Research Library

Powered by

Encryption Standards Research

  • Secure Managed File Transfer: Ultimate Buyer's Guide

    Sponsored by: HelpSystems

    Files contain a multitude of sensitive information and therefore data transfers of these files need to be protected. Take a look at this buyer's guide to learn how to effectively secure file transfers by utilizing a managed file transfer (MFT) product.

  • Mitigating the SSL/TLS Cybersecurity Threat

    Sponsored by: Radware

    75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.

  • Operationalize Security to Secure your Data Perimeter

    Sponsored by: IBM

    According to this Forrester report, 46% of organizations encrypt little to none of their data. Take a look at this report to gain insight into how organizations are attempting to operationalize security in order to protect their data.

  • Mitigating the SSL/TLS Cybersecurity Threat

    Sponsored by: Radware

    75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.

  • Certificate Management: Policy & Automation

    Sponsored by: Entrust, Inc.

    PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. This white paper offers best practices for PKI certificate management policy and how organizations can simplify and streamline their implementation process.

  • Public Key Infrastructure (PKI) Buyer's Guide

    Sponsored by: Entrust, Inc.

    Implementing cost-effective security strategies that meet operational needs of end-users while complying with regulatory requirements is challenging. This resource assists organizations in the selection of the best PKI strategy to meet business and security needs.

  • Filling the Gaps in Office 365

    Sponsored by: Proofpoint, Inc.

    This white paper provides information from an Osterman Research survey regarding users' experience with Office 365 security.

  • Closing the Cloud Security Gap

    Sponsored by: West UC

    According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.

  • How to deploy cloud storage without compromising on security

    Sponsored by: Nasuni

    In this white paper learn how you can remove these challenges by adopting this enterprise file system, which provides a security model that combines strong encryption and local authentication with the native capabilities of top-tier cloud storage providers.

  • Effective Isolation and Workload Security in the Multi-Tenant Cloud

    Sponsored by: HyTrust

    A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.

  • Security Solutions for Public Sector Virtual Infrastructure

    Sponsored by: HyTrust

    Explore this product overview to evaluate if this cloud security strategy, which secures critical environments in the cloud, is right for your organization's needs.

  • Equifax Breach: Lessons Learned for your Organization

    Sponsored by: Digital Shadows

    The Equifax data breach potentially affected 143 million individuals in the US, Canada and the UK. Inside, gain insight into the impacts of the Equifax Breach, 6 lessons learned from the breach, and how your enterprise can mitigate the risks of falling victim to such a devastating data breach.

  • BitLocker - A Strong First Step in Data Security

    Sponsored by: WinMagic

    According to Crowd Research Partners' BYOD and Mobile Security Spotlight Report, 43% of respondents say device encryption is currently a part of their mobile device management policy. Learn how you can manage BitLocker from a single security window to protect data residing across desktops, mobile devices, and more.

  • CloudVM

    Sponsored by: WinMagic

    Don't defer the responsibility of protecting your enterprise – take responsibility for protecting your data and workloads in the cloud. Take a look at this technology overview to see if SecureDoc CloudVM is the right approach for your enterprise's cloud data protection and encryption needs.

  • Fintech & the digital customer experience

    Sponsored by:

    In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.

  • Managing BitLocker in the Enterprise with SecureDoc

    Sponsored by: WinMagic

    Microsoft offers built-in encryption software known as BitLocker, and it is designed to protect data. But how do you simplify BitLocker management? Explore this technology brief to discover if the combination of SecureDoc and BitLocker is right for your encryption and data protection needs.

  • Multi-factor Authentication for dummies

    Sponsored by: iovation, Inc.

    The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.

  • The Race to Readiness

    Sponsored by: Citrix

    According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.

  • CW ANZ - October 2017: Rise to the big data challenge

    Sponsored by:

    In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.

  • Encryption Buyer's Guide: 5 Vendor Reviews

    Sponsored by: TechTarget

    Discover data protection measures your organization can take to lessen the risks of being attacked by ransomware by utilizing your data protection guide: Two Quick Data Protection Steps for Ransomware. Take our survey to gain access to this guide as well as Encryption Buyers Guide: 5 Vendor Reviews.

  • When Cryptors Attack: Timeline of a Ransomware Infection

    Sponsored by: Kaspersky Lab

    The average amount of damage to SMBs caused by one cryptomalware attack is $99,000, according to a survey from Kaspersky Lab and B2B International. Take a closer look at this white paper to learn about cryptomalware attacks and how to prevent your company from being targeted with cryptomalware.

  • Cybersecurity Myths Debunked

    Sponsored by: HelpSystems

    What do security experts Michael Bruemmer, Kevin Beaver, Troy Hunt and 3 others have to say about common IT security myths? Learn the truth about 6 misconceptions now.

  • Encryption Hiding Malware in Half of Cyber Attacks

    Sponsored by: A10 Networks

    A Ponemon study has revealed, malware in nearly half of cyberattacks in the past 12 months has been sneaked into organizations under the cover of encryption. Explore in more detail this expert e-guide and uncover statistics regarding encryption attacks.

  • Understanding your Full Public Key Infrastructure (PKI) Potential

    Sponsored by: DigiCert

    This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security.

  • EU GDPR Compliance Puts Focus on Data Tracking, Encryption

    Sponsored by: Ivanti

    In this e-guide, experts explain why data tracking, encryption and other measures are crucial for GDPR compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.