Standards  >   Security Standards  >   Encryption Standards  >  

Block Cipher

RSS Feed    Add to Google    Add to My Yahoo!
Block CipherReports
 
Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010

Intel

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Risk-Based Security Buyer's Guide: Addressing Enterprise-class Threats on an SME-class Budget
sponsored by TaaSera
WHITE PAPER: This exclusive whitepaper will show you how you must shift from a threat-based strategy that focuses on securing the perimeter to a risk-based approach that features a well-conceived incident response plan.
Posted: 08 Dec 2014 | Published: 10 Nov 2014

TaaSera

CFO Research Study - Linking Numbers and Narratives
sponsored by IBM
ANALYST REPORT: This white paper explains the importance of understanding financial numbers and how to get the most out of your narrative analysis.
Posted: 16 Jul 2014 | Published: 31 Jul 2012

IBM

Finding the Right Security Assessment Approach for Your Organization
sponsored by Dell SecureWorks
WHITE PAPER: Download this exclusive whitepaper to determine how you should be assessing your security and explore test options.
Posted: 19 Nov 2014 | Published: 13 Nov 2013

Dell SecureWorks

Winning security use cases in the Computer Weekly European 2014 Awards
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall
sponsored by Cisco
WHITE PAPER: This exclusive whitepaper explores the need for an interoperable network security architecture to combat today's security threats.
Posted: 25 Nov 2014 | Published: 24 Sep 2014

Cisco

Eliminate Security Blindspots with New Encrypted Traffic Management Solutions
sponsored by Blue Coat Systems
RESOURCE: In this interactive guide, discover new encrypted traffic management solutions that can expose security blind spots without compromising privacy or regulatory compliance.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Blue Coat Systems

Market Surveillance and Monitoring
sponsored by Software AG
WHITE PAPER: This exclusive whitepaper explores an out-of-the-box risk management solution that can help you deal with the demands of real-time financial markets.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Software AG

Understanding PCI Mobile Payment Processing Security Guidelines
sponsored by Delego
EGUIDE: Download this expert e-guide now to learn about the new Payment Card Industry Mobile Payment Acceptance Security Guidelines and how they will impact you.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Delego
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement