ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Video Surveillance System (VSS) Architecture in a Smart Building

    Sponsored by: Forescout

    Today, many buildings have a hybrid VSS architecture that is quite complex, containing a variety of legacy and new systems, including both analog and IP cameras. The problem is that this architecture presents many vulnerabilities. In this infographic, explore some common vulnerabilities found in many VSS commonly used in large organizations.

  • Protecting Data in The Cloud 2019 Thales Cloud Security Study

    Sponsored by: Thales

    During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.

  • Organizations are failing to protect sensitive data in the cloud

    Sponsored by: Thales

    This infographic highlights some of the key takeaways from the 2019 Thales Cloud Security Study. Continue reading to uncover research findings as they relate to the amount of data stored, the kind of data & the prevalence of encryption or other security measures.

  • The Changing Face of Data Security in Europe

    Sponsored by: Thales

    Take a glimpse at the results from the 2019 Thales Data Threat Report – European Edition. This infographic shares some key statistics from the research findings, including the use of sensitive data, multi-cloud environments & the effects of GDPR and other data privacy laws.

  • Safeguard your Private Keys with AppViewX

    Sponsored by: AppViewX

    When a private key is uncovered by malicious actors, valuable data is compromised through the impersonation of an enterprise’s servers. So, how should enterprises properly safeguard their private keys? Learn how your enterprise can essentially replace the vulnerable private key inventories.

  • The CISO’s Handbook for Certificate Management

    Sponsored by: AppViewX

    Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.

  • Vormetric Data Security Platform Architecture

    Sponsored by: Thales

    As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.

  • Certificate Lifecycle Management and Automation

    Sponsored by: AppViewX

    Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.

  • The State of PKI Security and Management: Survey Report

    Sponsored by: AppViewX

    A 2019 study has revealed that businesses’ PKI setups have a long way to go before they’re considered truly secure and effective. In this whitepaper, find the results of the study that reveal the state of PKI in the industry today – including some surprising statistics.

  • When Should you Invest in a Certificate Management Tool?

    Sponsored by: AppViewX

    Digital certificates play a major role in establishing trust and encrypting sensitive information online. But, certificates require constant maintenance like periodic renewals. That’s why many invest in a certificate management tool. Determine if you should invest in a certificate management tool with a checklist of 11 questions.

  • Overcoming the Top 3 Bottlenecks in SSL/TLS Certificate Management

    Sponsored by: AppViewX

    In this white paper, learn how to overcome the top 3 bottlenecks in SSL/TLS certificate management: Lack of discovery, manual management, inadequate reporting.

  • 5 Business Impacts of Certificate Mismanagement

    Sponsored by: AppViewX

    In this white paper, discover a checklist that will help you evaluate if your certificate management strategy has room for improvement. You will also find 5 reasons why certificate outages can affect your business

  • SSH Key Management in the Cloud

    Sponsored by: AppViewX

    Enterprises want to keep their systems safe using SSH keys, but by failing to keep those keys secure, they are ultimately more at-risk. Without protecting their SSH keys, enterprises are as vulnerable as ever. Find out how AppViewX can help you automate SSH key management and keep them secure in the cloud and on-prem.

  • Securing Cloud environments: Five Data Encryption best practices to help reduce your risk

    Sponsored by: IBM

    It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.

  • Securing Cloud environments: Five Data Encryption best practices to help reduce your risk

    Sponsored by: IBM

    It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.

  • Forrester Encryption Podcast: You Can Never Have Too Much Encryption

    Sponsored by: IBM

    A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.

  • Forrester Encryption Podcast: You Can Never Have Too Much Encryption

    Sponsored by: IBM

    A holistic data protection strategy that includes encryption can reduce data breaches and privacy concerns. Stephanie Balaouras, Research Director at Forrester Research discusses the importance of a data encryption, how to get started on your data encryption strategy; why the cloud is a major use case for encryption, and more.

  • Forrester Report: Use advanced encryption for data security

    Sponsored by: IBM

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.

  • Forrester Report: Use advanced encryption for data security

    Sponsored by: IBM

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.

  • From readiness to transformation: How to address privacy regulations and keep your data safe

    Sponsored by: IBM

    This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes

  • From readiness to transformation: How to address privacy regulations and keep your data safe

    Sponsored by: IBM

    This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes

  • Critical Watch Report: 2019

    Sponsored by: Alert Logic

    SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.

  • Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne

    Sponsored by: HackerOne

    Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.

  • GandCrab Ransomware Analysis Report

    Sponsored by: Versa Networks

    A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.

  • Why Should I Care About SSL/TLS Decryption?

    Sponsored by: Gigamon

    On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.