ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards White Papers

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: Citrix

    SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.

  • Leading healthcare provider protects vital client assets with help from Thales

    Sponsored by: Thales

    This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.

  • Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security

    Sponsored by: Thales

    Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.

  • Securing Big Data

    Sponsored by: Thales

    In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.

  • Quantum Computing and Quantum-Safe Security

    Sponsored by: Thales

    Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.

  • Vormetric Transparent Encryption for the SAP HANA® Data Management Suite

    Sponsored by: Thales

    While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.

  • Avoiding Data Leaks with Scalable Encryption and Access Controls

    Sponsored by: Thales

    Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Sponsored by: Thales

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • Hunt for Data Protection Ends with Encryptionizer®

    Sponsored by: NetLib Security

    In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.

  • Network Independent Encryption: Flexible, Policy-Based Network Encryption Security for Today’s High-Performance Network Architectures

    Sponsored by: Thales

    Thales is a global leader in the development of end-to-end encryption technologies. Their solutions protect sensitive data for a wide range of commercial, government, industrial and defense customers. Read this white paper to learn more about Network Independent Encryption, the basis of a new technology by Thales called Transport Independent Mode.

  • The Facts Around Zoom and Encryption for Meetings/Webinars

    Sponsored by: Zoom Video Communications

    In light of recent interest in Zoom’s encryption practices, they released a blog post apologizing for the confusion they had caused by incorrectly suggesting that Zoom meetings were capable of using end-to-end encryption. Download the blog to learn more about how Zoom encrypts the content that moves across their network.

  • Our First ‘Ask Eric Anything’ Webinar Addresses Users’ Security & Privacy Concerns

    Sponsored by: Zoom Video Communications

    As part of Zoom’s commitment to creating a safe meeting experience for their users, Zoom founder and CEO Eric S. Yuan has started hosting weekly “Ask Eric Anything” webinars. In this blog, explore some of the specific questions Eric answered during the first webinar session.

  • Executive Brief: The Dark Side of Encryption

    Sponsored by: SonicWall

    Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.

  • Finding a Secure Managed File Transfer Tool: Key considerations

    Sponsored by: SearchSecurity.com

    Read this expert guide to explore key considerations that should be reviewed prior to an MFT investment and learn about the advantages of using a solution with enterprise file synchronization and sharing abilities.

  • Use Your Microsoft Certificate Authority for Passwordless Authentication

    Sponsored by: Entrust, Inc.

    As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.

  • Public Key Infrastructure (PKI) Buyers Guide

    Sponsored by: Entrust, Inc.

    When it comes to digital interactions, trust is a key deciding factor. A popular way of gaining trust is the use of public key infrastructures (PKIs), which enable organizations to ensure end-to-end trust across user networks. This buyers guide offers expert advice for organizations looking to implement PKI. Read on to learn more.

  • RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys?

    Sponsored by: Thales

    As organizations continue to adopt cloud and SaaS models, ensuring cloud-specific security issues are addressed is paramount. This article highlights one of those key challenges, cloud key management, and explores how to ensure security during a cloud migration. Read on to learn more.

  • How Can I Lock Down my distributed SQL Server / SQL Express Application?

    Sponsored by: NetLib Security

    In this article, discover a method, using Encryptionizer, where you can "lock down" your SQL database so that you can protect your intellectual property.

  • Automatic Whole Database Encryption – How It Works

    Sponsored by: NetLib Security

    In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.

  • An Anchor of Trust in a Digital World: Risk Management Strategies for Digital Processes

    Sponsored by: Thales

    A growing number of entities have integrated Hardware Security Modules (HSMs) into their information risk management deployments. In this white paper, learn about hardware security modules and the attributes that position HSMs as an attractive component in information risk management.

  • Decisive Technology for Decisive Moments

    Sponsored by: Thales

    Regardless of your current strategic initiatives, a partnership with a trusted cybersecurity provider is critical to your overall success. This white paper highlights success Thales has had in the role of strategic partner for leading enterprises across industries. Read on to see what these industry leaders have to say about Thales.

  • Assess and Manage Cryptographic Security with Entrust Datacard™

    Sponsored by: Entrust, Inc.

    In this data sheet, take a closer look at the key features and capabilities of AgileScan, one of Entrust Datacard’s offerings focused on ensuring the security of cryptographic inventories and life cycles. Read on to learn more about AgileScan.

  • It’s Gotta Be The Shoes! Or Is It? The Gold Is In The Data

    Sponsored by: NetLib Security

    Read this case study to learn how C Sharp Sports used NetLib Security’s data encryption solution, Encryptionizer, to meet their growing business needs.

  • Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector

    Sponsored by: NetLib Security

    In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.

  • Beginners Guide to Encryption and Key Management (and Encryptionizer)

    Sponsored by: NetLib Security

    Sensitive personal information and business data has become increasingly critical to defend as its value grows amongst ‘the bad guys’. But what is the best way to go about protecting data from falling into the wrong hands? Read on to find out.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.