File Encryption White Papers

(View All Report Types)
Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

10 Tips for Managing Security in the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

Dell, Inc. and Intel®

Faster Application Development via Improved Database Change Management
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Embarcadero® Change Manager™ puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team.
Posted: 01 Apr 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

Five Best Practices for Protecting Backup Data
sponsored by Iron Mountain.
WHITE PAPER: Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Iron Mountain.

Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
WHITE PAPER: This data sheet highlights the benefits of a backup solution for built for laptops and desktops.
Posted: 24 Feb 2014 | Published: 31 Mar 2013

Acronis

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Simplify SSL Certificate Management Across the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
Posted: 07 May 2012 | Published: 07 May 2012

Symantec Corporation

eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by TechTarget Security
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

TechTarget Security

Oracle Database 11g Release 2 High Availability
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 12 Mar 2012 | Published: 31 Oct 2010

Oracle Corporation

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric