ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards Research

  • Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector

    Sponsored by: NetLib Security

    In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.

  • Beginners Guide to Encryption and Key Management (and Encryptionizer)

    Sponsored by: NetLib Security

    Sensitive personal information and business data has become increasingly critical to defend as its value grows amongst ‘the bad guys’. But what is the best way to go about protecting data from falling into the wrong hands? Read on to find out.

  • Securing data across the enterprise while simplifying IT operations

    Sponsored by: Thales

    The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.

  • Thales Data Protection on Demand

    Sponsored by: Thales

    In this e-book, discover a collection of case studies highlighting the data protection journeys of 4 organizations as they partner with Thales to ensure the security of their encrypted data. Read on to get started.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Thales

    Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.

  • CipherTrust Cloud Key Manager

    Sponsored by: Thales

    While it’s been common practice for the cloud provider to hold the key for encryption capabilities, industry best practices mandate that the keys be held by neither the cloud provider nor the end user. This data sheet takes a closer look at the key features and capabilities of the CipherTrust Cloud Key manager. Read on to get started.

  • The GoAnywhere Book of Secure File Transfer Project Examples

    Sponsored by: Help/Systems

    Managed file transfer (MFT) software is primarily used to automate and encrypt the data exchanged between an organization and its trading partners, users, and employees. A robust MFT solution can also solve problems that fall outside your basic file transfer needs. In this white paper, learn how your peers use managed file transfer.

  • Managed File Transfer Category Report

    Sponsored by: Help/Systems

    Selecting a managed file transfer software can be overwhelming and one of the biggest challenges facing organizations is understanding the marketplace. In this research report, explore a comprehensive list of 9 managed file transfer vendors to help you find the best fit for your organization.

  • Secure Managed File Transfer: Ultimate Buyer's Guide

    Sponsored by: Help/Systems

    Every day, organizations may exchange a considerable amount of files. Because of the sensitive information often contained in files, data transfers should be protected. In this white paper, learn how secure managed file transfer can help your organization protect the data your sharing.

  • Replacing FTP Scripts with Managed File Transfer

    Sponsored by: Help/Systems

    Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: Comforte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • Securing Big Data Analytics

    Sponsored by: Comforte AG

    Not only are the uses and benefits of big data expanding, so are the environments where it is collected and analyzed. Increasingly, data is ending up in the hands of cybercriminals. In this white paper, learn more about this fundamentally different approach to protecting sensitive data.

  • Global Payments Technology Company Achieves PCI Compliance

    Sponsored by: Comforte AG

    An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.

  • The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance

    Sponsored by: Comforte AG

    In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.

  • Mercury Processing Services International Secures Growth

    Sponsored by: Comforte AG

    Mercury Processing Services needed a solution that would properly protect all types of data not just for the sake of compliance, but also so that they would have another layer of protection from potential hackers. In this case study, learn about Mercury's experience using comforte's SecurDPS to protect their data.

  • Enterprise Tokenization with SecurDPS

    Sponsored by: Comforte AG

    Organizations are investing more than ever to protect their sensitive data, to meet compliance demands and to manage risk that is associated with cyberattacks. In this white paper, learn about comforte's data protection suite which is a scalable and fault-tolerant enterprise tokenization and encryption solution enabling successful data protection.

  • Leading Canadian Bank Achieves Compliance for Themselves and their Customers

    Sponsored by: Comforte AG

    To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.

  • Data Protection Ascends the Business Agenda

    Sponsored by: ComputerWeekly.com

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

  • The Ultimate Guide to Data Encryption in the Cloud

    Sponsored by: Rubrik

    In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.

  • Closing the Cloud Security Gap

    Sponsored by: Intrado

    According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.

  • Fintech & the digital customer experience

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years.

  • CW ANZ: Rise to the big data challenge

    Sponsored by: ComputerWeekly.com

    In this month's issue of CW ANZ, we look at how Aussie organisations are fine-tuning their storage strategy to keep up with the demands of big data without compromising performance and service levels.

  • The State of Cybersecurity and How It Will Evolve

    Sponsored by: ALTR

    Download this e-guide for an exclusive Q&A with Raluca Ada Popa. Popa is equipped with four degrees from Massachusetts Institute of Technology, two research fellowships and a bevy of awards and merits. In this Q&A Popa discusses the future of data security and the challenges of ensuring adequate defense.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: SearchSecurity.com

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.