom founder and CEO Eric S. Yuan has started hosting weekly “Ask Eric Anything” webinars. In this blog, explore some of the specific questions Eric answered during the first webinar session.
Posted: 05 Jun 2020 | Published: 08 Apr 2020

Zoom Video Communications

Executive Brief: The Dark Side of Encryption
sponsored by SonicWall
WHITE PAPER: Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Finding a Secure Managed File Transfer Tool: Key considerations
sponsored by SearchSecurity.com
EBOOK: Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SearchSecurity.com

Use Your Microsoft Certificate Authority for Passwordless Authentication
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

Public Key Infrastructure (PKI) Buyers Guide
sponsored by Entrust, Inc.
WHITE PAPER: When it comes to digital interactions, trust is a key deciding factor. A popular way of gaining trust is the use of public key infrastructures (PKIs), which enable organizations to ensure end-to-end trust across user networks. This buyers guide offers expert advice for organizations looking to implement PKI. Read on to learn more.
Posted: 04 May 2020 | Published: 04 May 2020

Entrust, Inc.

RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys?
sponsored by Thales
RESOURCE: As organizations continue to adopt cloud and SaaS models, ensuring cloud-specific security issues are addressed is paramount. This article highlights one of those key challenges, cloud key management, and explores how to ensure security during a cloud migration. Read on to learn more.
Posted: 29 Apr 2020 | Published: 17 Feb 2020

Thales
1 - 25 of 171 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info