Data Encription Reports

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Healthcare Network Security with Fewer House Calls: Solution Brief
sponsored by Intel
WHITE PAPER: By evaluating offerings and finding the right investment, a struggling IT campus-based IT department they were able to install a remote management solution that allowed them to simplify IT and better secure the sensitive patient data residing in their on-campus health center.
Posted: 30 May 2013 | Published: 30 May 2013

Intel

Simplify SSL Certificate Management Across the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
Posted: 07 May 2012 | Published: 07 May 2012

Symantec Corporation

Challenges With Data Protection in the Cloud
sponsored by TechTarget Security
ANALYST BRIEF: This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

TechTarget Security

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Information Security Magazine – June 2010: Laptop Lockdown
sponsored by Information Security Magazine
EZINE: This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
Posted: 16 Jun 2010 | Published: 16 Jun 2010

Information Security Magazine

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

Global Deduplication: How it Works and Who Can Benefit
sponsored by Essextec
EGUIDE: This expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Essextec

Exploring cloud Security as a Service options
sponsored by TechTarget Security
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

TechTarget Security