encryption

Results 126 - 150 of 367Sort Results By: Published Date | Title | Company Name
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption, vulnerability, anti spam, anti spyware, anti virus, security management, vulnerability management
    
CREDANT Technologies
Published By: CREDANT Technologies     Published Date: Apr 06, 2011
This whitepaper will examine some best practices for managing BitLocker®, as well as discuss how to more easily integrate BitLocker encryption into your security program and reduce the overhead of both key management and reporting.
Tags : 
credant technologies, bitlocker encryption, best practices, reporting, encryption
    
CREDANT Technologies
Published By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : 
aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl, certificate, ecommerce
    
Aberdeen Group
Published By: CDW     Published Date: Jun 10, 2013
It’s critical to understand how a defense-in-depth strategy can protect the most precious information asset: data.
Tags : 
cdw, enterprise encryption, defense-in-depth, sensitive data, security posture, encryption of information, compliance, security posture, security
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data, storage encryption, encryption prevention, mobile policy, internet security, security management, mobile workers, wireless security
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci, anti spam, anti spyware, anti virus, application security, auditing, compliance
    
McAfee
Published By: McAfee     Published Date: Nov 19, 2013
This white paper discusses three common approaches to email encryption and explains their distinct advantages to help you determine which approach best fits the needs of your organization.
Tags : 
email encryption, email security, tls encryption, transport layer security, on premises, saas, application security, hacker detection, internet security
    
McAfee
Published By: hightail     Published Date: Jan 17, 2014
Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.
Tags : 
knowledge management, data management, mobile computing, mobile data systems, application integration, application performance management, best practices, business integration, business intelligence, cloud computing
    
hightail
Published By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : 
cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts, time synchronization, networking, it management
    
CradlePoint
    
Ciena
Published By: IBM     Published Date: Aug 26, 2019
By choosing the right enterprise platform and pervasively encrypting data, your bank can deliver data security more effectively. For this reason, you should be aware of the best available encryption solutions for your organization. This guide is designed to help you determine the right questions to ask your CIO to become better informed about your bank’s cybersecurity position. Know five encryption questions to ask your CIO today
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Published By: IBM     Published Date: Aug 26, 2019
Cyberspace is extremely difficult to secure. The basic approach to security is proving to be inadequate to the demands of the aggressive nature of the environment. A paradigm shift is necessary and soon. In this whitepaper, discover a possible change from a selective model to one that is pervasive. A significant modification in the basic structure of computing that is easy to implement and removes all barriers to full scale encryption.
Tags : 
cryptocurrency, bitcoin, blockchain
    
IBM
Published By: SafeNet     Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management, ethernet networking, wide area networks, encryption, network security appliance, risk management, total cost of ownership, information management
    
SafeNet
Published By: SafeNet     Published Date: Oct 06, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
Tags : 
safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management, ethernet networking, network management, network security, wide area networks
    
SafeNet
Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption, encryption, internet security, security management, database security, information management
    
Centrify Corporation
Published By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management, ethernet networking, wide area networks, encryption, network security appliance, risk management, total cost of ownership, information management
    
Safenet
Published By: Safenet     Published Date: Oct 11, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
Tags : 
safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management, ethernet networking, network management, network security, wide area networks
    
Safenet
Published By: SafeNet     Published Date: Jul 13, 2010
This white paper is the second in a series following An Enterprise Guide to Understanding Key Management which introduces different types of cryptography and keys used in modern data protection applications.
Tags : 
safenet, enterprise security policy, key management, cryptography, data protection application, integrated security platform, encryption, application security, policy based management, data protection, pci compliance
    
SafeNet
Published By: SafeNet     Published Date: Jul 13, 2010
To add extra protection for confidential data while reducing the time and cost for achieving regulatory compliance, many organizations will benefit from integrating tokenization into their SafeNet solution.
Tags : 
safenet, tokenization, data protection, regulatory compliance, application integration, encryption, audit, auditing, compliance, application performance management, pci compliance
    
SafeNet
Published By: SafeNet     Published Date: Sep 15, 2010
This paper offers a detailed look at tokenization and offers practical guidelines for helping organizations successfully employ tokenization so they can maximize the potential benefits.
Tags : 
safenet pci, pci compliance, tokenization, encryption, data masking, compliance
    
SafeNet
Published By: HP     Published Date: Oct 22, 2008
HP is pleased to introduce disk encryption for the HP StorageWorks XP24000 and HP StorageWorks XP20000 Disk Arrays. This white paper describes the encryption feature including the background of what the challenge is that the product addresses, what the feature consists of and how it is ordered.
Tags : 
disaster proof, 4aa2-2629enw, xp24000, xp20000, disk arrays, encryption, storageworks, security, windows
    
HP
Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost, stolen, disgruntled, data erase, authentication, compliance, wireless, encryption, motorola, good technology, data protection
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : 
mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good, wireless communications
    
Motorola
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
Tags : 
watchguard xcs, securemail encryption, email encryption, ibe, data loss over e-mail, compliance, identity-based encryption, email security, encryption, hipaa compliance, data protection, sarbanes oxley compliance
    
WatchGuard Technologies
Published By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : 
certifiedmail technology, email security, message security, encryption, security
    
DataMotion
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.