Standards  >   Security Standards  >  

Encryption Standards

RSS Feed   
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 160 Matches Previous Page  |  Next Page
Cracking Cloud Encryption Complexity
sponsored by IBM
WHITE PAPER: The best encryption algorithm in the world is useless if the key is compromised. The solution for many is using a hardware security module—but it’s not so simple in the cloud. Installing and maintaining secure hardware in the cloud provider’s physical location is awkward at best. Learn how IBM is cracking cloud encryption complexity in this guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

IBM

EUC Security for Work-from-Home
sponsored by TierPoint
WHITE PAPER: End user computing (EUC) allows users to access data from a centralized, enterprise-class data center where it is professionally managed, monitored and backed up. But centralizing data alone won’t protect your organization from a growing plethora of cyberthreats. So, how can you better protect your end users? Read this white paper to find out.
Posted: 20 Nov 2020 | Published: 20 Nov 2020

TierPoint

Encryption Key Management for Microsoft® SQL Server® And Oracle® Database
sponsored by Thales
DATA SHEET: If your enterprise uses Microsoft SQL Server and/or Oracle DB, read this data sheet about encryption key management from Thales. Centrally managing your keys independently from your database applications may help you streamline operations, fulfill compliance mandates and better protect your sensitive data.
Posted: 03 Nov 2020 | Published: 30 Jun 2020

Thales

Sensitive Data Protection in the Retail Card Payments Ecosystem
sponsored by Thales
WHITE PAPER: Securing sensitive data in a cost-effective manner is a significant challenge in processing payment transactions. Year after year, the threat landscape widens as fraudsters think of more sophisticated methods to compromise payment credentials for monetary gain. View this white paper to learn about keeping payment transactions secure.
Posted: 02 Nov 2020 | Published: 30 Sep 2020

Thales

Upgrading Existing Security Systems to Agile Quantum-Safe With Thales Luna HSMs And Thales High-Speed Encryptors
sponsored by Thales
WHITE PAPER: The impending arrival of quantum computing is powerful enough to pose a threat to today’s encryption. View this brief to learn about Thales Luna Hardware Security Modules, Thales High Speed Encryptors, and ISARA’s quantum-safe solutions, which aim to provide quantum-safe security while maintaining backward compatibility with existing systems.
Posted: 02 Nov 2020 | Published: 28 Feb 2020

Thales

Leading healthcare provider protects vital client assets with help from Thales
sponsored by Thales
CASE STUDY: This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Thales

Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER: Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020

Thales

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Quantum Computing and Quantum-Safe Security
sponsored by Thales
WHITE PAPER: Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

Avoiding Data Leaks with Scalable Encryption and Access Controls
sponsored by Thales
PRODUCT OVERVIEW: Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Thales

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

The Facts Around Zoom and Encryption for Meetings/Webinars
sponsored by Zoom Video Communications
RESOURCE: In light of recent interest in Zoom’s encryption practices, they released a blog post apologizing for the confusion they had caused by incorrectly suggesting that Zoom meetings were capable of using end-to-end encryption. Download the blog to learn more about how Zoom encrypts the content that moves across their network.
Posted: 12 Jun 2020 | Published: 01 Apr 2020

Zoom Video Communications

Our First ‘Ask Eric Anything’ Webinar Addresses Users’ Security & Privacy Concerns
sponsored by Zoom Video Communications
RESOURCE: As part of Zoom’s commitment to creating a safe meeting experience for their users, Zoom founder and CEO Eric S. Yuan has started hosting weekly “Ask Eric Anything” webinars. In this blog, explore some of the specific questions Eric answered during the first webinar session.
Posted: 05 Jun 2020 | Published: 08 Apr 2020

Zoom Video Communications

Executive Brief: The Dark Side of Encryption
sponsored by SonicWall
WHITE PAPER: Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Finding a Secure Managed File Transfer Tool: Key considerations
sponsored by SearchSecurity.com
EBOOK: Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SearchSecurity.com

How Can I Lock Down my distributed SQL Server / SQL Express Application?
sponsored by NetLib Security
WHITE PAPER: In this article, discover a method, using Encryptionizer, where you can "lock down" your SQL database so that you can protect your intellectual property.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

NetLib Security

Automatic Whole Database Encryption – How It Works
sponsored by NetLib Security
WHITE PAPER: In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

NetLib Security

It’s Gotta Be The Shoes! Or Is It? The Gold Is In The Data
sponsored by NetLib Security
CASE STUDY: Read this case study to learn how C Sharp Sports used NetLib Security’s data encryption solution, Encryptionizer, to meet their growing business needs.
Posted: 10 Apr 2020 | Published: 10 Apr 2020

NetLib Security

Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Beginners Guide to Encryption and Key Management (and Encryptionizer)
sponsored by NetLib Security
RESOURCE: Sensitive personal information and business data has become increasingly critical to defend as its value grows amongst ‘the bad guys’. But what is the best way to go about protecting data from falling into the wrong hands? Read on to find out.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

TLS Versions: North-South and East-West Web Traffic Analysis
sponsored by Gigamon
ANALYST REPORT: The wide adoption of SSL/TLS — not only for public internet traffic, but for internal east-west traffic as well — underscores the criticality for inspecting encrypted traffic. In this report, explore key findings from Gigamon’s study of 275 billion HTTP and HTTPS live network flows.
Posted: 17 Mar 2020 | Published: 29 Feb 2020

Gigamon

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix
1 - 25 of 160 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info