Data encryption News
April 28, 2015
The latest Dell SonicWALL TZ is faster than previous firewall models and better equipped to protect SSL traffic.
March 30, 2015
The PCI Security Standards Council has confirmed that PCI DSS 3.1 will be released in just a few weeks. According to a Gartner analyst, the surprise new release could cause major problems for merchants.
March 27, 2015
SearchYourCloud's new tool gives users a way to search multiple cloud sync-and-share services on mobile and desktops, with file-level security.
March 10, 2015
New encryption controls, launched about a month ago, are among four new product enhancements being offered by Box to boost security in the cloud.
Data encryption Get Started
Bring yourself up to speed with our introductory content
As the prospect of significant breaches grows, the argument for secure file transfer becomes more compelling—but what exactly are you buying?
At its most basic, file transfer technology is simply a mechanism to transport a file from one system to another system over a network. Secure file transfer also involves some sort of reliable delivery, even if it’s just provided by TCP/IP conventions. Most secure file transfers are based on standard protocols such as the Secure File Transfer Protocol or secure copy.
What makes file transfers confusing is that there are several ways to provide security. The most sophisticated type is known as managed file transfer, and it adds a wide variety of management, auditing, automation, security and reliability features to secure file transfers.
This Buyer’s Essentials Guide reviews the key features in secure file transfer products so readers can make an informed purchase decision. Continue Reading
For security reasons, IT departments prefer that business processes live in a different environment than personal data on mobile devices. Containerization makes that possible. Continue Reading
Password management is tricky, especially with on-premises and cloud setups. Azure's password write-back option can help with password sync problems. Continue Reading
Evaluate Data encryption Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Samsung KNOX platform has been approved by the NSA to protect classified data, but it's not without risks. Expert Michael Cobb explains. Continue Reading
The Cloud to Cloud Backup feature is part of Asigra's agentless Cloud Backup software platform. Learn how it is used in this Expert Answer. Continue Reading
HTTP/2 is close to becoming a formal Internet specification -- but how will it affect enterprise Web security? Expert Michael Cobb discusses how features, including compression and encryption, may help boost HTTP's safety. Continue Reading
Manage Data encryption
Learn to apply best practices and optimize your operations.
Security managers increasingly combine existing tools to implement an overall BYOD security posture. Key security features can make the job easier. Continue Reading
Our IT organization needs to secure customer names, but also needs to conduct searches on the entire customer database to match and merge records. Continue Reading
Thanks to mobile and cloud computing, the number of potential repositories for corporate data have increased exponentially. Traditional file storage systems, content management software and device-centric security measures can only do so much to organize and protect data that's constantly on the go. Cloud storage services, enterprise file synchronization and sharing (EFSS) and mobile content management (MCM) represent key alternatives in storing and providing access to corporate data in the new mobile cloud era. When implemented correctly, these technologies can provide secure data access to a mobile, distributed workforce. This guide explains how EFSS and MCM differ from -- and can work with -- traditional network shares to accomplish this goal. Continue Reading
Problem Solve Data encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
If your cloud provider stores your data outside of your country, does it mean you still need to follow local laws? Continue Reading
Data center technologies and strategies are evolving toward a blend of infrastructures that reside partly on-premises and partly in the cloud. More and more, IT shops are being asked to coordinate technology resources rather than simply control them. This is a change that requires a different mindset, as old habits will be broken and new strategies implemented. In the end, IT teams will adapt to a reality of on-premises and off-premises infrastructure. In the age of cloud computing, traditional data center practices seem to no longer apply. After all, if something can be run more easily and more cheaply in the cloud, why shouldn’t it be? But, of course, the questions are not so simply asked—or answered. Some organizations may choose to leave certain essential databases on-premises. Other applications are prime candidates for deployment to the cloud. Companies of all sizes are struggling to determine which components of their IT infrastructure ought to be running in the cloud and which functions belong under their own roofs. What about customer data? Should that be maintained on-premises in all situations? Or is that an old-fashioned notion that keeps a business from maximizing its IT efficiency? These types of questions are fundamental in the on-premises vs. cloud debate. IT teams need strategies and tools that will help them successfully blend on-premises and cloud technologies. Continue Reading
Wi-Fi has revolutionized the enterprise by not only extending network coverage in a particular building or campus, but also by enabling on-the-go working, be it from a coffee shop or a hotel room. Yet, while these improvements reduce employee downtime and increase efficiency, Wi-Fi has had a significant impact on network security; many security measures of yesteryear are simply ineffective today.
Whether your enterprise has already adopted Wi-Fi or is evaluating the technology, there are several considerations to keep in mind.
In this Technical Guide, wireless security expert Lisa Phifer examines the rise in Wi-Fi popularity and explains why going beyond the basics is essential to Wi-Fi security. Then, Phifer outlines tools that can help enterprises overcome the difficult task of provisioning WLAN access to the plethora of mobile devices and platforms infiltrating the enterprise that require corporate network access. Finally, expert Brad Casey discusses the effects 802.11ac, commonly referred to as Gigabit Wi-Fi, will have on enterprise wireless network security.
As the corporate environment grows more disparate and globally divided, it will become more critical than ever to use Wi-Fi to maintain connectivity, productivity and profitability. However, without the proper security measures in place, enterprises risk falling victim to wireless intruders, having sensitive data stolen and more.
This Technical Guide offers the expertise you need to integrate Wi-Fi security into your enterprise's overarching network security strategy and maintain security in the age of wireless connectivity. Continue Reading