AES Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

Planning Guide: BlackBerry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Posted: 18 Oct 2010 | Published: 15 Oct 2010

BlackBerry

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

BlackBerry Smart Card Reader Security
sponsored by BlackBerry
WHITE PAPER: Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.
Posted: 15 Sep 2006 | Published: 01 Jan 2005

BlackBerry

Why Use Cisco Network Storage Systems for Your Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Securing Cloud Applications
sponsored by VMware Tanzu
EBOOK: Application security is a hot topic in the digital-first era. Developers today face more cyber threats than ever before. Because of that, it is critical that all developers continue to enhance their skillset. For those developers who want to learn more about app security, but in a practical way, this eBook is what you need. Read on to learn more.
Posted: 26 May 2023 | Published: 26 May 2023

TOPICS:  .NET
VMware Tanzu

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

The people and digital technology transforming the Middle East
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we feature an interview with a British Academic who is helping the UAE establish the world's first university focused on artificial intelligence. Also, find out in this eguide how Abu Dhabi oil giant ADNOC is adapting its business in the digital age, and how Bahrain is preparing itself as a fintech hub.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

TechTarget ComputerWeekly.com

Mobile security moving to a unified approach
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 08 Feb 2021 | Published: 28 Feb 2018

TechTarget ComputerWeekly.com

Winning Customer Trust In A Hostile Digital Environment
sponsored by 8x8, Inc.
WHITE PAPER: How are cybercriminals getting your customer data? And how can you stop them? Access this white paper to learn how you can leverage an automated scanning and monitoring system that identifies, highlights, and weeds out threats before they infiltrate systems to power better customer experiences.
Posted: 11 Mar 2023 | Published: 11 Mar 2023

TOPICS:  .NET
8x8, Inc.

CIO Checklist: Is the Cloud Right for HIPAA Compliance?
sponsored by Intel
PRESENTATION TRANSCRIPT: This resource examines how the cloud will play an integral part in the future of medical imaging. Discover how secure, high performance, could-based solutions can help solve your medical image management problems.
Posted: 03 Oct 2012 | Published: 03 Oct 2012

Intel

Spotlight on the Middle East: Emerging IT economy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We focus on how countries in the Middle East region are trying to diversify their economies away from oil revenues. We look at how Saudi Arabia is trying to create their own version of Silicon Valley, how Dubai is trying to incorporate bitcoin into the property sector and how the UAE is trying to harness the power of artificial intelligence.
Posted: 08 Feb 2021 | Published: 29 May 2018

TechTarget ComputerWeekly.com

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

Spotlight on Benelux: A smart future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at how smart living and working are shaping up to be two of the most important and beneficial aspects of the digital transformations happening in Benelux today. We discover how Dutch towns are planning on using IT to automate human and business activity and how the Port of Rotterdam is preparing for autonomous ships.
Posted: 08 Feb 2021 | Published: 29 May 2018

TechTarget ComputerWeekly.com

Focus: Securing the cloud
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While cloud services' benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption.
Posted: 08 Feb 2021 | Published: 27 Feb 2017

TechTarget ComputerWeekly.com

Smart Paper, Issue 2: Navigating the Path to Virtualisation
sponsored by CA Technologies
EZINE: This issue from Smart Paper explores virtualisation as an optimal solution for CIOs interested in increasing agility and efficiency in their business. Following a simple path, CIOs can migrate from a testing and development environment to a pure virtual or a hybrid production environment, thereby realizing the benefits of virtualisation.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

CA Technologies

Top 10 Middle East stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: With money to invest and well-educated populations, the region is using advanced technology to enhance business as well as the quality of life. Read this top 10 for more examples of digital transformation in the Middle East.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

Top 10 enterprise IT in the Middle East stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Countries in the Middle East have become pioneers of the latest digital technologies and some of the articles featured by Computer Weekly this year evidence that. Here are Computer Weekly's top 10 enterprise IT in the Middle East stories of 2019.
Posted: 08 Feb 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

What is Dropbox Business?
sponsored by Ingram Micro
WHITE PAPER: Read this white paper to learn everything you need to know about Dropbox Business and how it can benefit your organization.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

TOPICS:  IT Management
Ingram Micro

Growing Data, Growing Danger: Stop Breaches Through Storage
sponsored by Micron Technology
WHITE PAPER: Many organizations aren't protecting data adequately. Learn why you should use hardware encryption residing on the SSD.
Posted: 26 May 2015 | Published: 26 May 2015

TOPICS:  IT Management
Micron Technology

Infographic: Comparing cloud database security
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: More data than ever before is being put into cloud-based storage repositories. Leading cloud providers offer an array of storage options, yet databases remain the most common choice in today's enterprises. Because databases are updated so frequently, it's important to review their security controls regularly.
Posted: 03 Nov 2021 | Published: 03 Nov 2021

TechTarget ComputerWeekly.com

Logitech Sync Security & Privacy Whitepaper
sponsored by Logitech Inc.
WHITE PAPER: For today’s hybrid work environment, video collaboration and virtual meetings are necessary. However, just like all other devices on your network, your meeting rooms need to be secure, and your system needs to be able to scale with your business. To learn more about a cloud-based solution that offers both, read on to see more.
Posted: 05 Aug 2022 | Published: 05 Aug 2022

TOPICS:  .NET
Logitech Inc.