Encryption

Encryption is the process of obscuring information to make it unreadable without special knowledge. Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on hard drives and removable media, email messages, or in the form of packets sent over computer networks.
Results 226 - 250 of 357Sort Results By: Published Date | Title | Company Name
White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs
    
WatchGuard Technologies
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -California edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Massachusetts Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Michigan Edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Nevada edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Washington edition
Tags : 
messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data
    
Symantec.cloud
White Paper Published By: Unitrends     Published Date: Apr 12, 2010
The purpose of deduplication is to provide more storage, particularly backup storage, for less money, right? Then wouldn't it be ridiculous if deduplication vendors were demanding that their customers pay more per terabyte of storage? Or if they were simply pushing the task of integrating, monitoring, and managing deduplication back onto their users?
Tags : 
unitrends, backup, data protection, data quality, server
    
Unitrends
White Paper Published By: F5 Networks Inc     Published Date: Feb 25, 2010
Learn how Domain Name System Security Extensions (DNSSEC) can add security to DNS while maintaining the backward compatibility needed to scale with the Internet as a whole.
Tags : 
dnssec, dns cache poisoning, domain name system security extensions, encryption, deployment
    
F5 Networks Inc
White Paper Published By: ESET     Published Date: Feb 17, 2010
This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry.
Tags : 
eset, teaching heuristics, anti-malware, encryption, polymorphism
    
ESET
White Paper Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
Part 2 - Security tools that can boost Windows mobile security. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.
Tags : 
microsoft, windows phone, mobile security, security tools, smartphone
    
Microsoft Windows Phone
White Paper Published By: IBM ILOG.     Published Date: Dec 11, 2009
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM RedpaperT publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL.
Tags : 
ibm redpaper, websphere ilog rules, cobol, code, cics channels and containers
    
IBM ILOG.
White Paper Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments
    
IBM
White Paper Published By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : 
webroot, email security, threats, spam, data security policy
    
Webroot UK
White Paper Published By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : 
webroot, encrypted email, file transfer encryption, email server, content interception
    
Webroot UK
White Paper Published By: Entrust Datacard     Published Date: Nov 10, 2009
This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.
Tags : 
pki, digital certificates, hosted certificates, managed services pki, managed certificates
    
Entrust Datacard
White Paper Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats
    
McAfee Inc
White Paper Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
In order to ensure that your visitors can see that your Web site has passed Extended Validation (EV) authentication, VeriSign created VeriSign® EV UpgraderT-the first-ever solution to enable all visiting Windows® Internet Explorer® 7 (IE7) browsers to detect EV SSL Certificates and display them appropriately.
Tags : 
ssl, ssl technology, verisign, trust, seal
    
VeriSign Incorp.
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals
    
McAfee Inc
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
Email is an indispensible tool for businesses today, but it's also a favorite vehicle for spammers and cybercriminals. This brief explains the key benefits of implementing an email security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security
    
McAfee Inc
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, hackers, security
    
McAfee Inc
White Paper Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Stay ahead of online security attacks, such as phishing, by understanding how they work. Read this white paper to learn how phishing attacks work, and how to avoid them.
Tags : 
verisign, phishing, extended validation, ev ssl, ssl
    
VeriSign Incorp.
White Paper Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Provide site visitors visual cues that indicate your site is legitimate with Extended Validation (EV) SSL available from VeriSign.  Read this paper to learn how to increase site visitor confidence in your site. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl
    
VeriSign Incorp.
White Paper Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Enhance your online brand with trusted security from VeriSign.  In this paper you will gain insights on how to encrypt sensitive information and help improve customer confidence. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl
    
VeriSign Incorp.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.