Premium Content

Access "Data encryption best practices "

1008L_ebook_Encryption_V1_11.10_Q6_new.PNG

Sponsored by TechTarget

Ever since Bank of America disclosed in 2005 that it lost a backup tape with customers’ personal data, nearly 80 other companies have reported similar embarrassing mishaps. These data breaches and new regulatory mandates are fueling the exploding interest in encryption. This exclusive e-book evaluates today's encryption technologies from all angles and projects trends to give you a complete picture of today's encryption landscape. Access this resource today.  Access >>>

Table of contents

  • Backup encryption
  • Intrusion prevention and encryption
  • Laptop encryption
  • Database encryption

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Next-generation firewalls play by new rules
    ism_cover_0913.png
    E-Zine

    Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...

  • Developing your endpoint security management transition plan
    endpoint_security_management_cover_0913.png
    E-Handbook

    This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...

  • Unlock new pathways to network security architecture
    ISM_august_2013.png
    E-Zine

    Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...