Standards  >   Security Standards  >   Encryption Standards  >  

Block Cipher

RSS Feed    Add to Google    Add to My Yahoo!
Block CipherReports
 
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010

Intel

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

The Modern Malware Review: Analysis of New and Evasive Malware in Live Enterprise Networks
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper discusses the latest malware threats, analyzing more than 1,000 organizations and examining the malware samples that were initially undetected by industry-standard security solutions.
Posted: 18 Mar 2014 | Published: 18 Mar 2013

Palo Alto Networks

e-Guide: Conquering Advanced Persistent Threat Attacks
sponsored by CDW Corporation
EGUIDE: This expert e-Guide clears up common misconceptions about the dangers and characteristics of advanced persistent threats (APTs), and also explains how context-aware security can improve the detection of APTs within enterprises.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Essential enterprise mobile device security controls
sponsored by SearchSecurity.com
WHITE PAPER: This expert paper discusses the key challenges for improving your mobile security and what tools you can leverage in order to overcome them. Access this resource now and find out which security control solutions are critical to secure your mobile environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

Seven Keys to Securing Your Growing Business
sponsored by Sophos, Inc.
WHITE PAPER: This white paper outlines a cloud-based security solution that gives you complete control from one console—available from any computer with browser from anywhere.
Posted: 01 Jul 2014 | Published: 01 Oct 2013

Sophos, Inc.

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

PCI 101: A Beginner’s Guide to PCI DSS Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast covers everything you need to know about the payment card industry data security standard.
Posted: 19 Feb 2014 | Premiered: Feb 19, 2014

FireHost Inc.

MDM for a Secure Mobile Workforce
sponsored by BlackBerry
EGUIDE: This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement