SafeNet

Data encryption News

View All News

Data encryption Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data encryption Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Data encryption

Learn to apply best practices and optimize your operations.

  • How can you whitelist apps and fight ransomware with AppLocker?

    With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading

  • Three basic Windows 10 security tips to keep in mind

    There is so much to keep in mind with Windows 10 security it's easy to overlook the essentials. Get back to basics and remember to keep an eye on updates, encryption and users. Continue Reading

  • Not playing games: The GPU vs. CPU question gets more interesting

    Putting thousands of cores to work makes perfect sense when you're powering a video game. But graphics processing units, or GPUs, can't serve much practical purpose in a corporate data center, can they?

    The GPU vs. CPU discussion isn't as odd as it sounds. In fact, a more broad application of GPUs in the data center can provide the processing punch that CPUs simply cannot. With tasks where data can be processed in parallel rather than in sequence, GPUs might be a particularly valuable tool. The cover story in this issue of Modern Infrastructure looks at scenarios where simultaneous processing can be just what's needed, such as with machine learning and artificial intelligence.

    This month's Modern Infrastructure also looks at how data can be protected while in the data center. Full encryption is seemingly a perfect defense for data theft. But that's a difficult -- and, to some, an unrealistic-- road to travel. We look at how an IT team can better safeguard its data, factoring in costs, the tools available and the tradeoffs involved in hack-proofing an organization's data.

    And what about the vulnerabilities that arise from within your business? We examine the risk of data loss posed by the shadow IT phenomenon, an ongoing and ever-changing challenge.

    It's clear that data is an increasingly valuable resource. Processing it and keeping it safe -- whether that entails taking up the question of GPU vs. CPU for certain workloads or upgrading encryption -- need to be priorities for IT professionals in organizations of all sizes and types.

     Continue Reading

View All Manage

Problem Solve Data encryption Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close