ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Security Delivery Platform

    Sponsored by: Gigamon

    The threat landscape is ever changing, becoming more complex and harder to combat. Last year alone, 317 million new pieces of malware were created. This infographic shows you stats on the growing threat landscape and tools you need to monitor traffic and gain greater visibility across your networks.

  • Mobile Video Optimisation

    Sponsored by: Ipoque

    To win in mobile, operators know they must win in video delivery. Video usage is now more common on mobile devices than PCs. Access this eBook to discover how to optimize mobile video.

  • Complete Data Protection (Advanced) - Data Sheet

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • Future Risks Be Prepared

    Sponsored by: Kaspersky Lab

    An increasingly sophisticated threat landscape calls for a multi-layered security approach, in which a combination of integrated technologies provides comprehensive detection and protection against known, unknown and advanced malware and other threats. This report is designed to help you to be better prepared to fight APTs.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • Gemalto SafeNet Keysecure for MongoDB Encryption Key Management for MongoDB Native Encryption

    Sponsored by: Gemalto

    Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.

  • Gemalto SafeNet KeySecure

    Sponsored by: Gemalto

    This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.

  • Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform

    Sponsored by: Gemalto

    With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.

  • A Step-By-Step Guide to Finding the Right Safenet Data Protection Solution for Your Organization

    Sponsored by: Gemalto

    Deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it is data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.

  • Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides

    Sponsored by: Gemalto

    Encryption is the key to unsharing your sensitive data. Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest. Identify where your sensitive data lives to better understand your IT environment.

  • Application Awareness: The Critical Enabler in Virtualized Networks

    Sponsored by: Ipoque

    Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.

  • Everything You Need to Know About Crypto Management

    Sponsored by: Gemalto

    Build a Crypto Foundation - a centralized approach to secure various types of data in various types of environments. Learn how to better manage your disparate islands of encrypted data to enable greater security enforcement and overall better efficiency.

  • Staying out of the next Data Breach Headline

    Sponsored by: Intel Security

    Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.

  • Endpoint Encryption Keeps Your Data Safe

    Sponsored by: Intel Security

    Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.

  • It's Time to Re-evaluate Your Email Encryption Solution

    Sponsored by: ZixCorp

    Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.

  • The Risks of Email and the Rewards of Innovative Encryption

    Sponsored by: ZixCorp

    This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.

  • Bolster email security in Office 365 deployments

    Sponsored by: ZixCorp

    Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. Learn why email encryption capabilities should not be overlooked in those plans.

  • Case Study: Enable Care Providers While Protecting Patient Data

    Sponsored by: Digital Guardian

    Follow St. Charles Health System's path from risk assessment to remediation of their problems using a data loss prevention technique to monitor their entire network to ensure no important information was being mishandled.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    Sponsored by: SearchSecurity.com

    Networks lacking proper network segmentation allow attackers to easily move around the network, turning a minor problem into a major disaster for security managers. In this issue of Information Security, learn about segmentation strategies that can improve your network security infrastructure.

  • Under Siege: The CyberSecurity Threat

    Sponsored by: Black Duck Software

    This white paper helps you find out before you start development whether your open source code has known vulnerabilities. Access now and immediately find out when new vulnerabilities surface in your code and find out how to fix them.

  • Meeting PCI DSS v3.1 Merchant Requirements with Watchguard UTM and Wireless Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper clearly outlines how firewall deployment impacts PCI DSS standards for a PCI DSS merchant. Access now for tables that include descriptions of PCI DSS standards and how you can achieve these requirements.

  • Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To

    Sponsored by: Sempre Technologies Ltd

    This white paper highlights security features in data deduplication, and why it matters to you. Access this resource now and learn about encryption capabilities that protect data being replicated from one system to another, while preserving deduplication bandwidth.

  • Protecting your Endpoints from Cyber-Crime

    Sponsored by: Dell, Inc. and Intel®

    This white paper discusses the increasingly sophisticated nature of today's modern threatscape. Discover secure, trusted strategies for significantly reducing the potential impacts of a threat, while keeping users productive and secure.

  • Attacks through HTTPS can be a vulnerability for enterprises

    Sponsored by: Blue Coat Systems

    This white paper helps you identify hidden threats to your business and what sort of encryption your network might need.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.