Standards  >   Security Standards  >   Encryption Standards  >  

Block Cipher

RSS Feed    Add to Google    Add to My Yahoo!
Block Cipher White Papers (View All Report Types)
 
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Five Mobile Security Myths Debunked
sponsored by SingTel
WHITE PAPER: Uncover 5 myths can even security pros can fall prey to believing are true, and how to steer your organization away from developing bad habits when crafting your security policy.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

SingTel

Cybersecurity as a Growth Advantage
sponsored by Cisco
WHITE PAPER: Learn why the belief that the primary purpose of cybersecurity is growth enablement is starting to take hold among senior finance and line-of-business executives.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Cisco

Data Protection and Encryption Driven by GDPR Compliance
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Discover how to manage customized encryption keys, particularly at high volumes, while minimizing overhead costs. Learn how "one size fits all" encryption might not be the best for your company, and what role your encryption can play in GDPR compliance.
Posted: 25 Jan 2017 | Published: 31 Aug 2016

Hewlett-Packard Enterprise

Simplify and Accelerate Identity Protection on The Cloud
sponsored by IBM
WHITE PAPER: Striking a balance between usability and security can be challenging as organizations tackle mobile, social, and cloud adoptions. Access this white paper to learn the benefits of using a cloud-based delivery model for IAM.
Posted: 10 Feb 2017 | Published: 30 Jun 2015

IBM

Application Security Beyond SAST and DAST
sponsored by Veracode, Inc.
WHITE PAPER: Learn about trends in and the future of application security, as it stands today, and what organizations need to do to secure the most attacked and breached layer of their products: the app layer.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

HPE Enterprise Secure Key Manager Best Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn how to use the HPE Enterprise Secure Key Manager. The HPE Enterprise Secure Key Manager environment will provide an effective and secure repository for your encryption keys environment.
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Hewlett Packard Enterprise

Understanding and Overcoming Cloud Security Threats
sponsored by Peak10
WHITE PAPER: The cloud doesn't have to be a security concern. This white paper dives into common security threats to the cloud and best practices on how to deal with them.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

Peak10

An Essential Checklist for Your Security Response Solution
sponsored by ServiceNow
WHITE PAPER: Learn what the required capabilities of your security response are and how to put your organization on the path to tailoring your response to fit your needs with 7 keys to succeed in today's high-risk environment.
Posted: 30 Jan 2017 | Published: 30 Jan 2017

ServiceNow

Create a Customized Testing Strategy
sponsored by IBM
WHITE PAPER: Learn the importance of thorough penetration testing. Discover how to ensure each of the four disciplines are covered, and how each play a crucial role in securing your organization.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement