• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

encryption

Results 351 - 362 of 362Sort Results By: Published Date | Title | Company Name
By: McAfee Inc     Published Date: Mar 23, 2009
Today's workforce relies on USB drives all the more to share information - roadmap presentations, contracts, and sensitive or large files that can't be mailed. Find out which McAfee Encrypted USB Drives meet your needs.
Tags : 
mcafee, usb, encryption, drives, usb drives, data protection, data management, internet security, intrusion prevention, security management
    
McAfee Inc
By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : 
sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance, advanced persistent threats, apt, insider threat, security, cloud computing
    
Vormetric, Inc.
By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification, ssid, authentication, virtual local area network, vlan, switches, wids, wips, wireless security, wlan security, trapeze networks, cisco, aruba
    
Trapeze Networks
By: Okiok     Published Date: Aug 21, 2009
In this white paper, we describe the basic characteristics of DES and triple-DES and look at the security properties that a financial transaction system will want to achieve. We then look at the problems related with a migration from DES to triple-DES; enumerating and discussing several points that we suggest should be considered.
Tags : 
data encryption, encryption, finance, accounting, migration, data encryption standard, encryption standard, database security, data security, pki, okiok, security, ssl
    
Okiok
By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This Wikibon Report offers detailed insight into how Oracle SPARC M7-based servers, and systems, use advanced offload technologies for encryption of systems; have very low encryption overheads; and are an important prerequisite for implementing best-of-breed security without impacting business productivity.
Tags : 
    
Oracle PaaS/IaaS/Hardware
By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
By: Commvault ABM Oct     Published Date: Nov 13, 2017
Don't let the risk or cost of ransomware storm your organization's castle. it will wreak havoc on your valuable data and impact business continuity. Instead, employ a multi-layer security strategy that not only includes anti-malware, firewall, and hard disk and file encryption, but also data loss prevention technology and standards- based data protection. Each are critical to mitigate cyber security risks and protect vital information so you can avoid business disruption without ever paying a king's ransom.
Tags : 
ransomeware, organization, data, business optimization technology, it protection, commvault
    
Commvault ABM Oct
By: Microsoft Windows Phone     Published Date: Feb 05, 2010
Part 2 - Security tools that can boost Windows mobile security. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.
Tags : 
microsoft, windows phone, mobile security, security tools, smartphone, network security, antivirus, backup, device encryption, mobile firewall, vpn, backup and recovery, anti virus, encryption, firewalls, smart phones, wireless phones, wireless security
    
Microsoft Windows Phone
By: Dell     Published Date: Jul 30, 2012
Although you may be aware of the many new features Windows Server 2008 R2 offers, you may not know which ones are the most valuable for the data center.
Tags : 
hyper-v, server core, bitlocker, microsoft, data encryption, data center, data management, active directory, single sign-on, ad fs, sso, powershell, it environment, it management, wds, dell, windows deployment services, remote desktop services, rds, vdi
    
Dell
By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing, monitoring, encryption, compliance, intrusion detection, intrusion prevention, policy based management
    
IBM
By: Commvault     Published Date: Jul 06, 2016
The cloud is changing everything. It’s transforming IT organizations with agility and efficiency like never before, enabling them to realize new IT-as-a-Service delivery models. Yet, with change also comes new challenges. Read more to see how you can solve them so that you can realize the full potential of your next cloud project.
Tags : 
commvault, cloud data, cloud data protection, it as a service, cloud security, cloud infrastructure, cloud optimization, cloud storage, encryption, security, data management, infrastructure, network management, network performance management, business process automation
    
Commvault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter