encryption

Results 201 - 225 of 367Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
Watch this great technical webcast on-demand to help you jump start your effort to protect data on endpoints. Don't miss this real training for free™.
Tags : 
encryption, bitlocker, data protection, endpoint, security, best practices
    
Lumension
Published By: Lumension     Published Date: Jan 18, 2013
HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?
Tags : 
hipaaa, hitech act, compliance, cyber liability, healthcare data, data compliance
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : 
best practices, devices control, encryption, security, business continuity
    
Lumension
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci
    
Linoma Software
Published By: CDW     Published Date: Jul 08, 2015
Keep data safe, even as it moves outside the perimeter of the traditional network.
Tags : 
security, vulnerability management, analytics, threat prevention, mobile security, encryption
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence
    
CDW
Published By: McAfee     Published Date: Jan 28, 2014
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
endpoint encryption, epolicy orchestrator, drive encryption
    
McAfee
Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet
    
SafeNet
Published By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : 
virtualization, cloud services, security, encryption, safenet
    
SafeNet
Published By: SafeNet     Published Date: Jan 14, 2014
SafeNet CN high speed network data encryption devices are purpose built hardware appliances that secure data transmitted across Layer 2 networks. The CN series platforms provide highly secure, full line rate transparent encryption for data moving across both dark Fibre and metro, or wide area Ethernet networks in point-point, hub & spoke, or any meshed environment.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet
    
SafeNet
Published By: SafeNet     Published Date: Jan 14, 2014
Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.
Tags : 
virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network
    
SafeNet
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: SnapLogic     Published Date: Aug 17, 2015
This report summarizes the changes that are occurring, new and emerging patterns of data integration, as well as data integration technology that you can buy today that lives up to these new expectation
Tags : 
data integration, cloud computing, mass data storage, integration requirements, integration strategies, non-persisted data streaming, device native data, data encryption
    
SnapLogic
Published By: SnapLogic     Published Date: Sep 03, 2015
Learn how SnapLogic and Amazon Web Services helped Earth Networks create a responsive, self-service cloud for data integration, preparation and analytics.
Tags : 
data management, self-service clouding, data integration, data analytics, data storage, data encryption, data warehousing, database services
    
SnapLogic
Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence
    
CDW - EMC
Published By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : 
pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach
    
Canon Solutions America
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Stay ahead of online security attacks, such as phishing, by understanding how they work. Read this white paper to learn how phishing attacks work, and how to avoid them.
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Provide site visitors visual cues that indicate your site is legitimate with Extended Validation (EV) SSL available from VeriSign.  Read this paper to learn how to increase site visitor confidence in your site. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Enhance your online brand with trusted security from VeriSign.  In this paper you will gain insights on how to encrypt sensitive information and help improve customer confidence. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Be sure your site is in compliance with government data regulations by reading about the different data regulatory standards in this white paper. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
This 45-page e-Book gives you the tools you need to detect security vulnerabilities, build an information security strategy, and plan your investment in security technology.
Tags : 
verisign, phishing, extended validation, ev ss, ssl, encryption, online safety, online security
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
In order to ensure that your visitors can see that your Web site has passed Extended Validation (EV) authentication, VeriSign created VeriSign® EV UpgraderT-the first-ever solution to enable all visiting Windows® Internet Explorer® 7 (IE7) browsers to detect EV SSL Certificates and display them appropriately.
Tags : 
ssl, ssl technology, verisign, trust, seal, ev ssl, ssl certificate, trust mark
    
VeriSign Incorp.
Published By: Mimecast     Published Date: Sep 30, 2008
Infrastructures of potentially dozens of servers have built up around corporate email systems to provide better governance, reduced risk and improved legislative compliance - anti-virus, anti-spam, attachment handling, encryption, disclaimers, archiving and hot-standby mail servers to name a few.
Tags : 
mimecast, saas, software as a service, email archive, cpr, email evidence, ediscovery, medium-size business
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.