• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

data encryption

Results 201 - 215 of 215Sort Results By: Published Date | Title | Company Name
By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
    
IBM Corporation
By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost
    
Liaison Technologies
By: Liaison Technologies     Published Date: Jun 03, 2011
This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Tags : 
liaison, nubridges, data protection, encryption, key management, tokenization, data security, audit trails
    
Liaison Technologies
By: Dell     Published Date: Jul 30, 2012
Although you may be aware of the many new features Windows Server 2008 R2 offers, you may not know which ones are the most valuable for the data center.
Tags : 
hyper-v, server core, bitlocker, microsoft, data encryption, data center, data management, active directory
    
Dell
By: Mimecast     Published Date: Apr 04, 2013
The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability, encryption and better protection from targeted phishing attacks.
Tags : 
email, security, dlp, data loss prevention, encryption, business continuity, access control, anti spam
    
Mimecast
By: Lenovo and Microsoft     Published Date: Oct 17, 2016
Is Windows 10 right for your business? Get All the Answers in This Comprehensive Guide to Windows 10. Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: • All the new features • Security upgrades • Migration options Get the whitepaper now.
Tags : 
technology solutions, customer feedback, software, data security, encryption, cyberattacks
    
Lenovo and Microsoft
By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
By: Intel Security     Published Date: Oct 20, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : 
management of native encryption, mne, data protection, filevault, bitlocker, pat correia, encryption, network security appliance
    
Intel Security
By: Citrix ShareFile     Published Date: Apr 12, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 13, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat you are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
cloud initiative, personal security, personal device, password protection, security, data encryption
    
Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 13, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : 
data encryption, personal security, client security, cloud initiative, password protection
    
Citrix ShareFile
By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
By: OnBase by Hyland     Published Date: Jun 26, 2017
Confidence in the cloud is growing—and more companies than ever are looking to entrust their content management to a solution that is deployed in the cloud. A new survey conducted by IDG Research explores the rapidly expanding trend of companies moving their critical content and data storage to the cloud. Download the report to discover what your industry peers are saying about the cloud today and how, in the next year, everything could change.
Tags : 
cloud, solutions, ecm, onbase, hyland, data, availability, encryption
    
OnBase by Hyland
By: IBM     Published Date: Jul 02, 2018
In today’s threat landscape, organizations need to consider a new security paradigm - one with data at the center.
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter