ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Introduction to the EMC XtremIO Storage Array

    Sponsored by: emc first distribution

    View this informative white paper for an introduction to a storage array, with several detailed descriptions of the system architecture, theory of operation, and its various features.

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

  • A Smart Way to Protect Windows Server 2003

    Sponsored by: Unisys

    Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.

  • Encryption as an IT Service

    Sponsored by: Gemalto

    To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by: SearchSecurity.com

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Comparison Guide Email Encryption

    Sponsored by: ZixCorp

    Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.

  • Total Protection for Data Loss Prevention - Solution Brief

    Sponsored by: Intel Security

    Learn about a data-centric system that delivers data security and actionable insight about data at rest, data in motion and data in use across your entire organization. Easily identify potential threats and refine policies as needed to quickly respond to the shifting threat landscape.

  • Complete Data Protection - Data Sheet

    Sponsored by: Intel Security

    With proper encryption, you can easily stop data loss and take control of all your data that lives on employee endpoints. Learn how to communicate with all your endpoints and control them from a hardware level, whether they are powered on or powered off.

  • Security Delivery Platform

    Sponsored by: Gigamon

    The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.

  • Complete Data Protection (Advanced) - Data Sheet

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • Future Risks Be Prepared

    Sponsored by: Kaspersky Lab

    An increasingly sophisticated threat landscape calls for a multi-layered security approach, in which a combination of integrated technologies provides comprehensive detection and protection against known, unknown and advanced malware and other threats. This report is designed to help you to be better prepared to fight APTs.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • Simple, Secure Encryption in the Era of Big Data

    Sponsored by: Gemalto

    Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.

  • Gemalto SafeNet KeySecure

    Sponsored by: Gemalto

    This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.

  • Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform

    Sponsored by: Gemalto

    With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.

  • A Step-By-Step Guide to Finding the Right Safenet Data Protection Solution for Your Organization

    Sponsored by: Gemalto

    Deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it is data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.

  • Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides

    Sponsored by: Gemalto

    Stuck in the data protection dilemma? How do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats? Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest.

  • Application Awareness: The Critical Enabler in Virtualized Networks

    Sponsored by: Ipoque

    Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.

  • Everything You Need to Know About Crypto Management

    Sponsored by: Gemalto

    The best way to secure sensitive information is by placing safeguards around the data itself through encryption. Learn how to better manage your encrypted data to enable greater security enforcement and overall better efficiency.

  • Staying out of the next Data Breach Headline

    Sponsored by: Intel Security

    Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.

  • Endpoint Encryption Keeps Your Data Safe

    Sponsored by: Intel Security

    Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • The Risks of Email and the Rewards of Innovative Encryption

    Sponsored by: ZixCorp

    This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.

  • Bolster email security in Office 365 deployments

    Sponsored by: ZixCorp

    Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. Learn why email encryption capabilities should not be overlooked in those plans.

  • Case Study: Enable Care Providers While Protecting Patient Data

    Sponsored by: Digital Guardian

    Follow St. Charles Health System's path from risk assessment to remediation of their problems using a data loss prevention technique to monitor their entire network to ensure no important information was being mishandled.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.