Standards  >   Security Standards  >   Encryption Standards  >  

Block Cipher

RSS Feed    Add to Google    Add to My Yahoo!
Block CipherReports
 
Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010

Intel

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Detecting the use of TrueCrypt
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of TrueCrypt data encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Seven Steps to Protecting Your Cloud Information
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover seven steps to take towards securing your cloud information.
Posted: 22 Sep 2014 | Published: 15 Oct 2013

CipherCloud

Mitigate the Risks of File Sharing and BYOD with Private Clouds
sponsored by Accellion, Inc.
WHITE PAPER: This informative white paper examines private cloud solutions for file sharing and synchronization, discussing how a private cloud can help you realize the benefits that BYOD provides without having to expose your sensitive information to potential risks.
Posted: 01 Jul 2014 | Published: 28 Jun 2013

Accellion, Inc.

Adapting to the new web security and email security threats
sponsored by Cisco Systems, Inc.
EGUIDE: In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.
Posted: 06 May 2014 | Published: 06 May 2014

Cisco Systems, Inc.

NoSQL Does Not Have to Mean No Security
sponsored by IBM
WHITE PAPER: This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
Posted: 28 Feb 2014 | Published: 31 Jul 2013

IBM

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement