• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

encryption

Results 26 - 50 of 367Sort Results By: Published Date | Title | Company Name
By: Sophos     Published Date: Oct 14, 2015
This whitepaper aims to dispel the fear and confusion surrounding encryption. It demonstrates how organizations can move forward with an encryption strategy in a manner that is simple, practical and achievable. So letís start by setting the record straight on a few myths.
Tags : 
guide to encryption, data breaches, cyber attacks, myths of encryption, security, wireless security
    
Sophos
By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
    
Group M_IBM Q2'19
By: IronStratus     Published Date: Apr 10, 2012
With all their benefits, cloud applications increase passwords and decrease IT control over user access, compromising security. Register for a free IronStratus account and start securely managing access to all your cloud applications in minutes.
Tags : 
cloud, single sign on, single sign-on, apps, application, access, password, encryption
    
IronStratus
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
    
IBM
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
    
Trend Micro, Inc.
By: Group M_IBM Q119     Published Date: Jan 17, 2019
Today, financial service companies are embracing hybrid cloud and its advantages, such as the ease of shifting production workloads and secure applications to public cloud environments. But, what is challenging is the complex regulatory landscape. 20,000 new regulatory requirements were created in 2016 alone. How can security pros ensure that controls for identity management, authentication and encryption work in both private and public clouds? Download this report for a closer look at the complexity of hybrid cloud security and 10 essential elements for compliant business operation.
Tags : 
    
Group M_IBM Q119
By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches, security
    
Druva
By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : 
data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption
    
Voltage Security
By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
By: SafeNet     Published Date: Jul 13, 2010
This white paper is the second in a series following An Enterprise Guide to Understanding Key Management which introduces different types of cryptography and keys used in modern data protection applications.
Tags : 
safenet, enterprise security policy, key management, cryptography, data protection application, integrated security platform, encryption, application security
    
SafeNet
By: Dome9     Published Date: Apr 25, 2018
AWS provides powerful controls to manage the security of software-defined infrastructure and cloud workloads, including virtual networks for segmentation, DDoS mitigation, data encryption, and identity and access control. Because AWS enables rapid and elastic scalability, the key to securing cloud environments is using security automation and orchestration to effectively implement consistent protection across your AWS environment. The following eBook will discuss Dome9 best practices for using AWS controls to establish a strict security posture that addresses your unique business needs, and maintaining consistency across regions, accounts, and Virtual Private Clouds (VPCs) as your environment grows.
Tags : 
    
Dome9
By: LogMeIn     Published Date: Feb 27, 2018
LogMeIn offers consistently reliable service to its Bold360 customers and is vigilant in efforts to provide services that are not only robust and scalable, but also secure. This document describes how we achieve reliable scalability and the measures taken by LogMeIn to protect Bold360 customer data.
Tags : 
industry, network, service, operations, scalability, data, encryption
    
LogMeIn
By: Symantec     Published Date: Jun 28, 2012
Making the Best Choice When Considering Your Online Security Options
Tags : 
ssl certificates, online security, dats encryption
    
Symantec
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication
    
VeriSign, Inc.
By: Symantec     Published Date: Oct 02, 2012
The most well-known example of the use of public key infrastructure has proven flexible enough to assist in authentication, encryption and data integrity.
Tags : 
tls/ssl, public, key, infrastructure, transport, layer, security
    
Symantec
By: Citrix Systems     Published Date: Feb 18, 2012
Ready for 2048-bit SSL? The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. Download the Citrix and Verisign White Paper and the NetScaler Performance Comparison now.
Tags : 
2048-bit ssl, security, ssl, performance, citrix, verisign, netscaler, cloud
    
Citrix Systems
By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe
    
CA Mainframe
By: Oracle Corp.     Published Date: Oct 15, 2012
Roxana Bradescu, Director of Database Security Product Management at Oracle, will discuss how these pitfalls can be avoided by following best practices for data encryption throughout the enterprise using Oracle Advanced Security.
Tags : 
database security, data, data encryption, it security, encryption, oracle
    
Oracle Corp.
By: Liaison Technologies     Published Date: Jun 03, 2011
This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Tags : 
liaison, nubridges, data protection, encryption, key management, tokenization, data security, audit trails
    
Liaison Technologies
By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : 
best practices, devices control, encryption, security, business continuity, access control, anti spam, anti spyware
    
Lumension
By: Infinidat EMEA     Published Date: May 14, 2019
The Increased Business Risk from a Data Breach
Tags : 
    
Infinidat EMEA
By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci
    
Linoma Software
By: Lumension     Published Date: Jan 18, 2013
Watch this great technical webcast on-demand to help you jump start your effort to protect data on endpoints. Don't miss this real training for freeô.
Tags : 
encryption, bitlocker, data protection, endpoint, security, best practices, application integration, business activity monitoring
    
Lumension
By: McAfee     Published Date: Jan 28, 2014
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware, anti virus, encryption, internet security
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter