ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption Research

  • IT in Europe - May 2012

    Sponsored by: SearchSecurity.com

    While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

  • Exploring cloud Security as a Service options

    Sponsored by: SearchSecurity.com

    There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.

  • Mobile Device Security Best Practices for BYOD

    Sponsored by: SearchSecurity.com

    This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.

  • Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences!

    Sponsored by: SearchSecurity.com

    This E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices.

  • Best Practices for Mobile Device Management

    Sponsored by: SearchSecurity.com

    This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.

  • Mobile data protection best practices

    Sponsored by: SearchSecurity.com

    Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.

  • Top Mobile Data Protection Best Practices

    Sponsored by: SearchSecurity.com

    Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.

  • CipherCloud for Office 365 - Encryption Solution Demo

    Sponsored by: CipherCloud

    In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.

  • Next Generation Enterprise WAN DMVPN

    Sponsored by: Cisco Systems, Inc.

    Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.

  • Customers Discuss Oracle Database Security

    Sponsored by: Oracle Corporation

    Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.

  • May Technical Guide on PCI DSS Guidance

    Sponsored by: SearchSecurity.com

    This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.

  • Simplify SSL Certificate Management Across the Enterprise

    Sponsored by: Symantec Corporation

    Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.

  • Oracle Database 11g Release 2 High Availability

    Sponsored by: Oracle Corporation

    This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.

  • Tape Vaulting: What You Need to Know About Tape Backup and Archiving

    Sponsored by: Iron Mountain

    Check out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant.

  • Security in the Cloud Planning Guide

    Sponsored by: Intel

    Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.

  • Killing Data

    Sponsored by: Voltage Security, Inc.

    Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.

  • 10 Tips for Managing Security in the Cloud

    Sponsored by: Dell, Inc. and Intel®

    With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected.

  • Data Deduplication technology: A Guide to Data Deduping and Backup

    Sponsored by: HP Inc

    This expert e-guide makes the case for data deduplication technology and outlines how it works, its advantages, different dedupe misconceptions and how it factors into disaster recovery strategies. Read on to learn more.

  • E-Guide: Minimize enterprise data exposure inside and outside the organization

    Sponsored by: IBM

    This expert e-guide provides data masking best practices and explains how to implement an effective strategy for reducing the risk of data exposure from inside and outside the organization.

  • Implementing Tokenization Is Simpler Than You Think

    Sponsored by: First Data Corporation

    A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.

  • E-Guide: Align Data Protection with Business Importance

    Sponsored by: IBM

    This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more.

  • SQL Server Migration

    Sponsored by: Dell and Microsoft SQL

    This E-Guide explores some of the basic steps to ensure a successful migration, as well as the features you'll want to take advantage of right away and 3 key tips for making the process smoother. Uncover some of the less popular - but no less important - changes to the latest version of SQL Server.

  • Oracle Advanced Security with Oracle Database 11g Release 2

    Sponsored by: Oracle Corporation

    This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.

  • Oracle Database - The best choice for Siebel Applications

    Sponsored by: Oracle Corporation

    This white paper covers the business and technology reasons behind customers' continued choice of Oracle Database for their Siebel Applications deployments.

  • Oracle Database - The best choice for PeopleSoft Applications

    Sponsored by: Oracle Corporation

    This white paper discusses the business and technology reasons behind customers' continued choice of Oracle Database for their PeopleSoft application deployments.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.