ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption Research

  • IT Project: Storage Architecture ANZ

    Sponsored by: ComputerWeekly.com

    When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • IT Project: Storage Architecture ASEAN

    Sponsored by: ComputerWeekly.com

    When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.

  • Managing Android devices in the enterprise

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

  • Cloud computing storage key management

    Sponsored by: ComputerWeekly.com

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • Building confidence in data security

    Sponsored by: ComputerWeekly.com

    Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.

  • Reconsidering PKI and its Place in your Enterprise Encryption Strategy

    Sponsored by: ComputerWeekly.com

    Organisations need to re-think how to implement security across a range of devices, rather than settling for patchwork variations of PKI and commissioning deployments across the internet of things, this report from Omlis argues.

  • Kicking off an e-health revolution

    Sponsored by: ComputerWeekly.com

    It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.

  • The future of digital forensics

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.

  • Detecting the use of TrueCrypt

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.

  • Your data on the move: secure mobile devices in your network

    Sponsored by: Vera

    In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Addressing HIPAA privacy compliance on hospital wireless networks

    Sponsored by: Absolute

    In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.

  • Data Loss Prevention: Decision Time

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Data Loss Prevention: RFP Technology Decisions

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • Data Loss Prevention: From Business Problem to Technical Solution

    Sponsored by: SearchSecurity.com

    This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.

  • What's New in Symantec Data Loss Prevention

    Sponsored by: Symantec Corporation

    This data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.

  • Cover Your SaaS!

    Sponsored by: BitGlass

    This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.

  • Microsoft Office 365: Strengthening Security, Compliance, and Control

    Sponsored by: Mimecast

    This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.

  • A Comprehensive Guide to Encryption Technology Approaches

    Sponsored by: Vormetric

    This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.

  • The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia

    Sponsored by: Vormetric

    This white paper defines the global legal obligations and financial services laws that require data encryption.

  • Secure Access and Continuity in a Virtualized and BYOD World

    Sponsored by: Hewlett Packard Enterprise

    This business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.

  • 6 Ways to Enhance Security in AWS

    Sponsored by: SafeNet, Inc.

    In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.

  • Industry Perspectives: The Impact of HIPAA and HITECH

    Sponsored by: Symantec Corporation

    This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.