ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Ransomware: 3 Seconds to Encryption

    Sponsored by: Arctic Wolf Networks, Inc.

    Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.

  • Guide to Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.

  • Security Overview: SSL/TLS Traffic

    Sponsored by: Blue Coat Systems

    Uncover an overview of Secure Socket Layer (SSL)/ Transport Layer Security (TLS) technology and find examples of how you can manage the increasing SSL traffic within your enterprise network and protect it from hidden threats.

  • Remove the Security Blind Spots Created by Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.

  • Top 10 Security Advantages of One Business Management Platform

    Sponsored by: Acumatica

    Discover the top 10 reasons why one security platform's features may extend beyond the rest, including such features as control over data storage and processing, strong user identification, encrypted communications, role-based user security, and more.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • Staying Secure in the Cloud Is a Shared Responsibility

    Sponsored by: evident.io

    The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.

  • MYDIGIPASS for Healthcare

    Sponsored by: VASCO Data Security International

    Discover a unified identity proofing method and authentication tool that can be used throughout all healthcare IT applications and platforms. Access now to learn the five critical elements to support trusted digital identities and secure information exchange within healthcare organizations and HIT providers.

  • Public Key Infrastructure: The New Best Practices

    Sponsored by: Certified Security Solutions (CSS)

    This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.

  • Public Key Infrastructure: Traditional Deployments vs. IoT PKI

    Sponsored by: Certified Security Solutions (CSS)

    This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.

  • How Network Security Specialists Inspect Encrypted Traffic

    Sponsored by: Blue Coat Systems

    In the following resource, WhatWorks takes a look at NetTects' decision to deploy an SSL visibility tool to detect unwanted network traffic. Inside you'll uncover a Q&A, in which CTO Michael Weinstein reveals his process for network security decision-making.

  • Are You Fully Secure? Or Are You Using Weak Authentication Methods?

    Sponsored by: RSA Softcat

    This infographic shows you the top 5 ways organizations are using authentication to improve secure access and protect valuable data.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • 7 Modern Encryption Problems

    Sponsored by: Blue Coat Systems

    This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.

  • Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by: SearchSecurity.com

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Case Study: Enable Care Providers While Protecting Patient Data

    Sponsored by: Digital Guardian

    Follow St. Charles Health System's path from risk assessment to remediation of their problems using a data loss prevention technique to monitor their entire network to ensure no important information was being mishandled.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    Sponsored by: SearchSecurity.com

    How do you determine if your network is too flat? Without proper network segmentation attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure.

  • Does Your Firewall Help You Meet PCI DSS Requirements?

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper neatly outlines how firewall deployment impacts PCI DSS standards for a PCI DSS merchant. Access now for information on PCI DSS standards and how you can achieve these requirements.

  • The 5 Features You Absolutely, Positively Must Have to Secure Your Mobile Endpoints

    Sponsored by: Commvault

    This white paper presents 5 critical security features that you need to confidently secure mobile devices and protect against would-be thieves and hackers – and forgetful employees.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.