Encryption Security White Papers

(View All Report Types)
Strengthening Enterprise Security through Notebook Encryption
sponsored by Intel Corporation
WHITE PAPER: Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.
Posted: 02 Apr 2009 | Published: 01 Dec 2008

Intel Corporation

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
sponsored by Lumension
WHITE PAPER: Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

Lumension

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

7 Reasons Businesses are Shifting to Cloud Backup
sponsored by CoreVault
WHITE PAPER: Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

CoreVault

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Faster Application Development via Improved Database Change Management
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Embarcadero® Change Manager™ puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team.
Posted: 01 Apr 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

Oracle Database - The best choice for Siebel Applications
sponsored by Oracle Corporation
WHITE PAPER: This white paper covers the business and technology reasons behind customers' continued choice of Oracle Database for their Siebel Applications deployments.
Posted: 08 Jun 2011 | Published: 30 Apr 2010

Oracle Corporation

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Implementing Tokenization Is Simpler Than You Think
sponsored by First Data Corporation
WHITE PAPER: A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

First Data Corporation