What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download Now

Bring Your Own Device: How Do State and Local Governments Address the Proliferation of Employee Devices?: Whitepaper

By the end of 2012, the number of mobile devices will exceed the number of people on the planet. And in increasing numbers, government employees are using their tablets and smartphones for work—whether or not their employer has a formal bring-your-own-device (BYOD) policy. Is BYOD a bane or boon for government? Find out in the complimentary whitepaper.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

Detailed Mapping of Vormetric Data Security Platform Controls to NIST 800-53 Requirements: Whitepaper

Critical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform.


Effects of Unexpected Power Interruptions on Embedded Flash Media: Whitepaper

Use of NAND flash storage continues to proliferate throughout many industrial segments and applications due to declining costs per gigabyte, high performance, and low power requirements. However, one of the main challenges of current NAND flash technology is its susceptibility to data corruption during unexpected power loss. This white paper seeks to explain the specific effects of unexpected power failure on flash media, as well as highlight “best practices” for mitigating data corruption as a result of power loss.


All About Self-Encrypting Drives: Whitepaper

With data security risks on the rise, an influx of government mandates and regulations for securing data have been implemented and are becoming the norm. Eliminating exposure of private data is now simply viewed as a mandatory and sound business practice. To avoid the high costs associated with these types of data compromises, organizations must put in place a comprehensive security strategy. Read this whitepaper to learn how self-encryption is achieving this initiative.