> Technology > Security > Encryption

Encryption

Encryption is the process of obscuring information to make it unreadable without special knowledge. Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on hard drives and removable media, email messages, or in the form of packets sent over computer networks.
Results 26 - 50 of 357Sort Results By: Published Date | Title | Company Name
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection
    
Venafi
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks
    
Venafi
White Paper Published By: Kaseya     Published Date: May 13, 2015
To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.
Tags : 
kaseya, hybrid, cloud, management, msp
    
Kaseya
Webinar Published By: IBM     Published Date: May 12, 2015
The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.
Tags : 
ibm, healthcare, security, data, cybercrime
    
IBM
White Paper Published By: Workday     Published Date: Mar 23, 2015
This whitepaper will help technology and business managers and executives understand the requirements for SaaS.
Tags : 
cloud applications, saas, cloud computing, critial requirements for saas, cloud providers
    
Workday
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall
    
McAfee
White Paper Published By: Docusign     Published Date: Feb 16, 2015
This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.
Tags : 
laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality
    
Docusign
White Paper Published By: Docusign     Published Date: Feb 16, 2015
This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.
Tags : 
laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality
    
Docusign
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.
Tags : 
integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps
    
Kaspersky
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
access control, anti spam, anti spyware, anti virus, application security
    
Thawte
White Paper Published By: Thawte     Published Date: Oct 06, 2014
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
network security, encryption, internet security, ssl
    
Thawte
White Paper Published By: Symantec     Published Date: Jul 30, 2014
Knowledge is power: the Symantec guide to protecting your website.
Tags : 
protecting your website, vulnerability scans, website vulnerability, malware, spyware
    
Symantec
White Paper Published By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : 
detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware
    
Websense
Free Offer Published By: McAfee     Published Date: May 22, 2014
FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.
Tags : 
security, software, network security, evasion technique, aet testing environment
    
McAfee
White Paper Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention
    
SilverSky
White Paper Published By: McAfee     Published Date: Jan 28, 2014
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 28, 2014
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.