encryption

Results 351 - 367 of 367Sort Results By: Published Date | Title | Company Name
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : 
verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication
    
VeriSign, Inc.
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : 
data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption
    
Voltage Security
Published By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : 
sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance
    
Vormetric, Inc.
Published By: WatchGuard     Published Date: Oct 16, 2012
Email makes communication simple. Unencrypted email messages are sent in clear text or some other easily readable format regardless of the email program used. Read this white paper to learn more about how interoperability makes email vulnerable.
Tags : 
watchguard, email encryption, security, data management, internet security
    
WatchGuard
Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs, anti-phishing, data loss prevention, encryption
    
WatchGuard Technologies
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
Tags : 
watchguard xcs, securemail encryption, email encryption, ibe, data loss over e-mail, compliance, identity-based encryption
    
WatchGuard Technologies
Published By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : 
webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : 
webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp
    
Webroot UK
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper extends the findings of the Total Cost of Ownership for Full Disk Encryption (FDE), sponsored by WinMagic and independently conducted by Ponemon Institute published in July 2012, The purpose of this original research was to learn how organizations deploy full disk encryption solutions for desktop and laptop computers as well as the determination of total cost and benefits for organizations using this technology. A reanalysis of this research allows us to formulate new findings that compare the total cost of ownership of software versus hardware-based full disk encryption solutions.
Tags : 
ponemon, tco, software, hardware, full disk, encryption, total, cost
    
WinMagic Inc.
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
In this eBook, you’ll discover the basics of data encryption; how it addresses the unique data security challenges facing educational institutions, and key points to consider when building the business case for data encryption. You’ll also learn about some common “data encryption myths” and the risks they pose.
Tags : 
protecting, student, institutional, privacy, data, encryption, education
    
WinMagic Inc.
Published By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper examines common misconceptions about data encryption and describes how new approaches dispel earlier myths. WinMagic solutions demonstrate that a centrally managed approach to data security using current-generation processor capabilities and modern disk technologies can effectively meet enterprise requirements.
Tags : 
data, encryption, solutions, security, enterprise, requirements, capabilities, winmagic
    
WinMagic Inc.
Published By: WinMagic Inc.     Published Date: Aug 12, 2013
This eBook will review the basics of data encryption; data concerns specific to ESS; how data encryption addresses the unique data security challenges facing ESS, and key points to consider when building the case for data encryption.
Tags : 
pii, protect, data encryption, ess
    
WinMagic Inc.
Published By: WinMagic Inc.     Published Date: Aug 12, 2013
Many law firms have begun to look to data encryption to safeguard their communications and corporate assets from unauthorized access. Learn the benefits of Encryption technology through this eBook.
Tags : 
data encryption, legal service
    
WinMagic Inc.
Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
    
YouSendIt, Inc.
Published By: Zscaler     Published Date: May 15, 2019
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
Tags : 
    
Zscaler
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.