Standards  >   Security Standards  >   Encryption Standards  >  

Symmetric Block Cipher

RSS Feed    Add to Google    Add to My Yahoo!
Symmetric Block Cipher Reports
 
Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010

Intel

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: Learn not only solid fundamentals of how SSL/TSL encryption works, but also why so much malicious activity is sneaking past other conventional security measures and what you can do to stop it. Hint: encrypted traffic management solutions now bolster data privacy, compatibility, performance, scalability AND cost effectiveness.
Posted: 25 Jul 2016 | Published: 31 Jan 2016

Blue Coat Systems

A Technology Brief on SSL/TLS Traffic
sponsored by Blue Coat Systems
RESOURCE: In this resource, get a detailed breakdown of SSL/TLS traffic and not only its importance to enterprises but also the grave threat it can pose if malware hides in it. Discover the skills necessary to effectively utilize encrypted traffic and combat the malware threat.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

7 Modern Encryption Problems
sponsored by Blue Coat Systems
RESOURCE: This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

How to get the best protection from your CASB
sponsored by Palerra Inc.
WHITE PAPER: Discover how two approaches to a Cloud Access Security Broker (CASB) strategy stack up to the major concerns CISOs face on a daily basis, such as sharing security responsibilities with their cloud provider, taming unmanaged traffic from their network, and more.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

Palerra Inc.

A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

Distributed Denial-of-Service Prevention Test Report
sponsored by Arbor Networks
ANALYST REPORT: In this in-depth report from NSS Labs, discover how a DDoS prevention device is put through a rigorous test to evaluate its effectiveness under a simulated DDoS attack. Learn how they can perform, what can go wrong, and view results on a detailed product scorecard.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Arbor Networks

Compliance Glossary of the Cloud
sponsored by VMware
WHITE PAPER: Discover a comprehensive glossary of compliance standards for the cloud. Learn what your enterprise needs to remain compliant in the following fields: Audit/Assurance, Management, Finance, and more.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

VMware

Aberdeen Group: Selecting Encryption for "Data at Rest" in Back-End Systems.
sponsored by Vormetric
WHITE PAPER: In this paper, the Aberdeen Group explores why full-disk encryption has become an attractive solution for the risks to data in use at the endpoints—and why file-level encryption is a better fit for the risks associated with data at rest in back-end systems.
Posted: 27 Jul 2016 | Published: 01 Jun 2015

Vormetric
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement