Standards  >   Security Standards  >   Encryption Standards  >  

Symmetric Block Cipher

RSS Feed    Add to Google    Add to My Yahoo!
Symmetric Block Cipher White Papers (View All Report Types)
 
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Think Again if you believe your email archiving problems are solved with Office 365
sponsored by LogicNow
WHITE PAPER: Learn not only the shortcomings of Office 365's email archiving, but also how to give your enterprise significant benefits to compensate for these limitations, including how to maximize compliance with data protection laws, minimize legal risk, support governance and compliance objectives with easy message retrieval, and more.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

7 Reasons it's Time to Gain SSL Visibility with Application Delivery Controllers
sponsored by Blue Coat Systems
WHITE PAPER: When used with ADCs, some tools can fill the gaps in security coverage created by a lack of visibility into encrypted traffic. Access the following resource and uncover seven ways to improve visibility and data center security.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Blue Coat Systems

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Unlocking Business Success: The Five Pillars of User Risk Mitigation
sponsored by Forcepoint
WHITE PAPER: Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — "seeing" the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Quantifying the Riskand Economic Impactof Bad Bots
sponsored by Distil Networks
WHITE PAPER: Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Distil Networks

Take SIEM to the Cloud
sponsored by Splunk
WHITE PAPER: Discover how a cloud-deployed SIEM solution can allow enterprises achieve a unified view of their most important operational, application performance and security metrics while avoiding the lengthy setup, learning curves, and costly upfront expenses of a traditional SIEM approach.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Splunk

Bolster email security in Office 365 deployments
sponsored by ZixCorp
WHITE PAPER: Organizations looking to ensure the success of their Office 365 migration are carefully planning every aspect of their projects to reduce risk. Learn why email encryption capabilities should not be overlooked in those plans.
Posted: 09 May 2016 | Published: 01 Apr 2016

ZixCorp

Safeguard Protected Health Information
sponsored by Citrix
WHITE PAPER: Securing protected health information is a major priority for healthcare organizations and a major challenge since file sharing is such an important aspect of the industry. Learn how you can prevent information leaks while increasing productivity and collaboration.
Posted: 12 May 2016 | Published: 30 Jun 2015

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement