Standards  >   Security Standards  >   Encryption Standards  >  

Symmetric Block Cipher

RSS Feed    Add to Google    Add to My Yahoo!
Symmetric Block Cipher Reports
 
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010

Intel

A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

Encrypt Everything How to Unshare and Secure Your Sensitive Data Wherever It Resides
sponsored by Gemalto
WHITE PAPER: Stuck in the data protection dilemma? How do you find a way to balance critical business needs and requirements, while protecting your data from malicious threats? Learn a multitier plan that helps you protect your perimeter while also encrypting data in every level, moving or at rest.
Posted: 17 May 2016 | Published: 01 Apr 2016

Gemalto

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com

Mobility In Government Services: A Checklist Towards Regulatory Compliance
sponsored by BlackBerry
WHITE PAPER: Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

BlackBerry

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

2016 Cost of Data Breach Study: United Kingdom
sponsored by IBM
ANALYST REPORT: Learn the true cost of a data breach in 2016. Obtain detailed knowledge of not only the monetary costs of a major data breach but also the details of lost business, 7 global megatrends in the cost of data breach research, and the biggest implications for your organization.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

IBM

Secure Enterprise Email on Mobile Devices
sponsored by IBM
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement