ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • CW ANZ - October 2017:┬áRise to the big data challenge

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.

  • Encrypting Data at Rest

    Sponsored by: Amazon Web Services

    This white paper provides an overview of different methods for encrypting your data at rest. Uncover 3 approaches on how encryption keys are managed and where they are used, so you can decide which approach is best for you.

  • Encryption Buyer's Guide: 5 Vendor Reviews

    Sponsored by: TechTarget

    Read Encryption Buyer's Guide: 5 Vendor Reviews to find out which encryption strategy is right for you. Security expert, Karen Scarfone reviews 5 encryption vendors to help with your decision. See how these tools compare to fit your needs.

  • When Cryptors Attack: Timeline of a Ransomware Infection

    Sponsored by: Kaspersky Lab

    The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.

  • Encryption Hiding Malware in Half of Cyber Attacks

    Sponsored by: A10 Networks

    A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.

  • Customer Success Story: National Insurance Company

    Sponsored by: J2 Cloud Services

    Explore this case study to reveal how a large Fortune 500 insurance company overcame the issue of being at risk for regulatory noncompliance without a secure platform for faxing documents.

  • Encrypted Traffic Analytics

    Sponsored by: Cisco Systems, Inc.

    Access this white paper to learn about the current state of encryption technology, predictions, and how you can leverage it to turn your network into an advanced security sensor.

  • EU GDPR Compliance Puts Focus on Data Tracking, Encryption

    Sponsored by: Ivanti

    In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.

  • SaaS-based Billing Provider with Encryption Requirements Turns to Flash

    Sponsored by: Kaminario

    Download this study to see a snapshot view of how one organization overcame their encryption and capacity conundrums by implementing an all-flash array for their production databases, executing a 10X performance improvement, with built-in encryption to handle data-at-rest requirements.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • 3 Ways to Help Stop Data Leakage in Your Organization

    Sponsored by: Lepide Software

    It seems that almost every month there's another high-profile security breach in which sensitive data is leaked. In almost every case, the end result of these data leaks is damage to the reputation and/or bottom line of the company's involved. In this guide, learn 3 ways you can help prevent data leaks within your organization.

  • HyperConvergence or Hyper-Security? What's Right for Your Enterprise?

    Sponsored by: HyTrust

    To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.

  • Making Data Encryption and Rekeying Easier

    Sponsored by: HyTrust

    Data encryption is fundamental to successful cybersecurity in modern enterprises. But in a recent study, companies cited budget, performance concerns, and lack of deployment knowledge as the top 3 barriers to implementing an encryption tool. Inside, learn sweat-free secrets to performing critical data security functions.

  • Accelerating Mobile App Adoption with Frictionless Security

    Sponsored by: Blue Cedar

    In this white paper, learn about a new kind of mobile security that injects security code directly into existing applications to encrypt data, provide authentication protocols, and more.

  • The Challenges of Managing SSL/TLS Encrypted Traffic

    Sponsored by: Gigamon

    Just 31% of companies say they have a plan in place to protect both their security sockets layer (SSL) and transport layer security (TLS) traffic in their network. In this SC Media survey, learn why it's so imperative to have a SSL/TLS plan.

  • Your Guide to Uncovering Hidden Threats within Encrypted Traffic

    Sponsored by: A10 Networks

    In this Ponemon Study discover how the malicious use of SSL encryption is on the rise, and what your organization can do about mitigating its risk to your business.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • SAM, ISO 19770, and SAP License Management Challenges Explained

    Sponsored by: Snow Software

    This white paper examines the importance of addressing SAP licensing within your SAM practices and offers insight into how to do it successfully. View now to learn more.

  • Understanding your Full Public Key Infrastructure (PKI) Potential

    Sponsored by: DigiCert

    This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security.

  • Enhance Your Endpoint Security Protection

    Sponsored by: TrendMicro

    Learn how to improve your enterprise's endpoint security by addressing network access control (NAC), data loss prevention (DLP), and other tools and techniques.

  • Make Ransomware Attacks Less Dangerous

    Sponsored by: Check Point Software Technologies Ltd.

    It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.

  • Moving Beyond Ad Hoc Mobile Security

    Sponsored by: SearchSecurity.com

    Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    Sponsored by: SearchSecurity.com

    How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.

  • Prevent unauthorized database access with TDE

    Sponsored by: Oracle Corporation

    This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.

  • Can A Subscription Ease SSL Certificate Management?

    Sponsored by: Symantec Website Security

    This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.