Standards  >   Security Standards  >   Encryption Standards  >  

FIPS PUB 197

RSS Feed    Add to Google    Add to My Yahoo!
FIPS PUB 197 White Papers (View All Report Types)
 
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

The ESG Cybersecurity Maturity Model
sponsored by Hewlett-Packard Company
WHITE PAPER: Based on their research, Enterprise Strategy Group has developed a cyber security maturity model that classifies organizations as basic, progressing, or advanced.
Posted: 18 Nov 2014 | Published: 22 Oct 2014

Hewlett-Packard Company

When Retention Schedules Shouldn't Live Up to their Name
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you understand how retention schedules have unintentionally misled companies into keeping unneeded data. Learn why taking the leap to get rid of excess information is a solid way to govern it, lessen risk, and save money.
Posted: 19 Apr 2015 | Published: 20 Apr 2015

Iron Mountain

Best Practices in ECM Document Migration
sponsored by Actuate
WHITE PAPER: This white paper assures that the challenges of document migration don't have to outweigh the benefits. Use this resource to determine if your organization is quickly and effectively transferring documents, and whether or not you're experiencing its advantages.
Posted: 01 May 2015 | Published: 01 May 2015

Actuate

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Growing the Security Analyst
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper coaches IT leaders on how to develop and retain the security analysts they need to keep their business safe.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Hewlett-Packard Company

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Simplicity and Security: Achieving Data Protection in Educational Institutions and State and Local Governments
sponsored by Pure Storage
WHITE PAPER: This white paper describes how you can achieve storage and tight security with one product – just the right strategy for the big security needs and small budgets of public institutions.
Posted: 23 Jun 2015 | Published: 31 Dec 2014

Pure Storage

High Performance, High Capacity 2048/4096-bit SSL Offload February 2013
sponsored by A10 Networks
WHITE PAPER: IT professionals are going to great lengths to foster business growth via data encryption. This guide outlines the importance of data protection and encryption, while exploring specific operating systems that provides scalability alongside enhanced performance levels.
Posted: 23 Dec 2013 | Published: 28 Feb 2013

A10 Networks

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement