Standards  >   Security Standards  >  

Encryption Standards

RSS Feed   
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 197 Matches Previous Page  |  Next Page
SSL: A Double-Edged Sword
sponsored by NSS Labs
WHITE PAPER: Discover the risks of existing SSL technologies, the opportunities new SSL approaches bring to organizations of all sizes, and the factors to consider when evaluating your SSL ecosystem.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

NSS Labs

The Ultimate Guide to Data Encryption in the Cloud
sponsored by Rubrik
EBOOK: In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Rubrik

Making BitLocker Simple, Smart and Secure for You
sponsored by WinMagic
WHITE PAPER: Microsoft BitLocker already offers data protection capabilities like high-performance, built-in OS encryption, integration with Microsoft Azure and more, but learn of the potential opportunities and benefits that come with adding an additional encryption tool to BitLocker.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

WinMagic

Cutting BitLocker Complexity and Helpdesk Headaches
sponsored by WinMagic
WHITE PAPER: Find out how you can streamline BitLocker deployments and cut helpdesk time spent on security tasks like password resets by as much as 75% with tools like the SecureDoc Enterprise Server (SES).
Posted: 10 Aug 2018 | Published: 10 Aug 2018

WinMagic

Worldwide Cloud Security Gateways Vendor Assessment
sponsored by McAfee, Inc.
RESEARCH CONTENT: As enterprises lose control over the different architectural components of the cloud, more uncertainty is introduced into the environment, and organizations must rethink their security programs. Learn about the key characteristics for a cloud security platform, from this IDC vendor assessment.
Posted: 02 Jul 2018 | Published: 29 Dec 2017

McAfee, Inc.

Blockchain for dummies
sponsored by IBM
EBOOK: Download this comprehensive 51-page guide for everything you need to know about blockchain and the benefits it stands to offer.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

IBM

7 Reasons Why IT Leaders Want to Improve Data Protection and BitLocker Management
sponsored by WinMagic
WHITE PAPER: Discover 7 reasons why IT leaders are looking at increasingly intelligent ways to protect their data and improve BitLocker management with a centralized approach to encryption.
Posted: 09 May 2018 | Published: 09 May 2018

WinMagic

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Secure Managed File Transfer: Ultimate Buyer's Guide
sponsored by HelpSystems
RESOURCE: Files contain a multitude of sensitive information and therefore data transfers of these files need to be protected. Take a look at this buyer's guide to learn how to effectively secure file transfers by utilizing a managed file transfer (MFT) product.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

HelpSystems

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
WHITE PAPER: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Radware

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
EBOOK: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

How to deploy cloud storage without compromising on security
sponsored by Nasuni
WHITE PAPER: In this white paper learn how you can remove these challenges by adopting this enterprise file system, which provides a security model that combines strong encryption and local authentication with the native capabilities of top-tier cloud storage providers.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Nasuni

BitLocker - A Strong First Step in Data Security
sponsored by WinMagic
WHITE PAPER: According to Crowd Research Partners' BYOD and Mobile Security Spotlight Report, 43% of respondents say device encryption is currently a part of their mobile device management policy. Learn how you can manage BitLocker from a single security window to protect data residing across desktops, mobile devices, and more.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

WinMagic

CloudVM
sponsored by WinMagic
WHITE PAPER: Don't defer the responsibility of protecting your enterprise – take responsibility for protecting your data and workloads in the cloud. Take a look at this technology overview to see if SecureDoc CloudVM is the right approach for your enterprise's cloud data protection and encryption needs.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

WinMagic

Fintech & the digital customer experience
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

ComputerWeekly.com

Managing BitLocker in the Enterprise with SecureDoc
sponsored by WinMagic
WHITE PAPER: Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

WinMagic

CW ANZ: Rise to the big data challenge
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

ComputerWeekly.com

GDPR is Here: Are You Ready?
sponsored by Oracle Cloud
VIDEO: In this webcast, hear from Allesandro Vallega, Security & GDPR business development director at Oracle EMEA about survey results, maturity categories across industries, and cloud services that can help achieve GDPR compliance.
Posted: 26 Jul 2018 | Premiered: 24 Jul 2018

Oracle Cloud

Europol and Security Leaders Declare War on Ransomware
sponsored by Barracuda
CASE STUDY: Spearheaded by Europol's European Cybercrime Center, among others, No More Ransom provides an online source of information about the latest ransomware variants, including decryption keys that have worked to retrieve files encrypted in previous attacks.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Barracuda

Protecting Engineering IP in the Age of Collaboration
sponsored by Vera
VIDEO: Did you know that sharing enterprise information can open up your IP to risk, theft or loss? Listen in on this webinar to learn how to protect valuable engineering IP in a highly collaborative environment.
Posted: 15 Jun 2018 | Premiered: 12 Jun 2018

Vera

Closing the Cloud Security Gap
sponsored by West UC
WHITE PAPER: According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

West UC

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

When Cryptors Attack: Timeline of a Ransomware Infection
sponsored by Kaspersky Lab
WHITE PAPER: The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Kaspersky Lab
1 - 25 of 197 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement