Standards  >   Security Standards  >  

Encryption Standards

RSS Feed   
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 201 Matches Previous Page  |  Next Page
Europol and Security Leaders Declare War on Ransomware
sponsored by Barracuda
CASE STUDY: Spearheaded by Europol's European Cybercrime Center, among others, No More Ransom provides an online source of information about the latest ransomware variants, including decryption keys that have worked to retrieve files encrypted in previous attacks.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Barracuda

Protecting Engineering IP in the Age of Collaboration
sponsored by Vera
VIDEO: Did you know that sharing enterprise information can open up your IP to risk, theft or loss? Listen in on this webinar to learn how to protect valuable engineering IP in a highly collaborative environment.
Posted: 15 Jun 2018 | Premiered: 12 Jun 2018

Vera

Blockchain for dummies
sponsored by IBM
EBOOK: Download this comprehensive 51-page guide for everything you need to know about blockchain and the benefits it stands to offer.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

IBM

The Importance of Kerberos Decryption
sponsored by CyberArk Software, Inc
WHITE PAPER: In this white paper, learn how decrypting Kerberos can help bring previously inaccessible data into the light, and uncover the malicious activity hidden within. Then read on to learn about how you can decrypt this program in a simple 3-step process.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

CyberArk Software, Inc

7 Reasons Why IT Leaders Want to Improve Data Protection and BitLocker Management
sponsored by WinMagic
WHITE PAPER: Discover 7 reasons why IT leaders are looking at increasingly intelligent ways to protect their data and improve BitLocker management with a centralized approach to encryption.
Posted: 09 May 2018 | Published: 09 May 2018

WinMagic

Cyber-Risk Strategies and Models for a Post-Perimeter Age
sponsored by SearchSecurity.com
EBOOK: In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
Posted: 20 Apr 2018 | Published: 20 Apr 2018

SearchSecurity.com

Operationalize Security To Secure Your Data Perimeter
sponsored by IBM
RESEARCH CONTENT: According to a Forrester report, 46% of organizations encrypt little to none of their data. Take a look at this report to gain insight into how organizations are attempting to operationalize security in order to protect their vast stores of data.
Posted: 17 Apr 2018 | Published: 17 Apr 2018

IBM

Secure Managed File Transfer: Ultimate Buyer's Guide
sponsored by HelpSystems
RESOURCE: Files contain a multitude of sensitive information and therefore data transfers of these files need to be protected. Take a look at this buyer's guide to learn how to effectively secure file transfers by utilizing a managed file transfer (MFT) product.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

HelpSystems

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
WHITE PAPER: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Radware

Operationalize Security to Secure your Data Perimeter
sponsored by IBM
RESEARCH CONTENT: According to this Forrester report, 46% of organizations encrypt little to none of their data. Take a look at this report to gain insight into how organizations are attempting to operationalize security in order to protect their data.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

IBM

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
EBOOK: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Radware

Certificate Management: Policy & Automation
sponsored by Entrust, Inc.
WHITE PAPER: PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. This white paper offers best practices for PKI certificate management policy and how organizations can simplify and streamline their implementation process.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

Public Key Infrastructure (PKI) Buyer's Guide
sponsored by Entrust, Inc.
RESOURCE: Implementing cost-effective security strategies that meet operational needs of end-users while complying with regulatory requirements is challenging. This resource assists organizations in the selection of the best PKI strategy to meet business and security needs.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

Closing the Cloud Security Gap
sponsored by West UC
WHITE PAPER: According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

West UC

How to deploy cloud storage without compromising on security
sponsored by Nasuni
WHITE PAPER: In this white paper learn how you can remove these challenges by adopting this enterprise file system, which provides a security model that combines strong encryption and local authentication with the native capabilities of top-tier cloud storage providers.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Nasuni

Effective Isolation and Workload Security in the Multi-Tenant Cloud
sponsored by HyTrust
RESOURCE: A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

HyTrust

Security Solutions for Public Sector Virtual Infrastructure
sponsored by HyTrust
RESOURCE: Explore this product overview to evaluate if this cloud security strategy, which secures critical environments in the cloud, is right for your organization's needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

HyTrust

BitLocker - A Strong First Step in Data Security
sponsored by WinMagic
WHITE PAPER: According to Crowd Research Partners' BYOD and Mobile Security Spotlight Report, 43% of respondents say device encryption is currently a part of their mobile device management policy. Learn how you can manage BitLocker from a single security window to protect data residing across desktops, mobile devices, and more.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

WinMagic

CloudVM
sponsored by WinMagic
WHITE PAPER: Don't defer the responsibility of protecting your enterprise – take responsibility for protecting your data and workloads in the cloud. Take a look at this technology overview to see if SecureDoc CloudVM is the right approach for your enterprise's cloud data protection and encryption needs.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

WinMagic

Fintech & the digital customer experience
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

ComputerWeekly.com

Managing BitLocker in the Enterprise with SecureDoc
sponsored by WinMagic
WHITE PAPER: Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

WinMagic

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017

Citrix

CW ANZ - October 2017: Rise to the big data challenge
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

ComputerWeekly.com

Equifax Breach: Lessons Learned for your Organization
sponsored by Digital Shadows
WHITE PAPER: The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

Digital Shadows
1 - 25 of 201 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement