IT Agents  >   Professional Organizations  >   Electronics Industry Professional Organizations  >  

AES

RSS Feed   
AES White Papers (View All Report Types)
 
Secure IT Asset Disposition: Achieving Business Value While Mitigating Risks
sponsored by Iron Mountain
WHITE PAPER: The risks of not having an IT asset disposition (ITAD) solution are substantial.Download this white paper for advice on how to dispose of old IT equipment successfully while achieving security, compliance, and environmental goals.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Iron Mountain

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

AES Uses SAP UEM by Knoa to Facilitate S/4HANA Migration
sponsored by Knoa Software
VIDEO: How did a SAP User Experience Management (UEM) system from Knoa help energy giant, AES, increase the efficiency of their global operations while undergoing an S/4HANA migration? Explore this video to find out, and decide if a UEM system from Knoa is right for your SAP S/4HANA migration.
Posted: 19 Mar 2019 | Premiered: 07 Aug 2018

Knoa Software

Bring Video Communications to Healthcare
sponsored by Zoom Video Communications
CASE STUDY: In this white paper, learn about a video conferencing system that can be used for telehealth, and how it can help increase quality of care and build patient engagement while achieving HIPAA (signed BAA) and PIPDEA/PHIPA compliance with end-to-end 256-bit AES encryption.
Posted: 04 Feb 2019 | Published: 04 Feb 2019

Zoom Video Communications

Planning Guide: BlackBerry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Posted: 18 Oct 2010 | Published: 15 Oct 2010

BlackBerry

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

BlackBerry Smart Card Reader Security
sponsored by BlackBerry
WHITE PAPER: Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.
Posted: 15 Sep 2006 | Published: 01 Jan 2005

BlackBerry

Why Use Cisco Network Storage Systems for Your Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

The Ultimate Guide to Data Encryption in the Cloud
sponsored by Rubrik
EBOOK: In this guide, you'll learn the basics of encryption, the prerequisites of data confidentiality, key management, and data encryption in the top tier public clouds. Discover how this can enhance your intelligent data encryption strategy at your organization, today.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Rubrik

Fuze: Unified Communications Security
sponsored by Fuze
WHITE PAPER: Security and privacy requirements are extremely important when it comes to business communications. In this white paper, learn how a defense-in-depth approach is employed across the Fuze platform whereby multiple layers of security work together to deliver reliable service in a trusted environment.
Posted: 21 May 2020 | Published: 21 May 2020

Fuze

End-to-End Secure Cloud Services
sponsored by CradlePoint
DATA SHEET: In this brief, learn about Cradlepoint’s NetCloud Perimeter which provides cloud-based networking services that add multiple, embedded security features to traditional enterprise-class networks.
Posted: 28 May 2020 | Published: 28 May 2020

CradlePoint

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Enhanced Wi-Fi Companion: A Complete Wi-Fi Solution for Business Mobility
sponsored by ComputerWeekly.com
WHITE PAPER: Businesses that want to deploy Pocket PCs or other Windows Mobile/CE based devices on their Wi-Fi networks will benefit from a solution that incorporates the latest data security and Wi-Fi innovations, CCX certification, and a user-friendly interface in a single, complete solution without third-party supplicants.
Posted: 25 Oct 2011 | Published: 08 Jun 2010

ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

Take Push-To-Talk Further
sponsored by Motorola, Inc.
WHITE PAPER: Push-To-Talk (PTT) is no longer only for two-way radios. Group communication can now include those who rely on smartphones and broadband devices as well as two-way radios. In this white paper, learn how WAVE can help to eliminate communication barriers between the traditional office space and the commercial and industrial areas.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Motorola, Inc.

End-to-End Secure Cloud Services
sponsored by CradlePoint
DATA SHEET: In this brief, learn about Cradlepoint’s NetCloud Perimeter which provides cloud-based networking services that add multiple, embedded security features to traditional enterprise-class networks.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

CradlePoint

Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud
sponsored by Intel
WHITE PAPER: Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

Intel

Security in the Cloud - Solutions Brief
sponsored by Intel
PRODUCT OVERVIEW: This solution brief poses key questions concerning cloud security and explores new tools you can leverage to ensure the privacy of data at rest and in motion, provide verification of compliance, and more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Intel

7 Hyperintelligence Card Use Cases
sponsored by MicroStrategy
PRODUCT OVERVIEW: In this white paper, learn about Cards by MicroStrategy, which uses Hyperintelligence to make data more accessible to everyone – not just the analysts, data scientists, and architects of the world.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

MicroStrategy

Enabling High Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER: Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
Posted: 30 May 2012 | Published: 20 Sep 2011

Aruba Networks

Enabling High-Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER: Learn about the specific challenges of deploying iPads in the enterprise, how to configure an iPad for a wireless land area network (WLAN), and a specific WLAN solution that offers scalable performance in a high density network -- ideal for the mobile workplace.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

Aruba Networks

Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER: This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Intel

Achieving HIPAA Compliance with Alcide Kubernetes Security
sponsored by Alcide
WHITE PAPER: The need better security patient PHI in the US led to the inception of HIPAA. The following white paper outlines the key objectives of HIPAA, the challenges of achieving compliance in cloud-native environments, and how to ensure intersectional PHI security between HIPAA and the NIST Cybersecurity Framework.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Alcide

Why The Era of General Purpose Storage is Coming to an End
sponsored by Oracle and Intel®
WHITE PAPER: This white paper highlights the benefits of application-engineered storage, which is better suited to improving the cooperation and collaboration between storage and other applications.
Posted: 10 Jun 2014 | Published: 28 Jun 2013

Oracle and Intel®
 
Browse by Report Type:
AES White Papers | AES Multimedia | AES IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info