ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • 451 Research: Vormetric Enters Encryption Gateway Fray with Latest Extension to Its Platform Strategy

    Sponsored by: Vormetric

    This 451 Research report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway. The report also offers analysis of the Vormetric Data Security Platform strategy

  • 7 Modern Encryption Problems

    Sponsored by: Blue Coat Systems

    In this resource discover 7 problems faced by your network that you can solve with encrypted traffic management. See how each issue arises, can damage your network, and can be alleviated.

  • A Technology Brief on SSL/TLS Traffic

    Sponsored by: Blue Coat Systems

    In this resource get a detailed breakdown of SSL/TSL traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Read on to discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.

  • Eliminating Constraints to SSL Implementation

    Sponsored by: Blue Coat Systems

    In this resource you'll find a comprehensive and quick to digest info cache on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Inside you'll also find ways to increase its performance, scalability, and root out malicious activity using it as a cover.

  • Implementing Data Privacy Requirements For Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how to give visibility to encrypted traffic, reducing the risk of malicious activity to go unnoticed. Also find out how to achieve simple, effective policy enforcement.

  • Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.

  • Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • SSL Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.

  • Unlocking Business Success: The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.

  • Introduction to the EMC XtremIO Storage Array

    Sponsored by: emc first distribution

    While an attractive method for boosting I/O performance in the data center, flash storage comes at a hefty price both in high cost and loss of capabilities. Access this white paper to learn about one option that leverages flash to deliver value in performance, scalability and efficiency.

  • Encryption as an IT Service

    Sponsored by: Gemalto

    To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by: SearchSecurity.com

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Comparison Guide Email Encryption

    Sponsored by: ZixCorp

    Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.

  • Security Delivery Platform

    Sponsored by: Gigamon

    The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.

  • Mobile Video Optimisation

    Sponsored by: Ipoque

    To win in mobile, operators know they must win in video delivery. Video usage is now more common on mobile devices than PCs. Access this eBook to discover how to optimize mobile video.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • Simple, Secure Encryption in the Era of Big Data

    Sponsored by: Gemalto

    Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.

  • Gemalto SafeNet KeySecure

    Sponsored by: Gemalto

    This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.

  • Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform

    Sponsored by: Gemalto

    With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.

  • A Step-By-Step Guide to Finding the Right Data Protection System

    Sponsored by: Gemalto

    Learn how to deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it be data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.

  • Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides

    Sponsored by: Gemalto

    Stuck in the data protection dilemma? How do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats? Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest.

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.