ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption Research

  • Challenges With Data Protection in the Cloud

    Sponsored by: TechTarget Security

    This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.

  • Essential Enterprise Mobile Security Controls

    Sponsored by: TechTarget Security

    How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.

  • IT in Europe - May 2012

    Sponsored by: TechTarget Security

    While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

  • Exploring cloud Security as a Service options

    Sponsored by: TechTarget Security

    There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.

  • Mobile Device Security Best Practices for BYOD

    Sponsored by: TechTarget Security

    This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.

  • Best Practices for Mobile Device Management

    Sponsored by: TechTarget Security

    This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.

  • Mobile data protection best practices

    Sponsored by: TechTarget Security

    Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

  • Protecting Your Website With Always On SSL

    Sponsored by: Symantec Corporation

    This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.

  • Data Security vs. Performance: Balancing Competing Requirements with New Encryption Capabilities

    Sponsored by: SEPATON

    This e-guide elaborates on new features and benefits of backup and recovery and explains why they are especially critical in IT environments with large volumes of data.

  • Data Security and Privacy Concerns Pushed into the Spotlight

    Sponsored by: GeoTrust, Inc.

    In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.

  • Global Deduplication: How it Works and Who Can Benefit

    Sponsored by: Essextec

    This expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace.

  • Healthcare Network Security with Fewer House Calls: Solution Brief

    Sponsored by: Intel

    By evaluating offerings and finding the right investment, a struggling IT campus-based IT department they were able to install a remote management solution that allowed them to simplify IT and better secure the sensitive patient data residing in their on-campus health center.

  • How Deduplication Fits into Your Data Backup Plan

    Sponsored by: TechTarget Data Backup

    This exclusive E-Book provides insight into the things you must consider about the way dedupe is performed as well as the ways in which it integrates with other data protection processes such as replication, encryption/compression and archiving.

  • TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today

    Sponsored by: Iron Mountain

    In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.

  • Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities

    Sponsored by: GeoTrust, Inc.

    This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.

  • Secure your data – protect your business

    Sponsored by: TechTarget ComputerWeekly.com

    This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.

  • CipherCloud for Office 365 - Encryption Solution Demo

    Sponsored by: CipherCloud

    In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.

  • Next Generation Enterprise WAN DMVPN

    Sponsored by: Cisco Systems, Inc.

    Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.

  • Customers Discuss Oracle Database Security

    Sponsored by: Oracle Corporation

    Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.

  • May Technical Guide on PCI DSS Guidance

    Sponsored by: TechTarget Security

    This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.

  • Simplify SSL Certificate Management Across the Enterprise

    Sponsored by: Symantec Corporation

    Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.

  • Oracle Database 11g Release 2 High Availability

    Sponsored by: Oracle Corporation

    This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.

  • Tape Vaulting: What You Need to Know About Tape Backup and Archiving

    Sponsored by: Iron Mountain

    Check out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant.

  • Security in the Cloud Planning Guide

    Sponsored by: Intel

    Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.

  • Killing Data

    Sponsored by: Voltage Security, Inc.

    Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.