Encryption White Papers

Encryption is the process of obscuring information to make it unreadable without special knowledge. Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on hard drives and removable media, email messages, or in the form of packets sent over computer networks.
Results 1 - 25 of 316Sort Results By: Published Date | Title | Company Name
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: IBM     Published Date: May 12, 2015

The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.

Tags : ibm, healthcare, security, data, cybercrime, encryption, firewalls, hacker detection
    
By: Box     Published Date: May 11, 2015

This paper provides information on mobile content management and evaluates 19 major MCM providers.

Tags : mobile content management, mcm, mcm providers, mobility, content management, cloud, mobile devices, security content
    
By: Workday     Published Date: Mar 23, 2015

This whitepaper will help technology and business managers and executives understand the requirements for SaaS.

Tags : cloud applications, saas, cloud computing, critial requirements for saas, cloud providers, workday, cloud applications deliver real value, clous
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.

Tags : mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, application security, authentication
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, access control, application security
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, encryption, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity
    
By: Symantec     Published Date: Nov 19, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 19, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Thawte     Published Date: Oct 06, 2014

Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.

Tags : network security, encryption, internet security, ssl
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website.

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
By: McAfee     Published Date: May 22, 2014

FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.

Tags : security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: SilverSky     Published Date: Mar 26, 2014

The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.

Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
By: McAfee     Published Date: Jan 28, 2014

BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.

Tags : endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware, anti virus, encryption, internet security
    
By: McAfee     Published Date: Jan 28, 2014

Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.

Tags : blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod, anti spam
    
By: McAfee     Published Date: Jan 28, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : gartner, endpoint protection, anti spam, anti spyware, anti virus, encryption, firewalls, security management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.