ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption Standard Research

  • Data-at-rest Encryption: An Overview

    Sponsored by: DataCore Software Corporation

    Data-at-rest encryption is a painless, cost-effective option that ensures data is secured as it gets stored on disks—which are often overlooked. Access this white paper to learn about the advantages of this approach and how encrypting data at the SDS layer eliminates hardware dependencies and drives down costs.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • Reconsidering PKI and its Place in your Enterprise Encryption Strategy

    Sponsored by: ComputerWeekly.com

    Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.

  • Jericho Forum: Data Protection

    Sponsored by: ComputerWeekly.com

    Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • In Control at Layer 2: A Tectonic Shift in Network Security

    Sponsored by: SafeNet, Inc.

    This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.

  • Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths

    Sponsored by: Symantec Website Security Solutions

    As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.

  • Spectra Libraries with BlueScale Encryption

    Sponsored by: Spectra Logic Corporation

    Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.

  • Delivering applications anywhere, anytime with maximum security and control over data

    Sponsored by: Citrix

    Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp

  • The Massachusetts Data Protection Law

    Sponsored by: SearchSecurity.com & SearchCompliance.com

    Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

  • Laws, regulations and compliance: Top tips for keeping your data under your control

    Sponsored by: Sophos

    This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.