Standards  >   Security Standards  >   Encryption Standards  >  


RSS Feed    Add to Google    Add to My Yahoo!
Rijndael Reports
Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010


Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 12 Sep 2016 | Published: 12 Sep 2016


Log Management and Automation for NIST Cyber Security Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.
Posted: 07 Oct 2016 | Published: 30 Nov 2014

LogRhythm, Inc.

Four Key Steps That Can Move You Toward More Mature Identity And Access Management Program Now
sponsored by IBM
WHITE PAPER: Learn the benefits of taking a deliberate approach to maturing an existing IAM program that directly improves business performance and security posture in this white paper. Uncover how to reduce costs through automation, improve operational efficiency through an integrated technology framework, and more.
Posted: 30 Aug 2016 | Published: 31 Jul 2016


Why So Many Enterprises Lack Proper Authentication Methods
sponsored by RSA Softcat
EGUIDE: Single-factor authentication, while allowing for simplicity and ease, leaves companies unnecessarily vulnerable to intrusion. Learn the benefits of multi-factor authentication and what you can do today to improve your organization's authentication and authorization polices.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

RSA Softcat

How Swiss Re Created a Safe Mobile First Strategy
sponsored by MobileIron
RESEARCH CONTENT: This case study explores how Swiss Re implemented a multi-OS enterprise mobility management system, allowing them the security they desired, and employees the freedom to work with their personal devices. Find out how Swiss Re allowed access to the company intranet from any device, developed a "mobile first" strategy, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016


Stop Bad Bots: What Security Experts Need to Know about Defeating Zombies
sponsored by Imperva
EBOOK: Discover not only the basics of good bots and bad bots, but also how they are used in DDoS attacks, how botnets work, and how to mitigate the catastrophic damage that they can create. Learn how to identify your security gaps, put the right defense in place, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016


IoT Security Testing: Cover All Your Bases
sponsored by Synopsys
EGUIDE: Without the proper IoT security testing, your organization could end up in hot water. In this e-guide industry experts dive into the important of IoT security testing. Get help securing IoT devices and the networks and services they connect to.
Posted: 12 Oct 2016 | Published: 11 Oct 2016

How a CASB with Built-In UBA Unmasks Insider Threats in the Cloud
sponsored by Palerra Inc.
WHITE PAPER: Many of the controls put in place to mitigate cloud security threats fail to protect the enterprise against a user with valid credentials. In this white paper, uncover how many of today's CISOs are enabling their teams to detect and prioritize internal threats, and realize the full benefits of the cloud.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Palerra Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement