MS Office

Data encryption News

View All News

Data encryption Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data encryption Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Get to know new versions of Microsoft’s Office productivity suite

    The newest versions of Microsoft's Office productivity suite are an interesting departure from the Office of old. There are several versions and editions of Office, and each one offers something a little bit different. There's the well-known local desktop version, Office 2016, and the relative newcomer, cloud-based Office 365. The apps in each are comparable, but Office 365 offers more flexibility with its access-from-anywhere model.

    Companies and IT administrators need to know what they're getting from the different Office editions -- and smaller shops are not exclusively limited to the Office for Business versions. Businesses must also consider whether to deliver the mobile or desktop version, and they might even find it's time to switch to the cloud-based subscription suite. One bright spot in this migration process is that Microsoft has added security features to Office 2016, so moving off an older version could improve existing security measures. This handbook outlines everything businesses need to know about choosing which Office to deliver to users.

     Continue Reading

  • Does encrypting data make access harder for regulators?

    Encrypting data going to the cloud is a security best practice, but does it add extra challenges for regulators that might need to access the data? Expert Mike Chapple discusses. Continue Reading

  • Do PCI compliance standards matter when merchants sell off-site?

    Merchants that sell at off-site venues need to take extra care to follow PCI compliance standards. Expert Mike Chapple discusses how organizations can do this. Continue Reading

View All Evaluate

Manage Data encryption

Learn to apply best practices and optimize your operations.

  • Are Amazon devices running on the latest Fire OS 5 secure?

    Amazon disabled native encryption capabilities in the latest Fire OS version. Expert Michael Cobb explains what this means for security, and if encryption can be reinstated. Continue Reading

  • Mobile risk management falls short in Global 2000

    The majority of companies lack mobile policies around access and storage of corporate data, according to one study. Is your organization one of them? Continue Reading

  • Enterprise mobile strategy: Step up security

    CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization to protect the data layer. An effective enterprise mobile strategy can increase employee productivity, but how can security programs strike a balance between user experience and information security? In this issue of Information Security, we talk to companies about their enterprise mobile strategies to find out what works and what doesn't.

    Even with all the momentum in advanced authentication, some enterprises show no signs of moving beyond usernames and passwords. Why isn't advanced authentication, such as one-time passwords or multifactor authentication (MFA), widely deployed? Despite the challenges of implementing and maintaining strong authentication methods, they provide significant benefits over password-only authentication mechanisms. The consumerization of MFA may lower costs. We look at strong authentication strategies and best practices for these methods on premises and in the cloud.

    Also, we continue our Readers' Top Picks series with a look at enterprise encryption tools. TechTarget polled 1,435 IT and security professionals at medium-to-large enterprises who told us that they have active encryption projects or technology purchases in the next 12 months. Look for a shortlist of products and features from readers who plan to invest in enterprise encryption tools.

     Continue Reading

View All Manage

Problem Solve Data encryption Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close