encryption management

Results 1 - 25 of 48Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 02, 2014
This brief webcast will cover the new and enhanced capabilities of Elastic Storage 4.1, including native encryption and secure erase, flash-accelerated performance, network performance monitoring, global data sharing, NFS data migration and more. IBM GPFS (Elastic storage) may be the key to improving your organization's effectiveness and can help define a clear data management strategy for future data growth and support.
Tags : ibm, elastic storage
     IBM
By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection, encryption keys, vulnerability management
     Venafi
By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
     Entrust Datacard
By: Entrust Datacard     Published Date: Dec 08, 2015
This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2015
This paper reveals how Entrust Authority Security Manager, the world's leading public key infrastructure (PKI), helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
     Entrust Datacard
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification, cloud security, cloud based security saas security, strong authentication, fingerprint, full disk encryption, single sign-on, cloud management
     DigitalPersona UK
By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
     DigitalPersona UK
By: WatchGuard     Published Date: Oct 16, 2012
Email makes communication simple. Unencrypted email messages are sent in clear text or some other easily readable format regardless of the email program used. Read this white paper to learn more about how interoperability makes email vulnerable.
Tags : watchguard, email encryption, security, data management, internet security
     WatchGuard
By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
     Absolute Software
By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : mission critical, security, datacenter, data center, storage security, storage
     HP
By: CREDANT Technologies     Published Date: Apr 06, 2011
This whitepaper will examine some best practices for managing BitLocker®, as well as discuss how to more easily integrate BitLocker encryption into your security program and reduce the overhead of both key management and reporting.
Tags : credant technologies, bitlocker encryption, best practices, reporting
     CREDANT Technologies
By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts, time synchronization, networking, it management
     CradlePoint
By: SafeNet     Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
     SafeNet
By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
     Safenet
By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention, anti-virus, threat protection
     Webroot UK
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
     Citrix ShareFile
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
     IBM
By: LockLizard     Published Date: Dec 08, 2008
This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection.  It covers key management, enforcing time limitations, and other methods of document control.
Tags : digital rights management, locklizard, key management, time limitations enforcement, security, it management, enterprise applications
     LockLizard
By: LockLizard     Published Date: Dec 08, 2008
This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Tags : locklizard, document security, encryption, copy protection, digital rights management, document collaboration, security
     LockLizard
By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, encryption, business scanning, content control, patch management, change management, test environment
     Lumension
By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
     Lumension
By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : secure, ios, android, mobile security, data protection, security
     Lumension
By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, nemx, data management
     Nemx Software Corporation
By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, email control, email policy, compliance management, nemx, nemx software
     Nemx Software Corporation
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com