ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Information security trends

    Sponsored by: ComputerWeekly.com

    This report from CompTIA, based on original research, assesses the current trends in information security.

  • Mobile: The Technology Game-Changer in 2013

    Sponsored by: SearchSecurity.com

    TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.

  • How SSL-Encrypted Web Connections are Intercepted

    Sponsored by: SearchSecurity.com

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

  • BYOPC Strategy: Policies and Problem Solving

    Sponsored by: SearchSecurity.com

    Creating a bring your own PC (BYOPC) policy before implementation is crucial to the success of the initiative. In this E-Guide from SearchConsumerization.com, get help creating a policy that fulfills your employees' and your organizations' needs alike.

  • IT Security Purchasing Intentions 2013

    Sponsored by: ComputerWeekly.com

    This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

  • De-risking IT Lifecycle Management

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.

  • Enterprise Mobile Device Security Best Practices

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchConsumerization.com explores the top four best practices for keeping your corporate information safe in case a mobile device is lost or stolen.

  • IT Handbook : Smartphones & Tablets in the Enterprise

    Sponsored by: SearchSecurity.com

    This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization.

  • Mobile Device Security Best Practices for BYOD

    Sponsored by: SearchSecurity.com

    This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.

  • How Consumerization Affects Security and Compliance

    Sponsored by: SearchSecurity.com

    The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.

  • Applications and best practices to keep your mobile devices secure

    Sponsored by: SearchSecurity.com

    Uncover best practices for keeping your mobile devices and applications secure.

  • Securing Corporate Data in the Age of Mobile Computing

    Sponsored by: SearchSecurity.com

    This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure.

  • Hot Tips for Securing Your Wireless Network

    Sponsored by: Sophos

    Everyone from the home user to the corporate enterprise needs to secure their Wi-Fi network. This white paper offers 11 tips for securing your Wi-Fi network, including encryption, password management, and more.

  • Mobile Health Handbook: Device Security

    Sponsored by: SearchHealthIT.com

    Finding the balance between convenience and security is the key for successful mobile device management. Review expert techniques and strategies for achieving this objective in this handbook on mobile device security for the health care organization.

  • Recommended Best Security Practices for Unified Communications

    Sponsored by: Polycom, Inc.

    Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.

  • Making Mobility Matter in Healthcare Data Security

    Sponsored by: DellEMC and Intel®

    This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place.

  • Healthcare Information at Risk: Encryption is not a Panacea

    Sponsored by: Intel

    This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.

  • IT Security: Built-In Protection with Intel vPro Technology

    Sponsored by: Intel

    New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.

  • Enabling High Performance for Apple iPads in the Enterprise

    Sponsored by: Aruba Networks

    Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.

  • eBook: Trends in Healthcare Data Protection

    Sponsored by: LANDesk Software

    This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.

  • UCB Gains Efficiencies and Realizes Lower TCO with CallCopy Call Recording

    Sponsored by: NACR

    Uncover why a implementing a CallCopy recording solution that is easy to use, search, update, support and maintain can offer a lower TCO than other solutions, as well as fulfilling all your call recording needs.

  • Best practices for implementing 2048-bit SSL

    Sponsored by: Citrix

    Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.

  • Technical Guide on Windows Security

    Sponsored by: SearchSecurity.com

    SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.

  • Presentation Download: Data Protection Strategies: Data Encryption

    Sponsored by: CDW Healthcare

    If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.

  • Eguide: Avoiding a patient data breach – and how to handle one if it does occur

    Sponsored by: CDW Healthcare

    In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.