ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Why Nasuni Includes Encryption and Local Authentication in Their Security Model

    Sponsored by: Nasuni

    In this white paper learn how you can remove these challenges by adopting this enterprise file system, which provides a security model that combines strong encryption and local authentication with the native capabilities of top-tier cloud storage providers.

  • Effective Isolation and Workload Security in the Multi-Tenant Cloud

    Sponsored by: HyTrust

    A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.

  • Security Solutions for Public Sector Virtual Infrastructure

    Sponsored by: HyTrust

    Explore this product overview to evaluate if this cloud security strategy, which secures critical environments in the cloud, is right for your organization's needs.

  • 8 Things to Know About a Secure Web Gateway

    Sponsored by: Symantec

    Given the evolving way web and cloud app are used and the constantly shifting threat landscape organizations must confront, proxy architecture is more important than ever in terms of security. This editorial brief provides 8 things to know about a secure web gateway and the benefits it can deliver to your security posture.

  • Keeping Security In-Step with your Application Demand Curve

    Sponsored by: AWS - Fortinet

    There has been a 129% increase in organizations embracing the cloud, according to IDC. With this large movement to the cloud, security is crucial. This webcast details the benefits of AWS security and how AWS can be more secure than your existing environment.

  • How Quantum Computing Will Change Browser Encryption

    Sponsored by: F5 Networks

    This threat intelligence report provides insight into how quantum computing will affect the current global encryption standard, the Transport Layer Security (TLS), formerly known as SSL.

  • Equifax Breach: Lessons Learned for your Organization

    Sponsored by: Digital Shadows

    The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.

  • BitLocker - A Strong First Step in Data Security

    Sponsored by: WinMagic

    According to Crowd Research Partners' BYOD and Mobile Security Spotlight Report, 43% of respondents say device encryption is currently a part of their mobile device management policy. Learn how you can manage BitLocker from a single security window to protect data residing across desktops, mobile devices, and more.

  • CloudVM

    Sponsored by: WinMagic

    Don't defer the responsibility of protecting your enterprise – take responsibility for protecting your data and workloads in the cloud. Take a look at this technology overview to see if SecureDoc CloudVM is the right approach for your enterprise's cloud data protection and encryption needs.

  • Fintech & the digital customer experience

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.

  • Managing BitLocker in the Enterprise with SecureDoc

    Sponsored by: WinMagic

    Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.

  • Multi-factor Authentication for dummies

    Sponsored by: iovation, Inc.

    The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.

  • How to Close Security Gaps to Stop Ransomware and other Threats

    Sponsored by: Fortinet, Inc.

    In this e-book, gain a stronger understanding on how protecting your enterprise starts with ensuring coverage across different attack vectors through coordinated Advanced Threat Protection (ATP). Then, find out how IT network pros strive to overcome network security challenges to help increase performance, reliability, and scalability.

  • The Race to Readiness

    Sponsored by: Citrix

    According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.

  • CW ANZ - October 2017: Rise to the big data challenge

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.

  • Encryption Buyer's Guide: 5 Vendor Reviews

    Sponsored by: TechTarget

    Discover data protection measures your organization can take to lessen the risks of being attacked by ransomware by utilizing your data protection guide: Two Quick Data Protection Steps for Ransomware. Take our survey to gain access to this guide as well as Encryption Buyers Guide: 5 Vendor Reviews.

  • When Cryptors Attack: Timeline of a Ransomware Infection

    Sponsored by: Kaspersky Lab

    The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.

  • Encryption Hiding Malware in Half of Cyber Attacks

    Sponsored by: A10 Networks

    A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.

  • SaaS-based Billing Provider with Encryption Requirements Turns to Flash

    Sponsored by: Kaminario

    Download this study to see a snapshot view of how one organization overcame their encryption and capacity conundrums by implementing an all-flash array for their production databases, executing a 10X performance improvement, with built-in encryption to handle data-at-rest requirements.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • HyperConvergence or Hyper-Security? What's Right for Your Enterprise?

    Sponsored by: HyTrust

    To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.

  • Making Data Encryption and Rekeying Easier

    Sponsored by: HyTrust

    Data encryption is fundamental to successful cybersecurity in modern enterprises. But in a recent study, companies cited budget, performance concerns, and lack of deployment knowledge as the top 3 barriers to implementing an encryption tool. Inside, learn sweat-free secrets to performing critical data security functions.

  • The Challenges of Managing SSL/TLS Encrypted Traffic

    Sponsored by: Gigamon

    Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.

  • Understanding your Full Public Key Infrastructure (PKI) Potential

    Sponsored by: DigiCert

    This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security.

  • EU GDPR Compliance Puts Focus on Data Tracking, Encryption

    Sponsored by: Ivanti

    In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.