Data Encryption Research
-
Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
Sponsored by: Information Security MagazineCheck out this eBook and get expert advice that can help your company successfully improve its threat management posture.
-
Strengthening Enterprise Security through Notebook Encryption
Sponsored by: Intel CorporationImplementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.
-
Faster Application Development via Improved Database Change Management
Sponsored by: Embarcadero Technologies, Inc.Embarcadero® Change Manager puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team.
-
7 Requirements of Data Loss Prevention
Sponsored by: Symantec CorporationThis report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
-
MegaCryption v6.2
Sponsored by: Advanced Software Products Group, Inc. (ASPG, Inc.)ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux.
-
SQL Server 2008: What to Expect
Sponsored by: Global KnowledgeMicrosoft SQL Server 2008 has many great new features that will allow you to develop higher performing, more scalable next-generation applications using more than just relational data.
-
Efficient SAN Based Tape Encryption with Curtis Preston
Sponsored by: Cisco Systems, Inc.Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
-
eBook: Software as a Service: What You Should Consider When Moving to SaaS
Sponsored by: TechTarget SecurityCheck out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
-
Expert eBook: Encryption: Properly Securing Your Valuable Data
Sponsored by: Information Security MagazineCheck out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
-
eGuide: Expert Tips for Deploying Secure Messaging Technologies
Sponsored by: TechTarget SecurityThis eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
-
Ensure Data Protection with Sun StorageTek T10000B Tape Drives
Sponsored by: Sun StorageTekLearn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
-
Wireless Networking: Five Questions to Start With
Sponsored by: Cisco Systems, Inc.This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
-
Stopping data leakage: Exploiting your existing security investment
Sponsored by: SophosThis paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
-
Defining Your Corporate Mobile Policies
Sponsored by: TechTarget SecurityIt's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
-
TrueCrypt
Sponsored by: TrueCrypt FoundationFree open-source disk encryption software for Windows XP/2000/2003 and Linux.
-
Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
Sponsored by: VeriSign, IncThe drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.