AES White Papers

(View All Report Types)
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012


Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011


The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011


Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011


Polymorphic Phishing Attacks: 5 Insights to Help Stop Them
sponsored by Cofense
WHITE PAPER: Polymorphic phishing attacks use rapidly changing automated messaging in order to engineer passages through email filtering systems. Read this white paper, in which Cofense has compiled a list of 5 insights into thwarting polymorphic phishing and take the first step toward securing your organization’s data.
Posted: 29 Jun 2022 | Published: 29 Jun 2022

All resources sponsored by Cofense

Planning Guide: BlackBerry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Posted: 18 Oct 2010 | Published: 15 Oct 2010


Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

BlackBerry Smart Card Reader Security
sponsored by BlackBerry
WHITE PAPER: Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.
Posted: 15 Sep 2006 | Published: 01 Jan 2005


Why Use Cisco Network Storage Systems for Your Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Common Myths About Packet Capture
sponsored by Endace
WHITE PAPER: Maintaining a secure, reliable networking is becoming an increasingly complex challenge – new technologies, requirements and cloud environments have resulted in dynamic network environments. Read this white paper to break down 6 common myths about packet capture.
Posted: 29 Apr 2022 | Published: 30 Apr 2022


The people and digital technology transforming the Middle East
sponsored by
EGUIDE: In this e-guide we feature an interview with a British Academic who is helping the UAE establish the world's first university focused on artificial intelligence. Also, find out in this eguide how Abu Dhabi oil giant ADNOC is adapting its business in the digital age, and how Bahrain is preparing itself as a fintech hub.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

A Security Assessment of Android Full-disk Encryption
sponsored by
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

NIST How The Nozomi Networks Solution Supports The NIST Cybersecurity Framework
sponsored by Nozomi Networks
WHITE PAPER: The NIST Cybersecurity Framework (NIST CSF) helps organizations document and implement controls for their IT systems that support critical operations and assets. But NIST CSF compliance can be complicated and costly to achieve. Read this compliance mapping guide to learn how to simplify NIST CSF compliance with Nozomi Networks.
Posted: 06 May 2022 | Published: 06 May 2022

Nozomi Networks

Gain Advanced Security Protection with the Combined Capabilities of Windows Server 2022 and Next-Generation Dell EMC™ PowerEdge™ Servers
sponsored by Dell and Microsoft
WHITE PAPER: Take a look through this white paper to learn how the combination of next-generation Dell EMC PowerEdge servers and Windows Server 2022 simplifies the task of aligning hardware, firmware and OS in order to secure business-critical workloads.
Posted: 09 Nov 2022 | Published: 09 Nov 2022

Dell and Microsoft

The Frightening Realities of Your SDR Program ... and What to Do About Them
sponsored by TechTarget
EBOOK: To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.
Posted: 03 Dec 2021 | Published: 03 Dec 2021


Security Guide Zoom Video Communications, Inc.
sponsored by Zoom Video Communications
WHITE PAPER: Zoom places security as the highest priority in the operations of its suite of products and services. They strive to continually provide a robust set of security features and practices to meet the requirements of businesses for safe and secure collaboration. In this white paper, learn about the security features that are available with Zoom.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Zoom Video Communications

The Reality of Ransomware: What You Need to Know in 2022
sponsored by Integrity360
WHITE PAPER: Ransomware threats are so common that they account for 10% of all security breaches. This white paper gives a brief overview of ransomware, analyzing its growing danger. Integrity360 advocates for educating employees in order to prevent cybercriminals from using social engineering as an entry point for ransomware attacks. Read on to learn more.
Posted: 22 Sep 2022 | Published: 22 Sep 2022


Mobile security moving to a unified approach
sponsored by
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

CIO Checklist: Is the Cloud Right for HIPAA Compliance?
sponsored by Intel
PRESENTATION TRANSCRIPT: This resource examines how the cloud will play an integral part in the future of medical imaging. Discover how secure, high performance, could-based solutions can help solve your medical image management problems.
Posted: 03 Oct 2012 | Published: 03 Oct 2012


Spotlight on the Middle East: Emerging IT economy
sponsored by
EGUIDE: We focus on how countries in the Middle East region are trying to diversify their economies away from oil revenues. We look at how Saudi Arabia is trying to create their own version of Silicon Valley, how Dubai is trying to incorporate bitcoin into the property sector and how the UAE is trying to harness the power of artificial intelligence.
Posted: 29 May 2018 | Published: 29 May 2018

How (and why) Carbonite Server Ensures data Immutability for Users
sponsored by Webroot
WHITE PAPER: The evidence of a rise in ransomware attacks is all around us. But with aid from Carbonite Servers, you'll be able to discover the key steps for configuring server backup to ensure your data is safe and sound. Scan through this white paper and see how to better secure your data through Carbonite’s key practice.
Posted: 25 Apr 2022 | Published: 25 Apr 2022


Policy-Driven Solutions for Secure Data Exchange
sponsored by PKWare
WHITE PAPER: Protecting essential data exchanges is an increasingly important business imperative. Read this white paper to learn about the importance of encryption, common challenges, how to apply policy-driven security to data exchanges, and more.
Posted: 26 Jan 2022 | Published: 19 Apr 2021

TOPICS:  Cybersecurity

Combatting Ransomware with Primary Storage
sponsored by NetApp
WHITE PAPER: Read through this white paper to learn how positioning the production storage environment as a core component of your ransomware resiliency strategy can help IT operations better prevent and recover from ransomware attacks.
Posted: 15 Jul 2022 | Published: 15 Jul 2022


Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

Essential Guide to Security
sponsored by Splunk
WHITE PAPER: Check out The Essential Guide to Security for 2020 to discover new security use cases as well as how to implement Splunk's security product suite for advanced security analytics, SOAR, SIEM, MITRE ATT&CK, machine learning and more, all in one place to power your SOC.
Posted: 08 Feb 2021 | Published: 10 Mar 2020