Data Encryption Standards Reports

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Securing the enterprise application layer: Expert Guidelines
sponsored by TechTarget Security
EGUIDE: If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

TechTarget Security

How SSL-Encrypted Web Connections are Intercepted
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.
Posted: 27 Dec 2012 | Published: 17 Dec 2012

TechTarget Security

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by TechTarget Security
EZINE: How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
Posted: 02 May 2016 | Published: 02 May 2016

TechTarget Security

Sorting Storage Options on AWS
sponsored by TechTarget Search AWS
EBOOK: Sorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

TechTarget Search AWS

Computer Weekly – 10 June 2014: The case for a European cloud market
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the European Commission wants to create a digital single market in Europe based on industry standard clouds – but is the plan realistic? Network encryption promises to solve many IT security threats – we examine the benefits. And our latest buyer's guide looks at business process management. Read the issue now.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

TechTarget ComputerWeekly.com

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE