ComputerWeekly.com Research Library

Powered by Bitpipe.com

Encryption Standards White Papers

  • Protecting Data in The Cloud 2019 Thales Cloud Security Study

    Sponsored by: Thales

    During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data. Download the executive summary to discover the key findings of the research.

  • Organizations are failing to protect sensitive data in the cloud

    Sponsored by: Thales

    This infographic highlights some of the key takeaways from the 2019 Thales Cloud Security Study. Continue reading to uncover research findings as they relate to the amount of data stored, the kind of data & the prevalence of encryption or other security measures.

  • The Changing Face of Data Security in Europe

    Sponsored by: Thales

    Take a glimpse at the results from the 2019 Thales Data Threat Report – European Edition. This infographic shares some key statistics from the research findings, including the use of sensitive data, multi-cloud environments & the effects of GDPR and other data privacy laws.

  • Safeguard your Private Keys with AppViewX

    Sponsored by: AppViewX

    When a private key is uncovered by malicious actors, valuable data is compromised through the impersonation of an enterprise’s servers. So, how should enterprises properly safeguard their private keys? Learn how your enterprise can essentially replace the vulnerable private key inventories.

  • The CISO’s Handbook for Certificate Management

    Sponsored by: AppViewX

    Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.

  • Vormetric Data Security Platform Architecture

    Sponsored by: Thales

    As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.

  • Certificate Lifecycle Management and Automation

    Sponsored by: AppViewX

    Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.

  • The State of PKI Security and Management: Survey Report

    Sponsored by: AppViewX

    A 2019 study has revealed that businesses’ PKI setups have a long way to go before they’re considered truly secure and effective. In this whitepaper, find the results of the study that reveal the state of PKI in the industry today – including some surprising statistics.

  • When Should you Invest in a Certificate Management Tool?

    Sponsored by: AppViewX

    Digital certificates play a major role in establishing trust and encrypting sensitive information online. But, certificates require constant maintenance like periodic renewals. That’s why many invest in a certificate management tool. Determine if you should invest in a certificate management tool with a checklist of 11 questions.

  • Overcoming the Top 3 Bottlenecks in SSL/TLS Certificate Management

    Sponsored by: AppViewX

    In this white paper, learn how to overcome the top 3 bottlenecks in SSL/TLS certificate management: Lack of discovery, manual management, inadequate reporting.

  • 5 Business Impacts of Certificate Mismanagement

    Sponsored by: AppViewX

    In this white paper, discover a checklist that will help you evaluate if your certificate management strategy has room for improvement. You will also find 5 reasons why certificate outages can affect your business

  • SSH Key Management in the Cloud

    Sponsored by: AppViewX

    Enterprises want to keep their systems safe using SSH keys, but by failing to keep those keys secure, they are ultimately more at-risk. Without protecting their SSH keys, enterprises are as vulnerable as ever. Find out how AppViewX can help you automate SSH key management and keep them secure in the cloud and on-prem.

  • Critical Watch Report: 2019

    Sponsored by: Alert Logic

    SMBs are under greater pressure than ever to address cyberthreats. The principal challenge for SMBs is that they must face these threats with fewer security resources than large enterprises. In this report, explore 9 takeaways that illustrate SMBs difficulties to keep pace with the changing security landscape.

  • SSL Attacks on the Rise

    Sponsored by: Radware

    As is always the trend, mass adoption of certain technologies is followed closely by efforts to exploit its wide use through a number of security threats. SSL is no exception to this rule. Download this white paper, to learn everything you need to know about SSL attacks and how to protect against them.

  • Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption

    Sponsored by: AMD

    Consumers and enterprises are becoming increasingly concerned about the security of their digital data, and with just cause. This sense of heightened concern is particularly relevant given the ongoing migration of end user data into the cloud. Read on to learn about the protection requirements for data in flight, data at rest, and data in use.

  • 4 Critical Principles of Enterprise Security

    Sponsored by: Smartsheet

    What's the key to effective enterprise security? In this white paper, explore the 4 critical principles of effective enterprise security. Review the importance of a multi-layered data security strategy, and learn how to manage your security at scale.

  • Can Cryptography Save Our Elections

    Sponsored by: RSA Conference

    Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: Comforte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • Cloud Security Gateways, Q1 2019

    Sponsored by: McAfee, Inc.

    Protecting cloud applications from data loss or theft, privacy abuses, and other risks is challenging. In the evolving market for cloud security gateways (CSGs), enterprises want to monitor and secure all their cloud workloads using few solutions. In this report, learn more about the top CSG vendors and what you should look for in a provider.

  • The exploitation of flaws in the HTTPS protocol

    Sponsored by: ComputerWeekly.com

    For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.

  • HID ActivOne User Friendly Strong Authentication

    Sponsored by: HID Global

    As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.

  • Securing Big Data Analytics

    Sponsored by: Comforte AG

    Not only are the uses and benefits of big data expanding, so are the environments where it is collected and analyzed. Increasingly, data is ending up in the hands of cybercriminals. In this white paper, learn more about this fundamentally different approach to protecting sensitive data.

  • Global Payments Technology Company Achieves PCI Compliance

    Sponsored by: Comforte AG

    An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.

  • The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance

    Sponsored by: Comforte AG

    In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.

  • Mercury Processing Services International Secures Growth

    Sponsored by: Comforte AG

    Mercury Processing Services needed a solution that would properly protect all types of data not just for the sake of compliance, but also so that they would have another layer of protection from potential hackers. In this case study, learn about Mercury's experience using comforte's SecurDPS to protect their data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.