ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Accelerating Mobile App Adoption with Frictionless Security

    Sponsored by: Blue Cedar

    In this white paper, learn about a new kind of mobile security that injects security code directly into existing applications to encrypt data, provide authentication protocols, and more.

  • Increased Security Through The Use Of Flash-Based SEDs

    Sponsored by: Micron

    If you find yourself torn between a strong encryption program, and the storage performance you were promised with an SSD array, click inside and learn about how modern self-encrypting-drives (SED) can do both by encrypting data on the device itself.

  • Improved Security, Lower Costs: How Companies Can Benefit From SEDs

    Sponsored by: Micron

    Delve into a flash-based SED vs. HDD-based storage comparison with acquisition costs analyzed, and attention paid to stacking up hardware- vs. software-based encryption. Read on to learn how SEDs eliminate time-consuming key management, and more.

  • How Flash-based SEDs Relieve Strain on IT

    Sponsored by: Micron

    Discover how flash-based self-encrypting drives (SEDs) not only simplify the planning, operation, and expansion of storage systems, they also serve as the foundation for sustainable, secure storage. Read on to see how SEDs securely eliminate the lengthy overwriting of storage media that traditional HDDs have to undergo.

  • Return on Infrastructure: SSDs and SEDs Reap the "New ROI" with Superior Security

    Sponsored by: Micron

    Learn how to use storage hardware-level encryption to improve data backup and security, in the form of SSDs and self-encrypting drives (SEDs), by downloading this resource. Read on to compare these drives to traditional HDD and software-based solutions in the areas of data security, EOL management, and DR.

  • The Rapid Growth of SSL Encryption

    Sponsored by: Fortinet, Inc.

    Learn about the growth of encrypted secure socket layer (SSL) traffic, as well as how cybercriminals are beginning to hide malware inside applications embedded in this layer.

  • The Challenges of Managing SSL/TLS Encrypted Traffic

    Sponsored by: Gigamon

    Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.

  • Report: Tracking Global Internet Encryption Trends

    Sponsored by: F5 Networks

    Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.

  • Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To

    Sponsored by: Dell EMC and Intel®

    This white paper highlights must-have data security features deduplication should encompass. Access this resource from Dell EMC now and learn about encryption capabilities that back up and protect data being replicated from one system to another, while preserving deduplication bandwidth.

  • Your Guide to Uncovering Hidden Threats within Encrypted Traffic

    Sponsored by: A10 Networks

    In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.

  • How to Uncover Threats in SSL Traffic

    Sponsored by: A10 Networks

    Delve into 5 features to consider when selecting an SSL inspection platform, helping you pick out the threats that may be hiding in the very encryption that you thought was making your organization safe.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • The History of Ransomware

    Sponsored by: KnowBe4

    Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.

  • Ransomware: A Hostage Rescue Manual

    Sponsored by: KnowBe4

    Learn the different types of ransomware, how to spot them and how to prevent an attack against your files. Should you become infected, learn the steps you must take to best protect your assets and how to avoid future ransomware attacks.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by: SearchSecurity.com

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    Sponsored by: SearchSecurity.com

    How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

  • Can A Subscription Ease SSL Certificate Management?

    Sponsored by: Symantec Website Security

    This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.

  • Your data on the move: secure mobile devices in your network

    Sponsored by: Vera

    In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.

  • Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection

    Sponsored by: A10 Networks

    Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.

  • Encryption's Risks, Benefits, and Roles in SSL Attacks

    Sponsored by: Symantec Website Security

    In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.

  • How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences

    Sponsored by: Symantec Website Security

    This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.