Data at Rest

Results: 50



#Item
41System software / Cryptographic software / Apache Hadoop / Cloud computing / Cloud infrastructure / File system / Special purpose file systems / Filesystem-level encryption / Encrypting File System / Computing / Software / Disk encryption

HDFS Data at Rest Encryption, Proposal CryptoFileSystem with Transparent Encryption Support The  proposed  design builds  on  idea  from  Option #2 and Option #3 from the ‘HDFS Data at Rest  Encryptio

Add to Reading List

Source URL: issues.apache.org

Language: English
42Non-disclosure agreement / Data at Rest / Data sharing / Information / Science / Data / Intellectual property law / Information sensitivity / Labour law

INTERAGENCY DATA SHARING AGREEMENT between the STATE OF WASHINGTON OFFICE OF FINANCIAL MANAGEMENT and CENTRAL WASHINGTON UNIVERSITY

Add to Reading List

Source URL: www.erdc.wa.gov

Language: English - Date: 2012-10-25 19:22:37
43Software engineering / NSA Suite B Cryptography / Encryption / End-user development / Cryptography / Disk encryption / National Security Agency

NATIONAL SECURITY AGENCY INFORMATION ASSURANCE DIRECTORATE Commercial Solutions for Classified (CSfC) Data-at-Rest (DAR) Capability Package

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-07-22 12:31:53
44Mass surveillance / National Security Agency / United States government secrecy / Disk encryption / Cryptographic software / Cryptography / United States Department of Defense / Surveillance

Enterprise Social Network Convo Adds At-Rest Encryption To Its Servers To Better Protect Client Data Posted Dec 12, 2013 by Alex Wilhelm (@alex) Convo, an enterprise social network that competes with the now Microsoft-ow

Add to Reading List

Source URL: www.morgenthaler.com

Language: English - Date: 2013-12-12 13:09:55
45

ITSA-63 Communications Security Establishment Canada Approved Data at Rest Encryptors Interfacing with a Generic Hard Disk Drive

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: French - Date: 2014-07-22 10:37:45
    46Computing / ISO standards / Ubiquitous computing / MIFARE / HID Global / Computer security / Java Card / ISO/IEC 14443 / Card reader / Smart cards / Security / Radio-frequency identification

    LOGICAL AND PHYSICAL ACCESS SOLUTIONS Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

    Add to Reading List

    Source URL: www.planc.biz

    Language: English - Date: 2013-12-17 10:12:36
    47Symmetric-key algorithm / Cipher / Encryption / PKCS / Advanced Encryption Standard / Encrypting File System / Network Security & Cryptography / Cryptography / Public-key cryptography / Disk encryption

    Securing Data at Rest: Database Encryption Solution using Empress Embedded Database By: Srdjan Holovac © Empress Software Inc. June 2012

    Add to Reading List

    Source URL: www.empress.com

    Language: English - Date: 2012-08-03 10:25:25
    48X.509 / PKCS / Hardware security module / Public key infrastructure / Certificate authority / Public key certificate / Windows / Triple DES / Network Security Services / Cryptography / Public-key cryptography / Key management

    SecretAgent is unsurpassed at ensuring the confidentiality, integrity, and authenticity of sensitive data at-rest and in-transit. Security-conscious government agencies and corporations worldwide rely on SecretAgent to a

    Add to Reading List

    Source URL: www.infoseccorp.com

    Language: English - Date: 2009-11-06 16:41:01
    49Relational database management systems / Disk encryption / Transparent Data Encryption / Cryptographic software / Oracle Database / Relational database / SQL / Database index / Cipher / Cryptography / Data management / Computing

    Implementing Data-at-Rest Encryption within the Oracle RDBMS James Forgy RDC Software, November 2009 www.relationalwizards.com Abstract:

    Add to Reading List

    Source URL: www.relationalwizards.com

    Language: English - Date: 2013-01-23 23:49:39
    50Disk encryption / Data security / PKCS / Hardware security module / X.509 / Backup / Windows / Encryption software / Information security / Cryptography / Cryptographic software / Public-key cryptography

    SpyProof! protects sensitive data-at-rest from internal and external threats. Its intelligent use of virtual disk encryption technology protects important data with little impact on performance. SpyProof! is effective, i

    Add to Reading List

    Source URL: www.infoseccorp.com

    Language: English - Date: 2009-11-06 17:24:24
    UPDATE