Research Library

Powered by

Encryption Standards Research

  • Dynamic Multipoint Virtual Private Network (DMVPN)

    Sponsored by: Global Knowledge

    Access this white paper to learn different approaches to network design with DMVPN.

  • Best Practices for FTP in the Enterprise

    Sponsored by: IBM

    In this expert guide, you'll find the information you need to decide whether or not it's time to move on from FTP. Additionally, this guide offers tips for achieving best practice if you do stick with FTP.

  • Avoid Risks by Keeping Secure FTP Policies Straightforward

    Sponsored by: IBM

    In this e-guide, discover why most users fail to securely transfer files and what you can do to stop their risky behavior.

  • The Value of Encryption When Deploying Cloud File-Sharing Services

    Sponsored by: Signiant, Inc.

    In this expert e-guide, discover tips for efficiently rolling out your cloud file-sharing service and for ensuring that you're using smart encryption practices while doing so.

  • The Keys to BYOD Security Success

    Sponsored by: Dell, Inc. and Intel®

    In this expert guide, you'll learn how to plan for BYOD security and discover tips for minimizing risk by enforcing solid policies with encryption.

  • Internet of Things Security Study: Home Security Systems Report

    Sponsored by: Hewlett-Packard Company

    This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.

  • Network Security 3 Phase Framework

    Sponsored by: Fortinet, Inc.

    This white paper outlines a simple three phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.

  • Secure Federal Data and Support Your Mobile Workforce

    Sponsored by: Absolute Software

    This brief white paper covers the layered approach taken by progressive IT security leaders to ensure that you are not a statistic. Read on and discover imperative measures being implemented to mitigate the 49% of Federal employees who use their personal devices for work-related tasks.

  • Building a Layered Defense Against Data Breaches

    Sponsored by: Absolute Software

    This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.

  • Controlling Keys - How to Prevent Data Leaks

    Sponsored by: IntraLinks, Inc

    This white paper explores an alternative keys strategy that only the consumer can directly acess over a protected communications channel. View now to learn how to control access to encrypting and decrypting cloud stored files and how you can prevent data leaks.

  • Dell Data Protection Infographic

    Sponsored by: Dell, Inc. and Intel®

    This infographic details how Dell technology allows you keep systems and data protected, even for those systems that are missing. Learn how it continuously monitors the security state of all systems and how if a system detects an attempted attack, encryption keys can be automatically destroyed so your information can't be stolen.

  • Optimal care for patients and their data

    Sponsored by: Dell, Inc. and Intel®

    Access this case study to learn how FastMed Urgent Care combined leading encryption technology to encrypt all endpoint devices with file-level encryption in order to protect patient data with the highest level of encryption.

  • Protecting Healthcare Data in a Mobile World

    Sponsored by: Absolute Software

    In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.

  • Mobile Device Management Policy Best Practices

    Sponsored by: IBM

    In this white paper, you'll discover the 10 best practices for developing a successful mobile device management plan.

  • HIPAA Violations Incur Multi-Million Dollar Penalties

    Sponsored by: Absolute Software

    Follow the evolution of HIPAA-HITECH regulations over the past few years, learn why compliance is more important than ever before, and gain knowledge on how to avoid violations inside this resource.

  • Flexible, secure solutions to keep unauthorized users out of your data

    Sponsored by: Dell, Inc. and Intel®

    Inside this white paper, find out how to go beyond passwords with advanced authentication measures in order to secure data at every endpoint in your organization. Discover security tools that are designed to provide an end-to-end coverage and support for advanced hardware authentication.

  • Secure network traffic between hosts systems and remote PCs/web browsers

    Sponsored by: OpenText

    Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.

  • Critical Factors to Endpoint Security

    Sponsored by: Dell, Inc. & Intel®

    Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.

  • Device and Data Protection - Part 2

    Sponsored by: Dell, Inc. and Intel®

    Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.

  • Device and Data Protection - Part 1

    Sponsored by: Dell, Inc. and Intel®

    Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.

  • Beginner's Guide to SSL Certificates

    Sponsored by: Symantec

    The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.

  • New Encryption Algorithm Put to the Test

    Sponsored by: Symantec

    This white paper presents the results of several research tests performed on elliptic curve cryptography (ECC), a new and promising SSL/TSL encryption algorithm.

  • The State of Cloud Security: 2015 Survey Results

    Sponsored by: CloudPassage

    Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.

  • Your Quick Reference Guide to Always-On SSL

    Sponsored by: Symantec

    This white paper explains the benefits of always-on SSL and how you can implement it on your sites.

  • Security and Privacy on the Encrypted Network

    Sponsored by: Blue Coat Systems

    Explore this white paper to learn how decryption is a necessary tool in network security and monitoring.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.