Email Alerts
-
Data protection services guide: A resource for solution providers
Data protection is a major concern for any customer company, regardless of what vertical they're in or the size of their company. This data protection guide will get solution providers prepared to work with customers on data protection. Learning Guide
-
Encryption software vendors
Use our Partner Program Directory to choose an encryption software vendor partner. Whether you are looking for a new partner program or want to see what your competition's partner programs are like, our easy-to-read checklists will help you weigh the... Partner Program Directory
-
Myth 3: Encryption is scary
Encryption is helpful for both companies and consumers. Data is stored more safely when encryption is used according to government regulations, relieving companies of liability and consumers of worry. Learn why you shouldn't be afraid of encryption. Top 5 Myths
-
Encryption can save data security breaches
Data security breaches can harm both an enterprise's bottom line and its reputation. A survey found that when it comes to data security breaches, many companies are far too reactive. Rob Scott, managing partner of the law firm of Scott and Scott, LLP... Executive Briefing
-
Channel executives see need to bolster hospital IT security
Regulations leave hospitals scrambling to strengthen security. Channel executives are helping hospitals implement IAM, DLP and encryption technology -- albeit on a budget. News | 05 Apr 2012
-
Secure online backup services come with pitfalls for solution providers
Security solution providers can get into the secure online backup service market by leveraging their security expertise, especially in terms of data protection. Secure online backup services can potentially provide recurring revenue for security solu... Article | 05 Oct 2009
-
Security channel can't ignore full-disk encryption products, services
Full-disk encryption products and services present a huge opportunity for solution providers. The products, which were once considered "nice to have," are now a necessity for many companies. Learn how this market has evolved, as well as how you can h... Article | 27 Jul 2009
-
Sophos integrates encryption into endpoint, email security
Sophos Endpoint Security and Data Protection is the first software to integrate encryption from its acquisition of Utimaco in 2008. Article | 02 Jun 2009
-
Regulatory compliance requirements for security solutions providers
Customers aren’t the only firms that need to comply with regulations. In many cases, solution providers need to be compliant, too. Tip
-
Practicing defense-in-depth: Implementing a defense-in-depth strategy
Implementing a defense-in-depth strategy can protect your customers’ Web applications from attack. Take a layered approach with intrusion prevention, encryption and code review. Tip
-
Helping customers comply with data privacy laws by state
Data privacy laws vary by state, yet your client must follow the law of every state in which they have a customer or employee. Richard Mackey explains how to cope with it all. Tip
-
PCI guide: PCI DSS documentation, resources for solution providers
Beyond basic PCI DSS assessments and reporting, solution providers may need to access PCI DSS documents for emerging technologies and other standards, as detailed in this guide. Tip
-
Security product specialization key for Oracle VAR success
Considering adding an Oracle security product to your line card? This article will guide your choice based on your current skill set. Tip
-
Evaluating options for portable hard drive and USB key encryption
To protect your customers' data on portable media, should you choose a hardware or software encryption solution? Security expert Joel Snyder compares your options. Tip
-
Data encryption methods: Lay out the options for your customer
Rich Mogull of Securosis explains why partners need to live up their name and team up with customers on encryption implemenation and integration. Tip
-
How to address HIPAA data encryption security challenges
With patient information security mandates gaining momentum in states across the nation, full disk encryption may be a part of your customers' defense strategy. Learn how to help. Tip
-
How to choose online data backup services for data protection
SaaS-based data backup cuts costs and management overhead, but you're not outsourcing your security responsibilities. Tip
-
Mass. data security law changes: A risk-based compliance approach
The Massachusetts data security law 201 CMR 17.00 has been revised since its first incarnation, and the changes may lead to more opportunities for solution providers. In this tip, learn what the law's new risk-based compliance approach means for solu... Tip
- See More: Tips on Data encryption implementations
-
data recovery agent (DRA)
A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users. The assignment of DRA rights to an approved individual provides an IT department with a way to unlock encrypte... Definition
-
Enterprise encryption strategy: The path to simple data encryption
This primer on enterprise encryption strategy covers use cases for various devices and data types, and offers strategies for simple data encryption. Video
-
Channel executives see need to bolster hospital IT security
Regulations leave hospitals scrambling to strengthen security. Channel executives are helping hospitals implement IAM, DLP and encryption technology -- albeit on a budget. News
-
Regulatory compliance requirements for security solutions providers
Customers aren’t the only firms that need to comply with regulations. In many cases, solution providers need to be compliant, too. Tip
-
Enterprise encryption strategy: The path to simple data encryption
This primer on enterprise encryption strategy covers use cases for various devices and data types, and offers strategies for simple data encryption. Video
-
Practicing defense-in-depth: Implementing a defense-in-depth strategy
Implementing a defense-in-depth strategy can protect your customers’ Web applications from attack. Take a layered approach with intrusion prevention, encryption and code review. Tip
-
Helping customers comply with data privacy laws by state
Data privacy laws vary by state, yet your client must follow the law of every state in which they have a customer or employee. Richard Mackey explains how to cope with it all. Tip
-
PCI guide: PCI DSS documentation, resources for solution providers
Beyond basic PCI DSS assessments and reporting, solution providers may need to access PCI DSS documents for emerging technologies and other standards, as detailed in this guide. Tip
-
Security product specialization key for Oracle VAR success
Considering adding an Oracle security product to your line card? This article will guide your choice based on your current skill set. Tip
-
data recovery agent (DRA)
A data recovery agent (DRA) is a Microsoft Windows user who has been granted the right to decrypt data that was encrypted by other users. The assignment of DRA rights to an approved individual provides an IT department with a way to unlock encrypte... Definition
-
Evaluating options for portable hard drive and USB key encryption
To protect your customers' data on portable media, should you choose a hardware or software encryption solution? Security expert Joel Snyder compares your options. Tip
-
Data encryption methods: Lay out the options for your customer
Rich Mogull of Securosis explains why partners need to live up their name and team up with customers on encryption implemenation and integration. Tip
- See More: All on Data encryption implementations
About Data encryption implementations
Get tips and tricks and best practices on data encryption implementation. Learn how to implement data encryption technologies, software and applications to prevent data theft and security breaches.