Hardware  >   Security Hardware  >   Network Security Hardware  >  

Tokens

RSS Feed   
Tokens Reports
 
BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Board Oversight of Cybersecurity Risk: A Framework for Inquiry
sponsored by Dell SecureWorks
WHITE PAPER: Use this white paper as your tool for improving the board-management dialog on cybersecurity risk management. It will help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

Dell SecureWorks

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

CyberConverged Storage: An Overview
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel
WHITE PAPER: This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
Posted: 04 Apr 2011 | Published: 31 Mar 2011

Intel

Implementing Tokenization Is Simpler Than You Think
sponsored by First Data Corporation
WHITE PAPER: A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

First Data Corporation

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Top Mobile Security Threats: Insight Into Threats and Attackers
sponsored by Lookout
EGUIDE: Discover how IT can tackle the top modern mobile security threats by identifying vulnerabilities, integrating successfully with the cloud, and more.
Posted: 30 Mar 2017 | Published: 28 Mar 2017

Lookout

Presentation Transcript: How To Deploy Affordable Two-Factor Authentication Amidst Shrinking Budgets And Growing Data Protection Requirements
sponsored by StrikeForce Technologies
PRESENTATION TRANSCRIPT: Discover the most affordable two-factor Out-of-Band authentication platform that addresses the data security challenges organizations face today. Learn how to deploy an authentication platform that will protect the following: remote access (VPN), domain access, website access, application access, risk-mitigation and transaction based environments.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

StrikeForce Technologies

Your IIoT Security Plan: Risks in Manufacturing
sponsored by Bayshore Networks
EGUIDE: In this e-guide learn how to get smart about industrial IoT security risks in manufacturing, as well as how to map out an industrial IoT plan to create a smooth-running, smart factory.
Posted: 02 Jun 2017 | Published: 26 May 2017

Bayshore Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement