Protecting Healthcare Data with Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY:
To better manage and protect patient data, healthcare organizations are embracing encryption capabilities. In this use case, explore the common pain points and challenges that have led to the rise of encryption and discover the potential business benefits of adopting a Removable Media Container Encryption (RMCE).
Posted: 01 Feb 2021 | Published: 01 Feb 2021
|
|
|
Why You Can’t Trust ‘Good Enough’ in the Age of Compliance
sponsored by WinMagic
CASE STUDY:
It’s a common misconception that because servers are in the data center – and because the data is in perpetual use – that encrypting the drives ais unnecessary as the data is never at-rest. This case study highlights a financial services institution that fell into this trap – read on to get started.
Posted: 28 Dec 2020 | Published: 28 Dec 2020
|
|
|
Securedoc On Top For Bitlocker
sponsored by WinMagic
DATA SHEET:
In this product brief, learn about WinMagic’s SecureDoc Enterprise Server (SES) and how it secures data at rest by managing how it’s encrypted, regardless of the operating system, or where the data resides.
Posted: 23 Dec 2020 | Published: 23 Dec 2020
|
|
|
Protecting Healthcare Data With Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY:
Healthcare professionals are facing the growing challenge of balancing the security of patient data with ease of authorized access. Read this case study to see how one healthcare institution was able to achieve effective data management across various devices without sacrificing functionality.
Posted: 23 Dec 2020 | Published: 23 Dec 2020
|
|
|
SecureDoc File Encryption
sponsored by WinMagic
DATA SHEET:
When it comes to protecting sensitive data, full drive encryption sets a strong data protection foundation. But file-level protection adds an additional layer of security, and as such, it’s often recommended as part of a defense-in-depth security strategy. Scan through this data sheet to read up on SecureDoc File Encryption.
Posted: 23 Dec 2020 | Published: 23 Dec 2020
|
|
|
SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET:
As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020
|
|
|
Evaluating Data-Centric Protection Solutions
sponsored by Comforte AG
EBOOK:
Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020
|
|
|
Comforte SecurDPS: Enterprise Solution for GDPR
sponsored by Comforte AG
WHITE PAPER:
Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020
|
|
|
Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE:
Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020
|
|
|
Full Disk Encryption: Not What You Might Think
sponsored by Atakama
RESOURCE:
In this article, learn why full disk encryption, an approach to securing the contents of hard drives, may not be the solution you might have thought. See how, in some cases, it could even create more security vulnerabilities for users.
Posted: 08 Dec 2020 | Published: 29 Aug 2019
|
|
|
Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE:
Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020
|
|
|
Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY:
A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020
|
|
|
Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER:
PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020
|
|
|
One of the World’s Largest Fashion Retailers Chooses Tokenization
sponsored by Comforte AG
CASE STUDY:
A major fashion retailer experienced a data breach when bad actors exploited gaps in their data security program. This prompted decision makers to invest in a more robust data security solution. By viewing this case study, you can learn how this retailer used Comforte’s data protection, encryption, and tokenization to bolster speed and security.
Posted: 04 Dec 2020 | Published: 04 Dec 2020
|
|
|
Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER:
Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020
|
|
|
Understanding the HIPAA Encryption Requirement
sponsored by Atakama
RESOURCE:
Understanding the HIPAA encryption requirements gives healthcare organizations and their business associates a way to protect privacy for data both in-transit and at-rest. In this article, find out how end-to-end encryption enables secure telehealth today.
Posted: 03 Dec 2020 | Published: 03 Dec 2020
|
|
|
Cracking Cloud Encryption Complexity
sponsored by IBM
WHITE PAPER:
The best encryption algorithm in the world is useless if the key is compromised. The solution for many is using a hardware security module—but it’s not so simple in the cloud. Installing and maintaining secure hardware in the cloud provider’s physical location is awkward at best. Learn how IBM is cracking cloud encryption complexity in this guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020
|
|
|
Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY:
In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020
|
|
|
Finding a Secure Managed File Transfer Tool: Key considerations
sponsored by SearchSecurity.com
EBOOK:
Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
Posted: 01 Jun 2020 | Published: 01 Jun 2020
|
|
|
How Can I Lock Down my distributed SQL Server / SQL Express Application?
sponsored by NetLib Security
WHITE PAPER:
In this article, discover a method, using Encryptionizer, where you can "lock down" your SQL database so that you can protect your intellectual property.
Posted: 28 Apr 2020 | Published: 28 Apr 2020
|
|
|
Automatic Whole Database Encryption – How It Works
sponsored by NetLib Security
WHITE PAPER:
In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020
|
|
|
It’s Gotta Be The Shoes! Or Is It? The Gold Is In The Data
sponsored by NetLib Security
CASE STUDY:
Read this case study to learn how C Sharp Sports used NetLib Security’s data encryption solution, Encryptionizer, to meet their growing business needs.
Posted: 10 Apr 2020 | Published: 10 Apr 2020
|
|
|
Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY:
In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
|
|
|
Beginners Guide to Encryption and Key Management (and Encryptionizer)
sponsored by NetLib Security
RESOURCE:
Sensitive personal information and business data has become increasingly critical to defend as its value grows amongst ‘the bad guys’. But what is the best way to go about protecting data from falling into the wrong hands? Read on to find out.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
|
|
|
What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE:
SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020
|
|