Encryption Standards Research
-
Achieving Security With Cloud PC Backup
Sponsored by: Iron MountainThis document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
-
KineticD Security
Sponsored by: KineticDThe purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
-
Identity Finder Enterprise Suite 4.5
Sponsored by: Identity Finder, LLCIdentity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
-
Data Protection: Solutions for Privacy, Disclosure and Encryption
Sponsored by: Trend Micro, Inc.Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
-
E-Book: New Rules for HIPAA
Sponsored by: TechTarget SecurityOrganizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
-
Advanced Encryption Standard New Instructions
Sponsored by: Dell, Inc. and Intel®Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
-
E-Book: Data loss prevention strategies, practices and tools
Sponsored by: TechTarget SecurityData loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.
-
Information Security Magazine - September 2009: Readers’ Choice Awards
Sponsored by: Information Security MagazineThis issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
-
Essential Guide to PCI DSS
Sponsored by: Information Security MagazineThis E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
-
Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
Sponsored by: CDW CorporationTaking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
-
InterScan Messaging Hosted Security (IMHS) Trial
Sponsored by: Trend Micro, Inc.Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
-
eBook: Encryption 360 Degrees
Sponsored by: TechTargetData breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today.
-
Strengthening Enterprise Security through Notebook Encryption
Sponsored by: Intel CorporationImplementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.
-
Enabling Developer Access to Production Data
Sponsored by: Voltage Security, Inc.With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
-
Blackberry Enterprise Solution: Security Technical Overview
Sponsored by: BlackBerryThis document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
-
The Virtual Office Checklist
Sponsored by: Cisco Systems, Inc.The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
-
Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
Sponsored by: Aladdin Knowledge SystemsAlthough mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
-
Advantages of Amanda over Proprietary Backup
Sponsored by: Zmanda Inc.This white paper discusses how Amanda compares to other backup products. It will help you understand some key Amanda differences and how to evaluate and transition to Amanda.
-
Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution
Sponsored by: Citrix Online - GotoMyPCJohns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely.
-
Citrix GoToMyPCCorporate - Security White Paper
Sponsored by: Citrix Online - GotoMyPCIn this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
-
Entrust Entelligence™ Messaging Server
Sponsored by: Entrust, Inc.The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
-
Building Blocks of Transparent Web Security: Server-Gated Cryptography
Sponsored by: VeriSign, IncRead a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.
-
Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
Sponsored by: Global KnowledgeThe Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
-
Archive Security in a Tiered Storage Environment
Sponsored by: PlasmonFind out how to identify potential security risks and review various storage technologies and business operations that balance the security requirements of long term archiving with overall cost and operation of the archive.
-
How to Offer the Strongest SSL Encryption for your Company
Sponsored by: VeriSign, IncMany IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.