ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Are you fully secure? Or are you still using weak authentication methods?

    Sponsored by: RSA Softcat

    This infographic shows you the top 5 ways organizations are using SecurID Access to improve secure sign-ons.

  • How to Secure Your IAM System

    Sponsored by: Radiant Logic, Inc.

    Discover how to strengthen the security of your IAM system by encrypting data at rest, adding multi-factor authentication, and protecting key accounts.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • 451 Research: Vormetric Enters Encryption Gateway Fray with Latest Extension to Its Platform Strategy

    Sponsored by: Vormetric

    This 451 Research report offers a current analysis of Vormetric's recent product releases, including the solutions offering tokenization with dynamic data masking, Teradata support, and cloud encryption gateway. The report also offers analysis of the Vormetric Data Security Platform strategy.

  • Bloor: For the EU's New Data Protection Regulation, Encryption Should Be the Default

    Sponsored by: Vormetric

    This report by Bloor Research discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. Discover how you can make it part of a comprehensive, consistent data security strategy.

  • Aberdeen Group: Selecting Encryption for "Data at Rest" in Back-End Systems.

    Sponsored by: Vormetric

    In this paper, the Aberdeen Group explores why full-disk encryption has become an attractive solution for the risks to data in use at the endpoints—and why file-level encryption is a better fit for the risks associated with data at rest in back-end systems.

  • 7 Modern Encryption Problems

    Sponsored by: Blue Coat Systems

    This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.

  • A Technology Brief on SSL/TLS Traffic

    Sponsored by: Blue Coat Systems

    In this resource, get a detailed breakdown of SSL/TLS traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.

  • Eliminating Constraints to SSL Implementation

    Sponsored by: Blue Coat Systems

    Find comprehensive information on SSL, how it works, who uses it, and what security challenges it faces in a modern network. Uncover ways to increase its performance, scalability, and root out malicious activity using it as a cover.

  • Implementing Data Privacy Requirements For Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how to create visibility to encrypted traffic, reducing the risk of malicious activity that goes unnoticed. Also find out how to achieve simple, effective policy enforcement.

  • Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover how you can utilize encrypted traffic management solutions while granting complete visibility and control of SSL communications and the potential threats therein without the need to re-architect your security infrastructure, nor impact network performance.

  • Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.

  • Five-Step Guide to Implementing Encrypted Traffic Management (ETM)

    Sponsored by: Blue Coat Systems

    Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.

  • Busting Myths About Encrypted Communications

    Sponsored by: Blue Coat Systems

    We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.

  • 5 Foundations For Managing Encrypted Traffic

    Sponsored by: Blue Coat Systems

    Discover the top 5 things that your enterprise can leverage when managing encrypted traffic. Uncover hidden benefits for sites that use encryption with SSL/TLS, how to expose unseen malware, and more.

  • SSL Encrypted Traffic Management

    Sponsored by: Blue Coat Systems

    Discover the importance of SSL encryption to the modern enterprise and how it can create a blind spot in your security policy. Learn how encrypted traffic is growing exponentially and how it is exploited, the many challenges organizations face when trying to mitigate the risk, and more.

  • Unlocking Business Success: The Five Pillars of User Risk Mitigation

    Sponsored by: Forcepoint

    Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.

  • Encryption as an IT Service

    Sponsored by: Gemalto

    To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by: SearchSecurity.com

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Comparison Guide Email Encryption

    Sponsored by: ZixCorp

    Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.

  • Security Delivery Platform

    Sponsored by: Gigamon

    The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.

  • Mobile Video Optimisation

    Sponsored by: Ipoque

    To win in mobile, operators know they must win in video delivery. Video usage is now more common on mobile devices than PCs. Access this eBook to discover how to optimize mobile video.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • Simple, Secure Encryption in the Era of Big Data

    Sponsored by: Gemalto

    Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.