ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Achieving Security With Cloud PC Backup

    Sponsored by: Iron Mountain

    This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.

  • KineticD Security

    Sponsored by: KineticD

    The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.

  • Identity Finder Enterprise Suite 4.5

    Sponsored by: Identity Finder, LLC

    Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.

  • Data Protection: Solutions for Privacy, Disclosure and Encryption

    Sponsored by: Trend Micro, Inc.

    Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.

  • E-Book: New Rules for HIPAA

    Sponsored by: TechTarget Security

    Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.

  • Advanced Encryption Standard New Instructions

    Sponsored by: Dell, Inc. and Intel®

    Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.

  • E-Book: Data loss prevention strategies, practices and tools

    Sponsored by: TechTarget Security

    Data loss prevention strategies, practices and tools are more important than ever. Read this e-book for expert advice on DLP, encryption, risk management and more.

  • Information Security Magazine - September 2009: Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.

  • Essential Guide to PCI DSS

    Sponsored by: Information Security Magazine

    This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.

  • Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind

    Sponsored by: CDW Corporation

    Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • eBook: Encryption 360 Degrees

    Sponsored by: TechTarget

    Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's encryption landscape! Access this resource today.

  • Strengthening Enterprise Security through Notebook Encryption

    Sponsored by: Intel Corporation

    Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.

  • Enabling Developer Access to Production Data

    Sponsored by: Voltage Security, Inc.

    With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.

  • Blackberry Enterprise Solution: Security Technical Overview

    Sponsored by: BlackBerry

    This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.

  • The Virtual Office Checklist

    Sponsored by: Cisco Systems, Inc.

    The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.

  • Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption

    Sponsored by: Aladdin Knowledge Systems

    Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.

  • Advantages of Amanda over Proprietary Backup

    Sponsored by: Zmanda Inc.

    This white paper discusses how Amanda compares to other backup products. It will help you understand some key Amanda differences and how to evaluate and transition to Amanda.

  • Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution

    Sponsored by: Citrix Online - GotoMyPC

    Johns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely.

  • Citrix GoToMyPCCorporate - Security White Paper

    Sponsored by: Citrix Online - GotoMyPC

    In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.

  • Entrust Entelligence™ Messaging Server

    Sponsored by: Entrust, Inc.

    The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.

  • Building Blocks of Transparent Web Security: Server-Gated Cryptography

    Sponsored by: VeriSign, Inc

    Read a research paper from the Yankee Group and learn about the importance of Server Gated Cryptography (SGC)-enabled SSL Certificates for online businesses.

  • Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation

    Sponsored by: Global Knowledge

    The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...

  • Archive Security in a Tiered Storage Environment

    Sponsored by: Plasmon

    Find out how to identify potential security risks and review various storage technologies and business operations that balance the security requirements of long term archiving with overall cost and operation of the archive.

  • How to Offer the Strongest SSL Encryption for your Company

    Sponsored by: VeriSign, Inc

    Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.