Vormetric

Results: 67



#Item
41Data security / Advanced Encryption Standard / Encryption / Vormetric / BitLocker Drive Encryption / Cryptography / Disk encryption / Cryptographic software

! Case Study Staffordshire schools lock down data with DESlock+ Summary

Add to Reading List

Source URL: download.deslock.com

Language: English - Date: 2014-05-01 10:18:28
42Cyberwarfare / Imperva / Database activity monitoring / Cloud computing / Application firewall / Microsoft SharePoint / Threat / Vormetric / Database security / Computer network security / Computing / Computer security

File Protecting the Data That Drives Business® File Security Audit and Protect Unstructured Data Cutting edge Imperva SecureSphere File Security products:

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2012-05-04 00:16:19
43Computer security / Crime prevention / National security / Computer network security / Encryption / Cloud computing security / Cloud computing / Public-key cryptography / Vormetric / Security / Cryptography / Computing

SecaaS Implementation Guidance Category 8 // Encryption September 2012

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2013-06-17 10:11:08
44Crime prevention / Information security / National security / Public safety / Vormetric / Security / Computer security / Data security

Thales nShield Wins Best Encryption Product in Info Security Products Guide Global Excellence Awards Encryption and key management have become strategic business issues to address compliance and manage risk associated wi

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:31
45Computing / Transparent Data Encryption / Cross-platform software / Message authentication codes / Oracle Corporation / Oracle Database / HMAC / Vormetric / Cryptography standards / Cryptography / Software / Disk encryption

TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-12-03 08:32:10
46National security / Mass surveillance / National Security Agency / United States government secrecy / Data security / Linoma Software / Vormetric / Security / Disk encryption / Cryptography

Microsoft Word - Field Encryption Press Release

Add to Reading List

Source URL: www.enforcive.com

Language: English - Date: 2013-10-10 00:00:01
47Oracle Database / Transparent Data Encryption / Oracle Linux / Oracle Exadata / Oracle VM / Vormetric / Oracle Application Server / Software / Computing / Oracle Corporation

ORACLE KEY VAULT FAQ Frequently Asked Questions Oracle Key Vault Oracle Key Vault (OKV) enables customers to easily deploy encryption and other security solutions by

Add to Reading List

Source URL: www.oracle.com

Language: English
48Data privacy / Health Insurance Portability and Accountability Act / Privacy law / Cloud computing / Law / Cryptography / Vormetric / Transparent Data Encryption / Computer security / Computing / Disk encryption

Use Case: Cloud Healthcare with HIPAA Compliance and Safe Harbor The End-User The Company: An innovative healthcare ISV that provides Healthcare Revenue Cycle Management (HRCM) solutions, online medical scheduling, PHR o

Add to Reading List

Source URL: www.porticor.com

Language: English - Date: 2014-03-24 18:00:20
49Technology / Deep packet inspection / Mass surveillance / Surveillance / Call-recording software / Verint Systems / Imperva / Check Point / Vormetric / Computing / Computer network security / Computer security

RSAC15_South_Hall_1-02-15

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-01-02 14:22:48
50Security / Imperva / Database security / Microsoft SharePoint / File system / Application firewall / Access control / Threat / Vormetric / Computer security / Computing / Computer network security

DATASHEET File Security Audit and Protect Unstructured Data Unmatched Auditing and Protection for File Data Products

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2014-04-16 16:07:02
UPDATE