ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards White Papers

  • Video Surveillance System (VSS) Architecture in a Smart Building

    Sponsored by: Forescout

    Today, many buildings have a hybrid VSS architecture that is quite complex, containing a variety of legacy and new systems, including both analog and IP cameras. The problem is that this architecture presents many vulnerabilities. In this infographic, explore some common vulnerabilities found in many VSS commonly used in large organizations.

  • Protecting Data in The Cloud 2019 Thales Cloud Security Study

    Sponsored by: Thales

    During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.

  • Organizations are failing to protect sensitive data in the cloud

    Sponsored by: Thales

    This infographic highlights some of the key takeaways from the 2019 Thales Cloud Security Study. Continue reading to uncover research findings as they relate to the amount of data stored, the kind of data & the prevalence of encryption or other security measures.

  • The Changing Face of Data Security in Europe

    Sponsored by: Thales

    Take a glimpse at the results from the 2019 Thales Data Threat Report – European Edition. This infographic shares some key statistics from the research findings, including the use of sensitive data, multi-cloud environments & the effects of GDPR and other data privacy laws.

  • Safeguard your Private Keys with AppViewX

    Sponsored by: AppViewX

    When a private key is uncovered by malicious actors, valuable data is compromised through the impersonation of an enterprise’s servers. So, how should enterprises properly safeguard their private keys? Learn how your enterprise can essentially replace the vulnerable private key inventories.

  • The CISO’s Handbook for Certificate Management

    Sponsored by: AppViewX

    Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.

  • Vormetric Data Security Platform Architecture

    Sponsored by: Thales

    As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.

  • Certificate Lifecycle Management and Automation

    Sponsored by: AppViewX

    Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.

  • The State of PKI Security and Management: Survey Report

    Sponsored by: AppViewX

    A 2019 study has revealed that businesses’ PKI setups have a long way to go before they’re considered truly secure and effective. In this whitepaper, find the results of the study that reveal the state of PKI in the industry today – including some surprising statistics.

  • When Should you Invest in a Certificate Management Tool?

    Sponsored by: AppViewX

    Digital certificates play a major role in establishing trust and encrypting sensitive information online. But, certificates require constant maintenance like periodic renewals. That’s why many invest in a certificate management tool. Determine if you should invest in a certificate management tool with a checklist of 11 questions.

  • Overcoming the Top 3 Bottlenecks in SSL/TLS Certificate Management

    Sponsored by: AppViewX

    In this white paper, learn how to overcome the top 3 bottlenecks in SSL/TLS certificate management: Lack of discovery, manual management, inadequate reporting.

  • 5 Business Impacts of Certificate Mismanagement

    Sponsored by: AppViewX

    In this white paper, discover a checklist that will help you evaluate if your certificate management strategy has room for improvement. You will also find 5 reasons why certificate outages can affect your business

  • SSH Key Management in the Cloud

    Sponsored by: AppViewX

    Enterprises want to keep their systems safe using SSH keys, but by failing to keep those keys secure, they are ultimately more at-risk. Without protecting their SSH keys, enterprises are as vulnerable as ever. Find out how AppViewX can help you automate SSH key management and keep them secure in the cloud and on-prem.

  • Securing Cloud environments: Five Data Encryption best practices to help reduce your risk

    Sponsored by: IBM

    It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.

  • Securing Cloud environments: Five Data Encryption best practices to help reduce your risk

    Sponsored by: IBM

    It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.

  • Forrester Report: Use advanced encryption for data security

    Sponsored by: IBM

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.

  • Forrester Report: Use advanced encryption for data security

    Sponsored by: IBM

    More than ever, the security of your firm's bottom line depends on the technologies that secure your data. Today, that means strategically deploying data-encrypting solutions. This report details which encryption solutions are available to secure data in its various states and looks at the viability of emerging encryption technologies.

  • From readiness to transformation: How to address privacy regulations and keep your data safe

    Sponsored by: IBM

    This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes

  • From readiness to transformation: How to address privacy regulations and keep your data safe

    Sponsored by: IBM

    This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes

  • Critical Watch Report: 2019

    Sponsored by: Alert Logic

    SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.

  • GandCrab Ransomware Analysis Report

    Sponsored by: Versa Networks

    A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.

  • SSL Attacks on the Rise

    Sponsored by: Radware

    As is always the trend, mass adoption of certain technologies is followed closely by efforts to exploit its wide use through a number of security threats. SSL is no exception to this rule. Download this white paper, to learn everything you need to know about SSL attacks and how to protect against them.

  • Defending the Digital Enterprise

    Sponsored by: Gigamon

    Given the amount of encrypted traffic and the threat vector it now poses, you need a way to efficiently decrypt traffic, share it with tools and then re-encrypt it. In this white paper, discover 7 things you need to do to successfully decrypt your SSL and TLS traffic.

  • Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption

    Sponsored by: AMD

    Consumers and enterprises are becoming increasingly concerned about the security of their digital data, and with just cause. This sense of heightened concern is particularly relevant given the ongoing migration of end user data into the cloud. Read on to learn about the protection requirements for data in flight, data at rest, and data in use.

  • 4 Critical Principles of Enterprise Security

    Sponsored by: Smartsheet

    What's the key to effective enterprise security? In this white paper, explore the 4 critical principles of effective enterprise security. Review the importance of a multi-layered data security strategy, and learn how to manage your security at scale.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.