Standards  >   Security Standards  >   Encryption Standards  >  


RSS Feed    Add to Google    Add to My Yahoo!
FIPS PUB 197 Reports
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010


5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

3 Essential Components for a Strong End User Security Strategy
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the three essential components of a successful security strategy and gives tips on implementing them.
Posted: 06 Oct 2015 | Published: 30 Nov 2014

Dell, Inc. and Intel®

The Industry Standards Mystery: Learn What Industry Standards Mean for Your Business
sponsored by IBM
EBOOK: Although industry standards were designed to make business communications simpler, the specific and complex nature of the standards themselves can seem intimidating. In this eBook, readers can gain a more in-depth understanding of industry standards.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


2015 Cyberthreat Defense Report
sponsored by Imperva
WHITE PAPER: What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security? Read the "2015 Cyberthreat Defense Report" to learn what matters most to the over 800 North American and European IT security decision makers surveyed.
Posted: 05 Oct 2015 | Published: 05 Oct 2015


Is Your High-Value Data Safe?
sponsored by Imation Corp.
WEBCAST: This webcast discusses how you can build security architecture that safeguards your data at every stage of the data lifecycle.
Posted: 04 Sep 2015 | Premiered: Aug 27, 2015

Imation Corp.

Eliminate Blind Spots in SSL Encrypted Traffic
sponsored by Venafi
WHITE PAPER: This white paper discusses how SSL can leave security blind to incoming attacks and gives suggestions for seeing into these blind spots.
Posted: 16 Sep 2015 | Published: 16 Sep 2015


API Development: How To Stay Ahead of the Curve
sponsored by World Play
EGUIDE: Mobile and cloud applications certainly are pushing software application development and APIs forward, but what will keep developers from being overwhelmed will be the basics. This expert e-guide discusses the API development train and how to stay ahead of the curve.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

World Play

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement