Data Encryption Research
-
Managing Android devices in the enterprise
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
-
Cloud computing storage key management
Sponsored by: TechTarget ComputerWeekly.comJagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
Your data on the move: secure mobile devices in your network
Sponsored by: VeraIn this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
-
A Case for IT Security: The Future of New EU Data Protection
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
-
Addressing HIPAA privacy compliance on hospital wireless networks
Sponsored by: AbsoluteIn this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
-
Data Loss Prevention: Decision Time
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: RFP Technology Decisions
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: From Business Problem to Technical Solution
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Kicking off an e-health revolution
Sponsored by: TechTarget ComputerWeekly.comIt has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
-
What's New in Symantec Data Loss Prevention
Sponsored by: Symantec CorporationThis data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
-
Cover Your SaaS!
Sponsored by: BitGlassThis white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
-
Microsoft Office 365: Strengthening Security, Compliance, and Control
Sponsored by: MimecastThis white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
-
A Comprehensive Guide to Encryption Technology Approaches
Sponsored by: VormetricThis resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
-
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
Sponsored by: VormetricThis white paper defines the global legal obligations and financial services laws that require data encryption.
-
Secure Access and Continuity in a Virtualized and BYOD World
Sponsored by: Hewlett Packard EnterpriseThis business whitepaper focuses on the challenges facing midsize businesses who are looking to provide business continuity and minimized downtime. It also highlights the benefits of HP Just Right IT secure access and business continuity solutions.
-
6 Ways to Enhance Security in AWS
Sponsored by: SafeNet, Inc.In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
-
Industry Perspectives: The Impact of HIPAA and HITECH
Sponsored by: Symantec CorporationThis white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
-
Dell Data Protection
Sponsored by: DellEMC and Intel®This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
-
Acronis Backup & Recovery® 11.5 for Workstation
Sponsored by: AcronisThis data sheet highlights the benefits of a backup solution for built for laptops and desktops.
-
A Full-Service Network With Secure, Encrypted Communications
Sponsored by: Cisco Systems, Inc.In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
-
In Control at Layer 2: A Tectonic Shift in Network Security
Sponsored by: SafeNet, Inc.This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
-
Clearswift Government Communications 2.0
Sponsored by: ClearswiftIn this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
-
Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
Sponsored by: Symantec Website Security SolutionsAs a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
-
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
Sponsored by: LumensionThis case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
-
Protecting Your Website With Always On SSL
Sponsored by: Symantec CorporationThis white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.