ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • OpenText Secure Shell

    Sponsored by: OpenText

    Access this informative resource to explore a comprehensive security solution that protects network traffic between host systems and remote PCs and web browsers by encrypting application traffic across networks. Learn how you can ensure zero disruption to users who remotely access data and applications from web browsers and desktop computers.

  • Critical Factors to Endpoint Security

    Sponsored by: Dell India

    Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.

  • SSL Certificates: The Return of the DSA Algorithm

    Sponsored by: Symantec Corporation

    This white paper explores the shortcoming of the RSA algorithm and how the Digital Signature Algorithm (DSA) developed in 1991 is making a return in a big way to trip up cybercriminals.

  • Device and Data Protection - Part 2

    Sponsored by: Dell, Inc. and Intel®

    Access this webcast to learn about a file level encryption technology that is managed out of a central management console in order to protect data, no matter the endpoint. Find out how this solution compares to others on the market and explore its product portfolio which includes three levels of data protection.

  • Device and Data Protection - Part 1

    Sponsored by: Dell, Inc. and Intel®

    Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.

  • Beginner's Guide to SSL Certificates

    Sponsored by: Symantec

    The key to web security is SSL, and this white paper can help you understand exactly what SSL is and how it works.

  • New Encryption Algorithm Put to the Test

    Sponsored by: Symantec

    This white paper presents the results of several research tests performed on elliptic curve cryptography (ECC), a new and promising SSL/TSL encryption algorithm.

  • The State of Cloud Security: 2015 Survey Results

    Sponsored by: CloudPassage

    Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.

  • Your Quick Reference Guide to Always-On SSL

    Sponsored by: Symantec

    This white paper explains the benefits of always-on SSL and how you can implement it on your sites.

  • Security and Privacy on the Encrypted Network

    Sponsored by: Blue Coat Systems

    Explore this white paper to learn how decryption is a necessary tool in network security and monitoring.

  • Network Encryption and its Impact on Enterprise Security

    Sponsored by: Blue Coat Systems

    In this research report, discover just how complicated SSL/TLS decryption and inspection methodologies have become and learn why you should make encrypted traffic management a near-term priority to address sophisticated SSL cyber threats.

  • Encrypted Traffic Management for Dummies

    Sponsored by: Blue Coat Systems

    In this eBook, learn all about the world of encrypted traffic management, an easy solution to all of these SSL traffic headaches.

  • SSL Traffic Management to Meet Your Needs

    Sponsored by: Blue Coat Systems

    In this infographic, discover a tool that gives you the all the capabilities you need for effective traffic monitoring.

  • Critical Factors in Endpoint Security

    Sponsored by: Dell, Inc. and Intel®

    Endpoints are the new security perimeter, and this means rethinking your endpoint security. This white paper will help you do so.

  • The Power of Self-Encrypting SSD

    Sponsored by: Toshiba

    This video examines a self-encrypting SSD offering that addresses the performance drains of CPU software-based encryption in order to greatly improve storage speed and operability.

  • Stop Attacks Hiding Under the Cover of SSL Encryption

    Sponsored by: Blue Coat Systems

    This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.

  • Security and Privacy on the Encrypted Network

    Sponsored by: Blue Coat Systems

    This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.

  • Network Encryption and its Impact on Enterprise Security

    Sponsored by: Blue Coat Systems

    This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.

  • 6 Requirements for Enterprise Key Management

    Sponsored by: HP Security Voltage

    This white paper walks you through the six requirements for a robust key management system. Explore why traditional key management architectures have fallen short and how to fill the gaps in your strategy.

  • Encrypting data with confidence, across the enterprise and beyond

    Sponsored by: IBM

    This white paper discusses an integrated approach for easily managing the lifecycle of encryption keys. It also explains how organizations can feel more confident about encrypting mission-critical data across the enterprise, in the cloud and beyond.

  • Windows 8.1 Security: New and Improved

    Sponsored by: ESET

    This white paper goes in-depth into the new security features of Windows 8.1.

  • Protect Your Data with Advanced Encryption

    Sponsored by: ESET

    This resource introduces one way you can create unbreakable security for your data.

  • Webinar: Endpoint Data Privacy in The Cloud

    Sponsored by: Druva Software

    Tune into this webinar to discover an endpoint backup tool for data stored in the cloud.

  • Infographic: Data Traffic Security is a Mess

    Sponsored by: Certes Networks

    This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.

  • A Smarter Approach to Network Encryption

    Sponsored by: Certes Networks

    This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.