Research Library

Powered by

Encryption Standards Research

  • Enterprise Apps OWASP Mobile Security Risks Report

    Sponsored by: Wandera

    This report demonstrates a security assessment of the 10 most popular business apps used on corporate-liable devices, using the Open Web App Security Project (OWASP) Mobile Security Risks as a foundation. Find out how these 10 apps performed on the OWASP tests so that you can better prepare your data security strategy for enterprise apps.

  • Staying Secure in the Cloud Is a Shared Responsibility

    Sponsored by:

    The increasing popularity of public clouds requires CISOs to develop effective security strategies to ensure proper levels of security for enterprise operations within the public cloud. This Gartner report provides clear guidelines for defining and allocating responsibility for security planning and operations in IaaS, PaaS and SaaS environments.

  • MYDIGIPASS for Healthcare

    Sponsored by: VASCO Data Security International

    Discover a unified identity proofing method and authentication tool that can be used throughout all healthcare IT applications and platforms. Access now to learn the five critical elements to support trusted digital identities and secure information exchange within healthcare organizations and HIT providers.

  • Public Key Infrastructure: The New Best Practices

    Sponsored by: Certified Security Solutions (CSS)

    This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.

  • Public Key Infrastructure: Traditional Deployments vs. IoT PKI

    Sponsored by: Certified Security Solutions (CSS)

    This white paper explores the differences between a typical enterprise Public Key Infrastructure (PKI) and an Internet of Things (IoT) PKI. Gain access to a current assessment of the state of IoT security risks and explore the unique design, deployment, and management considerations of an IoT PKI.

  • How Network Security Specialists Inspect Encrypted Traffic

    Sponsored by: Blue Coat Systems

    In the following resource, WhatWorks takes a look at NetTects' decision to deploy an SSL visibility tool to detect unwanted network traffic. Uncover a Q&A in which CTO Michael Weinstein reveals his process for network security decision-making.

  • 7 Reasons it's Time to Gain SSL Visibility with Application Delivery Controllers

    Sponsored by: Blue Coat Systems

    When used with ADCs, some tools can fill the gaps in security coverage created by a lack of visibility into encrypted traffic. Access the following resource and uncover seven ways to improve visibility and data center security.

  • Are You Fully Secure? Or Are You Using Weak Authentication Methods?

    Sponsored by: RSA Softcat

    This infographic shows you the top 5 ways organizations are using authentication to improve secure access and protect valuable data.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by:

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • 7 Modern Encryption Problems

    Sponsored by: Blue Coat Systems

    This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.

  • A Technology Brief on SSL/TLS Traffic

    Sponsored by: Blue Coat Systems

    In this resource, get a detailed breakdown of SSL/TLS traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.

  • Eliminating Constraints to SSL Implementation

    Sponsored by: Blue Coat Systems

    Find comprehensive information on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Uncover ways to increase its performance, scalability, and root out malicious activity using it as a cover.

  • Implementing Data Privacy Requirements For Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how to create visibility to encrypted traffic, reducing the risk of malicious activity that goes unnoticed. Also find out how to achieve simple, effective policy enforcement.

  • Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.

  • Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • SSL Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.

  • Case Study: Enable Care Providers While Protecting Patient Data

    Sponsored by: Digital Guardian

    Follow St. Charles Health System's path from risk assessment to remediation of their problems using a data loss prevention technique to monitor their entire network to ensure no important information was being mishandled.

  • Does Your Firewall Help You Meet PCI DSS Requirements?

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper neatly outlines how firewall deployment impacts PCI DSS standards for a PCI DSS merchant. Access now for tables that include descriptions of PCI DSS standards and how you can achieve these requirements.

  • The 5 Features You Absolutely, Positively Must Have to Secure Your Mobile Endpoints

    Sponsored by: Commvault

    This white paper presents 5 critical security features that you need to confidently secure mobile devices and protect against would-be thieves and hackers – and forgetful employees.

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by:

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    Sponsored by:

    How do you determine if your network is too flat? Without proper network segmentation attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.