Vormetric

Results: 67



#Item
41!  Case Study Staffordshire schools lock down data with DESlock+  Summary

! Case Study Staffordshire schools lock down data with DESlock+ Summary

Add to Reading List

Source URL: download.deslock.com

Language: English - Date: 2014-05-01 10:18:28
42File Protecting the Data That Drives Business® File Security Audit and Protect Unstructured Data Cutting edge Imperva SecureSphere File Security products:

File Protecting the Data That Drives Business® File Security Audit and Protect Unstructured Data Cutting edge Imperva SecureSphere File Security products:

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2012-05-04 00:16:19
43SecaaS Implementation Guidance  Category 8 // Encryption September 2012

SecaaS Implementation Guidance Category 8 // Encryption September 2012

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2013-06-17 10:11:08
44Thales nShield Wins Best Encryption Product in Info Security Products Guide Global Excellence Awards Encryption and key management have become strategic business issues to address compliance and manage risk associated wi

Thales nShield Wins Best Encryption Product in Info Security Products Guide Global Excellence Awards Encryption and key management have become strategic business issues to address compliance and manage risk associated wi

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:31
45TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-12-03 08:32:10
46Microsoft Word - Field Encryption Press Release

Microsoft Word - Field Encryption Press Release

Add to Reading List

Source URL: www.enforcive.com

Language: English - Date: 2013-10-10 00:00:01
47ORACLE KEY VAULT FAQ  Frequently Asked Questions Oracle Key Vault Oracle Key Vault (OKV) enables customers to easily deploy encryption and other security solutions by

ORACLE KEY VAULT FAQ Frequently Asked Questions Oracle Key Vault Oracle Key Vault (OKV) enables customers to easily deploy encryption and other security solutions by

Add to Reading List

Source URL: www.oracle.com

Language: English
48Use Case: Cloud Healthcare with HIPAA Compliance and Safe Harbor The End-User The Company: An innovative healthcare ISV that provides Healthcare Revenue Cycle Management (HRCM) solutions, online medical scheduling, PHR o

Use Case: Cloud Healthcare with HIPAA Compliance and Safe Harbor The End-User The Company: An innovative healthcare ISV that provides Healthcare Revenue Cycle Management (HRCM) solutions, online medical scheduling, PHR o

Add to Reading List

Source URL: www.porticor.com

Language: English - Date: 2014-03-24 18:00:20
49RSAC15_South_Hall_1-02-15

RSAC15_South_Hall_1-02-15

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-01-02 14:22:48
50DATASHEET  File Security Audit and Protect Unstructured Data Unmatched Auditing and Protection for File Data Products

DATASHEET File Security Audit and Protect Unstructured Data Unmatched Auditing and Protection for File Data Products

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2014-04-16 16:07:02