Standards  >   Security Standards  >  

Encryption Standards

RSS Feed   
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 150 Matches Previous Page  |  Next Page
Protecting Healthcare Data with Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: To better manage and protect patient data, healthcare organizations are embracing encryption capabilities. In this use case, explore the common pain points and challenges that have led to the rise of encryption and discover the potential business benefits of adopting a Removable Media Container Encryption (RMCE).
Posted: 01 Feb 2021 | Published: 01 Feb 2021

WinMagic

Why You Can’t Trust ‘Good Enough’ in the Age of Compliance
sponsored by WinMagic
CASE STUDY: It’s a common misconception that because servers are in the data center – and because the data is in perpetual use – that encrypting the drives ais unnecessary as the data is never at-rest. This case study highlights a financial services institution that fell into this trap – read on to get started.
Posted: 28 Dec 2020 | Published: 28 Dec 2020

WinMagic

Securedoc On Top For Bitlocker
sponsored by WinMagic
DATA SHEET: In this product brief, learn about WinMagic’s SecureDoc Enterprise Server (SES) and how it secures data at rest by managing how it’s encrypted, regardless of the operating system, or where the data resides.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

Protecting Healthcare Data With Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: Healthcare professionals are facing the growing challenge of balancing the security of patient data with ease of authorized access. Read this case study to see how one healthcare institution was able to achieve effective data management across various devices without sacrificing functionality.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

SecureDoc File Encryption
sponsored by WinMagic
DATA SHEET: When it comes to protecting sensitive data, full drive encryption sets a strong data protection foundation. But file-level protection adds an additional layer of security, and as such, it’s often recommended as part of a defense-in-depth security strategy. Scan through this data sheet to read up on SecureDoc File Encryption.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET: As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

WinMagic

Evaluating Data-Centric Protection Solutions
sponsored by Comforte AG
EBOOK: Data is the lifeblood of any organization, and as such, it’s critical that any data-centric protection system works 100% of the time. Moreover, these systems must be vetted so you know you’re getting an agile, yet mission-critical tokenization service. Absorb this guide for evaluating and comparing tokenization solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Comforte AG

Comforte SecurDPS: Enterprise Solution for GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

Marrying Threshold Cryptography with Encryption Keys: Why?
sponsored by Atakama
RESOURCE: Threshold cryptography – often referred to as ‘secret sharing’ – is a mechanism for sharing information among a group of participants. It’s not very well-known, but it can offer tremendous benefits within an existing cybersecurity stack. In this article, explore threshold cryptography and its relationship to encryption keys.
Posted: 08 Dec 2020 | Published: 09 Jun 2020

Atakama

Full Disk Encryption: Not What You Might Think
sponsored by Atakama
RESOURCE: In this article, learn why full disk encryption, an approach to securing the contents of hard drives, may not be the solution you might have thought. See how, in some cases, it could even create more security vulnerabilities for users.
Posted: 08 Dec 2020 | Published: 29 Aug 2019

Atakama

Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE: Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020

Atakama

Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY: A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020

Atakama

Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

One of the World’s Largest Fashion Retailers Chooses Tokenization
sponsored by Comforte AG
CASE STUDY: A major fashion retailer experienced a data breach when bad actors exploited gaps in their data security program. This prompted decision makers to invest in a more robust data security solution. By viewing this case study, you can learn how this retailer used Comforte’s data protection, encryption, and tokenization to bolster speed and security.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Understanding the HIPAA Encryption Requirement
sponsored by Atakama
RESOURCE: Understanding the HIPAA encryption requirements gives healthcare organizations and their business associates a way to protect privacy for data both in-transit and at-rest. In this article, find out how end-to-end encryption enables secure telehealth today.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

Atakama

Cracking Cloud Encryption Complexity
sponsored by IBM
WHITE PAPER: The best encryption algorithm in the world is useless if the key is compromised. The solution for many is using a hardware security module—but it’s not so simple in the cloud. Installing and maintaining secure hardware in the cloud provider’s physical location is awkward at best. Learn how IBM is cracking cloud encryption complexity in this guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

IBM

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Finding a Secure Managed File Transfer Tool: Key considerations
sponsored by SearchSecurity.com
EBOOK: Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SearchSecurity.com

How Can I Lock Down my distributed SQL Server / SQL Express Application?
sponsored by NetLib Security
WHITE PAPER: In this article, discover a method, using Encryptionizer, where you can "lock down" your SQL database so that you can protect your intellectual property.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

NetLib Security

Automatic Whole Database Encryption – How It Works
sponsored by NetLib Security
WHITE PAPER: In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

NetLib Security

It’s Gotta Be The Shoes! Or Is It? The Gold Is In The Data
sponsored by NetLib Security
CASE STUDY: Read this case study to learn how C Sharp Sports used NetLib Security’s data encryption solution, Encryptionizer, to meet their growing business needs.
Posted: 10 Apr 2020 | Published: 10 Apr 2020

NetLib Security

Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Beginners Guide to Encryption and Key Management (and Encryptionizer)
sponsored by NetLib Security
RESOURCE: Sensitive personal information and business data has become increasingly critical to defend as its value grows amongst ‘the bad guys’. But what is the best way to go about protecting data from falling into the wrong hands? Read on to find out.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix
1 - 25 of 150 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info