Encryption White Papers

Encryption is the process of obscuring information to make it unreadable without special knowledge. Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on hard drives and removable media, email messages, or in the form of packets sent over computer networks.
Results 1 - 25 of 357Sort Results By: Published Date | Title | Company Name
By: Proofpoint     Published Date: May 17, 2017

In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.

Tags : proofpoint, ransomware, intrusion prevention, cyberattack, data protection, network security, encryption, wireless security, it spending, email archiving, vulnerability management, business technology
    
By: Kaspersky     Published Date: Feb 06, 2017

As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.

Tags : ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones, wireless security, data protection, database security
    
By: Kaspersky     Published Date: Feb 06, 2017

The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.

Tags : cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack, hacker detection, intrusion prevention, data protection, database security
    
By: Cisco     Published Date: Jun 16, 2016

As much as the Digital Economy and the Internet of Everything (IoE) create opportunities for companies and consumers - over $19 trillion in value to organizations over the next decade - they also create opportunities for hackers and cybercriminals. With an expanded attack surface represented by the IoE, cybercriminals look to cash in on the estimated value of $450 billion to over $1 trillion of the Hacker Economy.

Tags : security, technology, digital, cyber attack, data, access control, anti spyware, application security, encryption, internet security
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.

Tags : kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions, application security, authentication, encryption, security management, security policies
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

Download this paper now to learn how you can prevent such an attack and protect your business

Tags : prevent cyber-attacks, cyber-attacks, security application, security, anti spam, anti spyware, anti virus, application security, encryption, firewalls, internet security, security management
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.

Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware, anti virus, application security, encryption, internet security, intrusion detection, intrusion prevention, security management, data loss prevention
    
By: Kaspersky     Published Date: May 11, 2016

You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Tags : kaspersky, ransomware, encyyption, data access, email security, company security, network security, access control, encryption, hacker detection, intrusion prevention, wireless security, data protection, mobile device management
    
By: Code42     Published Date: Apr 22, 2016

The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.

Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, security management, data loss prevention
    
By: Code42     Published Date: Apr 22, 2016

Read this whitepaper to find out strategic solutions to your data protection issues.

Tags : data protection, data control, code 42, data visibility, encryption, hacker detection, network security appliance, security management
    
By: CarbonBlack     Published Date: Mar 16, 2016

It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.

Tags : application control, advanced threats, security, proactivity approaches, security, application security, email security, encryption, security management, security policies
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper reveals how Entrust Authority Security Manager helps organisations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.

Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures, access control, application security, authentication, identity management, password management, pki
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper reveals how Entrust Authority Security Manager helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.

Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures, application security, authentication, identity management, internet security, password management, pki
    
By: Entrust Datacard     Published Date: Nov 24, 2015

Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.

Tags : ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates, erp, security verification, authentication, access control, application security, disaster recovery, encryption, identity management, password management, security management
    
By: Entrust Datacard     Published Date: Nov 24, 2015

Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.

Tags : ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform, entrust, security, certificates, erp, security verification, authentication, access control, application security, disaster recovery, encryption, identity management, password management, security management
    
By: Entrust Datacard     Published Date: Nov 24, 2015

This whitepaper reveals how tools available from Entrust offer one of the most cost-effective solutions to these problems.

Tags : entrust solutions, certificates, security, security application, authority, security management, access control, application security, authentication, disaster recovery, encryption, identity management, internet security, intrusion detection, intrusion prevention
    
By: Intel Security     Published Date: Oct 20, 2015

Gartner Magic Quadrants offer visual snapshots, in-depth analyses and actionable advice that provide insight into a market's direction, maturity and participants.

Tags : data protection, mobile, security, storage management, encryption, best practices
    
By: Sophos     Published Date: Oct 07, 2015

This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.

Tags : unified threat management, firewalls, utm, firewall solutions, security, security technology, protection, utm systems, network security, application security, email security, encryption, internet security
    
By: Sophos     Published Date: Oct 07, 2015

This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

Tags : endpoint buyers, vendors, endpoint security solution, antivirus, security solutions, security, security threats, endpoint buyers guide, endpoint security solution, application security, disaster recovery, email security, encryption, firewalls, intrusion detection, intrusion prevention
    
By: Venafi     Published Date: Aug 07, 2015

Most organisations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative.

Tags : eliminate blind spots, ssl, security, security application, anti spam, anti spyware, anti virus, application security, encryption
    
By: Venafi     Published Date: Jul 27, 2015

See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.

Tags : security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform, application security, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, vulnerability management
    
By: Venafi     Published Date: Jul 27, 2015

To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.

Tags : cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates, security controls, access control, application security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, ssl, web service security, vulnerability management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.