System News
 1 2 3 4 5 6 7 8 next
Articles for the keywords: key management
13 Mar 2017 Zix Wins 5-Vendor Email Encryption Shootout [61552]
Network World, March 13th, 2017

"Email encryption has come a long way since our last review...

Email encryption products have made major strides since we last looked at them nearly two years ago. They have gotten easier to use and deploy, thanks to a combination of user interface and encryption key management improvements, and are at the point where encryption can almost be called effortless on the part of the end user.

Our biggest criticism in 2015 was that the products couldn't cover multiple use cases, such as when a user switches from reading emails on their smartphone to moving to a webmailer to composing messages on their Outlook desktop client. Fortunately, the products are all doing a better job handling multi-modal email..."
(Get More Information . .) open to premium members only

20 Oct 2016 Fujitsu Develops Blockchain Technology For Confidential Data Transfer [57125]
CryptoCoinsNews, October 20th, 2016

"Blockchain technology provides information sharing with high transparency and reliability, without management by a specific trusted organization. Financial trading applications, however, have operational issues related to safely executing trades, such as key management. Document management applications bring issues in creating a system that limits which people are allowed to reference information recorded in the blockchain.

Fujitsu Laboratories of America, Inc. and Fujitsu Laboratories Ltd. have developed blockchain-based technologies to securely handle confidential data among multiple organizations..."
(Get More Information . .) open to premium members only

19 Oct 2016 Fujitsu Bolsters Blockchain Security Technology [57193]
Safe operation of keys enables multiple organizations to safely handle confidential data

Fujitsu Laboratories Ltd. and Fujitsu Laboratories of America, Inc. (collectively "Fujitsu Laboratories") have developed blockchain-based security technologies to safely and securely handle confidential data between multiple organizations.

The most prominent characteristic of a blockchain is that it provides information sharing with high transparency and reliability, without management by a specific trusted organization. On the other hand, in financial trading applications, there are operational issues related to safely executing trades, such as key management. In addition, document management applications preserving the original state of documents lead to issues in creating a system that could limit which people would be allowed to reference the information recorded in the blockchain.
(Get More Information . .) open to premium members only

11 Jul 2016 Encryption Finally Gaining Widespread Enterprise Adoption [54331]
eWeek, July 11th, 2016

"A Ponemon survey reports that encryption use by companies jumped 7 percent to 41 percent, the largest increase in the 11-year history of the report.

For a long time, encryption was like drinking prune juice or taking castor oil for employees in an enterprise - they only used it when they absolutely had to.

No so anymore. Encryption for data storage and email security is now almost mainstream within enterprises, largely because: a) internal and cyber-security issues are at an all-time high; and b) security companies have been working hard to make encryption and key management easier to use..."
(Get More Information . .) open to premium members only

02 May 2016 Enterprise Encryption: Do The Plusses Outweigh The 'Minuses'? [52255]
SearchSecurity, May 2th, 2016

"Encryption is a powerful tool, but its implementation presents its own set of perils. CISOs weigh in on data privacy and key management strategies...

The POODLE attack caused many organizations to update their security practices to avoid enterprise encryption vulnerabilities caused by client or server fallbacks to Secure Sockets Layer 3.0, an older but widespread communications protocol used to encrypt data in transit. Google is credited with identifying the SSL 3.0 vulnerability in October 2014..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 next






!-- end archive_section.tpl -->