Vormetric

Results: 67



#Item
51X86 architecture / Xeon / Intel / Microprocessor / MongoDB / AES instruction set / Intel Core / Itanium / Computer architecture / Computer hardware / Computing

Solution Brief Intel® Xeon® processor E5 v3 Family Big Data Security Strong Security with High Performance for Real-Time, Big Data Deployments

Add to Reading List

Source URL: www.vormetric.com

Language: English - Date: 2014-09-08 02:40:24
52Cyberwarfare / National security / Data security / Crime prevention / Information security / Internet privacy / Data breach / Malware / Advanced persistent threat / Computer security / Security / Computer network security

Vormetric Presentation Title

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2013-06-11 07:47:37
53Computing / Internet / Computer security / Email encryption / Encryption / Vormetric / Network Security & Cryptography / Internet privacy / Email / Cryptography

Success Story Securing Financial Data a Top Priority District of Columbia Retirement Board protects public pensions

Add to Reading List

Source URL: www.zixcorp.com

Language: English
54Advanced Encryption Standard / FIPS 140-2 / FIPS 140 / Cryptographic software / Critical Security Parameter / HMAC / Zeroisation / Microsoft CryptoAPI / Security and safety features new to Windows Vista / Cryptography / Cryptography standards / Message authentication codes

Microsoft Word - Vormetric Security Policy1.05.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-11-26 00:00:00
55Cryptography / Hypervisor / Hyper-V / Cloud computing / Encryption / Cloud infrastructure / Virtual machines / Vormetric / IBM cloud computing / System software / Software / Computing

PDF Document

Add to Reading List

Source URL: hytrust.com

Language: English - Date: 2014-07-22 13:31:54
56Internet standards / Cryptographic software / Computer network security / Disk encryption / Transparent Data Encryption / Transport Layer Security / Encrypting File System / Vormetric / Computing / Cryptography / Computer security

Transparent Data Encryption (TDE) The biggest obstacles for people to use encryption technologies are additional burden and required level of expertise. The Transparent Data Encryption helps the user to focus on the comm

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:22:24
57Distributed computing / Cryptography / Data security / Heartland Payment Systems / Cloud computing / Tokenization / Data center / Vormetric / Linoma Software / Computing / Data management / Concurrent computing

Corporate Fact Sheet Introduction Voltage Security provides data-centric security and stateless key management solutions to combat new security threats and address compliance requirements by protecting structured and un

Add to Reading List

Source URL: www.prianto.com

Language: English - Date: 2013-03-08 10:05:06
58Computer security / Crime prevention / National security / Data security / Malware / Threat / Vulnerability / Information security / Network security / Security / Computer network security / Cyberwarfare

Research Conducted by 2014 INSIDER THREAT

Add to Reading List

Source URL: enterprise-encryption.vormetric.com

Language: English - Date: 2014-10-20 02:41:20
59Data security / Public safety / Cryptography / Computer security / Data at Rest / Information security / Plaintext / Backup / Vormetric / Security / Crime prevention / National security

ITB[removed]Data Encryption and Securing Sensitive Information

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:45:14
60Cryptography / Hypervisor / Hyper-V / Cloud computing / Encryption / Cloud infrastructure / Virtual machines / Vormetric / IBM cloud computing / System software / Software / Computing

PDF Document

Add to Reading List

Source URL: www.hytrust.com

Language: English - Date: 2014-07-22 13:31:54
UPDATE