Standards  >   Security Standards  >  

Encryption Standards

RSS Feed   
ALSO CALLED: Cryptography Standards, Data Encryption Standards
DEFINITION: Standards developed for encrypting information.
Encryption Standards Reports
1 - 25 of 171 Matches Previous Page  |  Next Page
Video Surveillance System (VSS) Architecture in a Smart Building
sponsored by Forescout
RESOURCE: Today, many buildings have a hybrid VSS architecture that is quite complex, containing a variety of legacy and new systems, including both analog and IP cameras. The problem is that this architecture presents many vulnerabilities. In this infographic, explore some common vulnerabilities found in many VSS commonly used in large organizations.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Forescout

Protecting Data in The Cloud 2019 Thales Cloud Security Study
sponsored by Thales
WHITE PAPER: During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.
Posted: 11 Nov 2019 | Published: 31 Oct 2019

Thales

Organizations are failing to protect sensitive data in the cloud
sponsored by Thales
WHITE PAPER: This infographic highlights some of the key takeaways from the 2019 Thales Cloud Security Study. Continue reading to uncover research findings as they relate to the amount of data stored, the kind of data & the prevalence of encryption or other security measures.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Thales

The Changing Face of Data Security in Europe
sponsored by Thales
RESOURCE: Take a glimpse at the results from the 2019 Thales Data Threat Report – European Edition. This infographic shares some key statistics from the research findings, including the use of sensitive data, multi-cloud environments & the effects of GDPR and other data privacy laws.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Thales

Safeguard your Private Keys with AppViewX
sponsored by AppViewX
WHITE PAPER: When a private key is uncovered by malicious actors, valuable data is compromised through the impersonation of an enterprise’s servers. So, how should enterprises properly safeguard their private keys? Learn how your enterprise can essentially replace the vulnerable private key inventories.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Vormetric Data Security Platform Architecture
sponsored by Thales
WHITE PAPER: As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.
Posted: 06 Nov 2019 | Published: 31 Jul 2019

Thales

Certificate Lifecycle Management and Automation
sponsored by AppViewX
WHITE PAPER: Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

AppViewX

The State of PKI Security and Management: Survey Report
sponsored by AppViewX
WHITE PAPER: A 2019 study has revealed that businesses’ PKI setups have a long way to go before they’re considered truly secure and effective. In this whitepaper, find the results of the study that reveal the state of PKI in the industry today – including some surprising statistics.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppViewX

When Should you Invest in a Certificate Management Tool?
sponsored by AppViewX
RESOURCE: Digital certificates play a major role in establishing trust and encrypting sensitive information online. But, certificates require constant maintenance like periodic renewals. That’s why many invest in a certificate management tool. Determine if you should invest in a certificate management tool with a checklist of 11 questions.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppViewX

Overcoming the Top 3 Bottlenecks in SSL/TLS Certificate Management
sponsored by AppViewX
WHITE PAPER: In this white paper, learn how to overcome the top 3 bottlenecks in SSL/TLS certificate management: Lack of discovery, manual management, inadequate reporting.
Posted: 01 Nov 2019 | Published: 01 Nov 2019

AppViewX

5 Business Impacts of Certificate Mismanagement
sponsored by AppViewX
WHITE PAPER: In this white paper, discover a checklist that will help you evaluate if your certificate management strategy has room for improvement. You will also find 5 reasons why certificate outages can affect your business
Posted: 01 Nov 2019 | Published: 01 Nov 2019

AppViewX

SSH Key Management in the Cloud
sponsored by AppViewX
WHITE PAPER: Enterprises want to keep their systems safe using SSH keys, but by failing to keep those keys secure, they are ultimately more at-risk. Without protecting their SSH keys, enterprises are as vulnerable as ever. Find out how AppViewX can help you automate SSH key management and keep them secure in the cloud and on-prem.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

AppViewX

Securing Cloud environments: Five Data Encryption best practices to help reduce your risk
sponsored by IBM
WHITE PAPER: It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

Securing Cloud environments: Five Data Encryption best practices to help reduce your risk
sponsored by IBM
WHITE PAPER: It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

Forrester Encryption Podcast: You Can Never Have Too Much Encryption
sponsored by IBM
PODCAST: A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.
Posted: 28 Oct 2019 | Premiered: Oct 28, 2019

IBM

Forrester Encryption Podcast: You Can Never Have Too Much Encryption
sponsored by IBM
PODCAST: A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.
Posted: 28 Oct 2019 | Premiered: Oct 28, 2019

IBM

Forrester Report: Use advanced encryption for data security
sponsored by IBM
ANALYST REPORT: More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.
Posted: 24 Oct 2019 | Published: 12 Sep 2019

IBM

Forrester Report: Use advanced encryption for data security
sponsored by IBM
ANALYST REPORT: More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.
Posted: 24 Oct 2019 | Published: 12 Sep 2019

IBM

From readiness to transformation: How to address privacy regulations and keep your data safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM

From readiness to transformation: How to address privacy regulations and keep your data safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM

Critical Watch Report: 2019
sponsored by Alert Logic
ANALYST REPORT: SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Alert Logic

Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne
sponsored by HackerOne
WEBCAST: Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.
Posted: 17 Oct 2019 | Premiered: Oct 17, 2019

HackerOne

GandCrab Ransomware Analysis Report
sponsored by Versa Networks
WHITE PAPER: A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Versa Networks

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon
1 - 25 of 171 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement