ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Securing the enterprise application layer: Expert Guidelines

    Sponsored by: SearchSecurity.com

    If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.

  • Compliance and Cloud Security eBook

    Sponsored by: SearchSecurity.com

    SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.

  • Building the Right Mobile Security Toolkit

    Sponsored by: SearchSecurity.com

    Due to the rapid proliferation of mobile security threats, it’s critical that organizations put a new emphasis on their mobile device security strategies. This expert tip explores today’s threats to mobile devices and offers suggestions for building the right mobile security toolkit to prevent them from doing harm.

  • Presentation Download: Data Protection Strategies: Data Encryption

    Sponsored by: CDW Healthcare

    If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.

  • Eguide: Avoiding a patient data breach – and how to handle one if it does occur

    Sponsored by: CDW Healthcare

    In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur.

  • The Complete Guide to Backup and Recovery for the SMB

    Sponsored by: Nexsan

    Small and mid-sized businesses are a market that has been underserved by data protection software, appliances and online backup services until the last few years.Yet, these organizations have the same needs as large enterprises to protect their data. Full-time, dedicated IT resources are often beyond their means.

  • Reducing PCI DSS Scope with the First Data® TransArmor® Solution

    Sponsored by: First Data Corporation

    Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.

  • Simplifying management and lowering total cost of ownership for SSL certificates

    Sponsored by: GlobalSign

    This white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL.

  • IDC Technology Spotlight: Leveraging the Benefits of Cloud Computing with Specialized Security

    Sponsored by: Trend Micro

    There is shift in threat landscape with the emergence of cloud; while offering significant benefits, cloud computing expands the playing field for cybercriminals and increase security demands, IDC Spotlight explores the technology of cloud based security

  • Magic Quadrant for Mobile Data Protection

    Sponsored by: Sophos

    This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  • Data Privacy e-Book

    Sponsored by: SearchSecurity.co.UK

    SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.

  • Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud

    Sponsored by: Intel

    Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.

  • Solution Brief: SAP and Blue Coat

    Sponsored by: BlueCoat

    Blue Coat’s WAN Optimization technology is especially well suited to improving response times and reducing bandwidth consumption for SAP users, by prioritizing SAP applications and guaranteeing performance over non-critical or recreational traffic.

  • Cloud Security: Built from the Ground Up

    Sponsored by: Intel

    Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.

  • Boost Cloud Security with Intel® AES-NI

    Sponsored by: Intel

    Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.

  • How Can You Prepare for the Consumerization of IT

    Sponsored by: DynTek & McAfee

    The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.

  • 2010 Annual Study: U.S. Enterprise Encryption Trends

    Sponsored by: Symantec Corporation

    This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    Sponsored by: ESET

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • E-Book: Data Protection Plans for Complying with Privacy Laws

    Sponsored by: SearchSecurity.com & SearchCompliance.com

    This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!

  • PCI DSS: Next-Generation Data Security, Storage and Integrity

    Sponsored by: SearchSecurity.com

    SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.

  • Cloud-Stored Offsite Database Backups

    Sponsored by: Oracle Corporation

    Cloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.

  • Achieving Security With Cloud PC Backup

    Sponsored by: Iron Mountain

    This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.

  • KineticD Security

    Sponsored by: KineticD

    The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • Data Protection: Solutions for Privacy, Disclosure and Encryption

    Sponsored by: Trend Micro, Inc.

    Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.