May 18, 2017
BackupAssist has rebuilt its data protection product with data deduplication, compression, multicloud support and AES encryption for the SMB Hyper-V market.
April 22, 2016
Apple's enterprise security features draw praise from IT pros who say iOS data protection and encryption make the operating system a strong business platform.
December 31, 2015
News roundup: China passes anti-terror law requiring tech firms' help on surveillance, while new analysis of North Korea's Red Star OS shows different approach to cybersecurity.
December 17, 2015
Amazon's Aurora database now offers encryption at rest, which could help with international data security concerns as European law is clarified.
AES Get Started
Bring yourself up to speed with our introductory content
Expert contributor Karen Scarfone takes a look at Voltage SecureMail for encrypting email messages in the enterprise. Continue Reading
We're not sure a public cloud is right for us, as we have high standards for data privacy. How does AWS encrypt data, and what key management options does it offer? Continue Reading
Android is one of the most widely used mobile operating systems, but its openness and diversity create application security challenges. Learn what IT can do to fight back. Continue Reading
Evaluate AES Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google offers various encryption options for its public cloud, from default server-side to customer-supplied keys. Learn where its Key Management Service falls in that mix. Continue Reading
Expert contributor Karen Scarfone examines DataMotion SecureMail software for encrypting email messages in the enterprise. Continue Reading
For all the gripes enterprises have about MPLS, one point of contention remains: Branches directly connected to the Internet don't feel safe. Is that still true in the age of SD-WAN? Continue Reading
Learn to apply best practices and optimize your operations.
Don't let backup data encryption fall through the cracks. When encrypting backups, key management and compression are just two of the best practices for optimum security. Continue Reading
Encryption is a powerful tool, but its implementation presents its own set of perils. CISOs weigh in on data privacy and key management strategies. Continue Reading
Emerging security technology channels basic logging tools and ancient cultures as IT execs turn to old-school tech to protect precious data. Continue Reading
Problem Solve AES Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Bar Mitzvah attack exploits weaknesses in the RC4 algorithm. Expert Nick Lewis explains why migrating from RC4 is better than adding additional security controls to secure it. Continue Reading
Wireless connection problems can crop up when joining a wireless client to an office network. These step-by-step debugging tips can help. Continue Reading
Wi-Fi has revolutionized the enterprise by not only extending network coverage in a particular building or campus, but also by enabling on-the-go working, be it from a coffee shop or a hotel room. Yet, while these improvements reduce employee downtime and increase efficiency, Wi-Fi has had a significant impact on network security; many security measures of yesteryear are simply ineffective today.
Whether your enterprise has already adopted Wi-Fi or is evaluating the technology, there are several considerations to keep in mind.
In this Technical Guide, wireless security expert Lisa Phifer examines the rise in Wi-Fi popularity and explains why going beyond the basics is essential to Wi-Fi security. Then, Phifer outlines tools that can help enterprises overcome the difficult task of provisioning WLAN access to the plethora of mobile devices and platforms infiltrating the enterprise that require corporate network access. Finally, expert Brad Casey discusses the effects 802.11ac, commonly referred to as Gigabit Wi-Fi, will have on enterprise wireless network security.
As the corporate environment grows more disparate and globally divided, it will become more critical than ever to use Wi-Fi to maintain connectivity, productivity and profitability. However, without the proper security measures in place, enterprises risk falling victim to wireless intruders, having sensitive data stolen and more.
This Technical Guide offers the expertise you need to integrate Wi-Fi security into your enterprise's overarching network security strategy and maintain security in the age of wireless connectivity. Continue Reading