Encryption is the process of obscuring information to make it unreadable without special knowledge. Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on hard drives and removable media, email messages, or in the form of packets sent over computer networks.
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
White Paper Published By: Aberdeen Group
Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
This whitepaper will examine some best practices for managing BitLocker®, as well as discuss how to more easily integrate BitLocker encryption into your security program and reduce the overhead of both key management and reporting.
White Paper Published By: Globalsign Inc.
Published Date: Apr 01, 2011
This white paper examines how states like Massachusetts have implemented one of the most stringent and far-reaching requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
White Paper Published By: NetIQ
Published Date: Jan 12, 2011
This report is a deep dive into a potential way in which you could use the concepts of the Zero Trust Model and conceivably implement them in a real-world environment.
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
White Paper Published By: Safenet
Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
White Paper Published By: Safenet
Published Date: Oct 11, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
White Paper Published By: SafeNet
Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
White Paper Published By: SafeNet
Published Date: Oct 06, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
White Paper Published By: SafeNet
Published Date: Sep 15, 2010
This paper offers a detailed look at tokenization and offers practical guidelines for helping organizations successfully employ tokenization so they can maximize the potential benefits.
White Paper Published By: IBM
Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
White Paper Published By: Symantec.cloud
Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
White Paper Published By: IBM Software
Published Date: Aug 04, 2010
The path to creating a secure application begins by rigorously testing source code for all vulnerabilities and ensuring that use of the application does not compromise or allow others to compromise data privacy and integrity.
White Paper Published By: SafeNet
Published Date: Jul 13, 2010
The information presented in this white paper discusses various approaches to cryptography and
key management, and can be used as a starting point for developing an effective policy-based key
management solution.
White Paper Published By: SafeNet
Published Date: Jul 13, 2010
This white paper is the second in a series following An Enterprise Guide to Understanding Key Management which introduces different types of cryptography and keys used in modern data protection applications.
White Paper Published By: SafeNet
Published Date: Jul 13, 2010
To add extra protection for confidential data while reducing the time and cost for achieving regulatory compliance, many organizations will benefit from integrating tokenization into their SafeNet solution.
White Paper Published By: Mocana
Published Date: Jun 22, 2010
Learn how Mocana's NanoSSH can speed your product development while providing best-in-class SSH services custom-built for device environments. Download the NanoSSH whitepaper and receive a free trial.
White Paper Published By: Mocana
Published Date: Jun 18, 2010
Mocana's NanoCrypto is one of the smallest, fastest, and most complete cryptography engines designed for embedded systems. Download the NanoCrypto whitepaper and receive a free trial.
White Paper Published By: Proofpoint
Published Date: Apr 23, 2010
This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
White Paper Published By: Proofpoint
Published Date: Apr 22, 2010
Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions.