Standards  >   Security Standards  >   Encryption Standards  >  

FIPS PUB 46-1

RSS Feed   
FIPS PUB 46-1 White Papers (View All Report Types)
 
Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Comforte SecurDPS: Enterprise Solution for GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

Thales Data Protection for a Multi-Cloud World
sponsored by Arrow & Thales
WHITE PAPER: The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.
Posted: 26 Feb 2021 | Published: 31 Dec 2020


Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Security White Paper Data Security Is Serious Business.
sponsored by Alchemer
WHITE PAPER: The digital landscape is constantly evolving – which necessitates changes and improvements to security tactics and controls. This white paper highlights the key tenets and capabilities of Alchemer’s information security program – read on to enhance your understanding.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Alchemer

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

Simplify Cloud Compliance For Banking & Financial Services
sponsored by WinMagic
CASE STUDY: Banks and financial services institutions are embracing cloud computing – but as industry-specific compliance grows increasingly complex, it becomes critical to ensure they meet data privacy and cloud compliance needs. Read this use case to learn how WinMagic is helping banks address cloud risks and compliance gaps.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

WinMagic

The Top Cyber Security Trends in ASEAN in 2017
sponsored by ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

ComputerWeekly.com

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Extremecloud™ IQ Cloud Services Platform
sponsored by Extreme Networks
DATA SHEET: Extreme Networks ExtremeCloud IQ Cloud Services Platform is a globally distributed cloud-based infrastructure offered as Software-as-a-Service (SaaS). ExtremeCloud IQ provides access to configuration and network monitoring statistics for all managed Extreme Networks devices. Download this data sheet to learn more.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Extreme Networks

The Technology Landscape of Enterprise Solid-State Drives
sponsored by Toshiba
WHITE PAPER: Data is growing and the cloud needs to keep up. Find out about performance and error detection in the best SSD options.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

TOPICS:  IT Management
Toshiba

Why AWS + Auth0
sponsored by Auth0
WHITE PAPER: Implementing the right IAM or customer IAM tool in your AWS ecosystem requires thoughtful planning. This 52-page white paper provides a comprehensive collection of expertise, best practices and project planning insights for using AWS & Auth0 to set up an API gateway and protect your critical applications.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

WebSphere MQ 7.0 Features and Enhancements
sponsored by IBM
WHITE PAPER: This e-book provides details about IBM WebSphere MQ V7.0 product features and enhancements required for individuals and organizations to make informed application and design decisions prior to implementing a WebSphere MQ infrastructure or begin development of a WebSphere MQ application.
Posted: 03 Jan 2012 | Published: 28 Dec 2011

IBM

WebSphere MQ 7.0 Features and Enhancements
sponsored by IBM
WHITE PAPER: Read this white paper to learn why messaging middleware is essential in service oriented architecture (SOA) and get an understanding of how it works and what it requires.
Posted: 12 Oct 2012 | Published: 12 Oct 2012

IBM

Seagate Mach.2 Multi Actuator Drive Performance In A Gluster Reference Architecture
sponsored by EQUUS
EBOOK: As cloud customers need more storage with higher performance, at a lower cost, spinning disk and solid-state disk struggle to fully deliver. Access this e-book to learn how the Seagate MACH.2 Multi Actuator, when in a Gluster reference architecture, drives performance while keeping costs down.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

TOPICS:  Cloud Computing
EQUUS

Threat Report: TeamTNT: The First Cryptojacking Worm to Steal AWS Credentials
sponsored by Cysiv
WHITE PAPER: Because most online services now run in the cloud (AWS, Azure, Google Cloud, etc.), these cloud service providers have become an important new target for cybercriminals to install cryptojacking malware and to mine cryptocurrency. The Cysiv threat research team has analyzed this malware – read their report to learn what they discovered.
Posted: 27 Oct 2020 | Published: 19 Oct 2020

Cysiv

BALANCING CUSTOMER CONVENIENCE WITH CYBERSECURITY THREATS IN FINANCIAL SERVICES
sponsored by F5 Networks
EBOOK: Today’s financial services organizations are facing the increasingly difficult task of balancing customer convenience with cybersecurity. Read this e-book to learn more about the current threats in the financial industry and discover how to strike a balance between UX and protection.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

TOPICS:  Cybersecurity
F5 Networks

BALANCING CUSTOMER CONVENIENCE WITH CYBERSECURITY THREATS IN FINANCIAL SERVICES
sponsored by F5 Networks
EBOOK: Today’s financial services organizations are facing the increasingly difficult task of balancing customer convenience with cybersecurity. Read this e-book to learn more about the current threats in the financial industry and discover how to strike a balance between UX and protection.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

TOPICS:  Cybersecurity
F5 Networks

Network security is being redefined to better block data raiders
sponsored by ComputerWeekly.com
WHITE PAPER: This 10-page Buyer’s Guide to Network Security helps CIOs and senior IT professionals to identify what technology will best provide the additional protection needed against today’s threats.
Posted: 21 Oct 2011 | Published: 26 Jan 2011

ComputerWeekly.com

2020 Edition Cloud Computing and Business Intelligence Market Study
sponsored by Domo Technologies
EBOOK: As business intelligence vendors continue to expand their offerings, cloud BI has emerged as a leading adoption method. But what are the benefits and concerns attached to cloud BI? Check out this Dresner Advisory 2020 Cloud Computing and Business Intelligence Market Survey to learn more.
Posted: 29 May 2020 | Published: 31 Mar 2020

Domo Technologies

The Future CFO
sponsored by Sage
WHITE PAPER: Check out this white paper to learn 5 challenges that CFOs should be prepared to tackle in order to thrive post-COVID.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Sage

FlashStack with Cisco UCS and Pure Storage Flash Array//m for 5000 VMware Horizon View 6.2 Users
sponsored by Pure Storage
WHITE PAPER: This document provides architecture reference and design guide for up to 5000 seat mixed workload onCisco UCS and Pure Storage FlashArray//m with VMware Horizon 6.2 RDS server-based sessions andLinked Clone Windows 7 virtual desktops on vSphere 6.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Pure Storage

6 Ways Hyperconverged Solutions Make Your Business Future Ready
sponsored by VMware
WHITE PAPER: Hyperconverged infrastructure (HCI) has a proven track record when it comes to reducing complexity, yet some businesses remain hesitant to adopt it. Read this custom white paper to learn how hyperconverged infrastructure can help your business today, even as you prepare for the challenges of tomorrow.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

VMware

CW ASEAN: Time to dial up defences
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

ComputerWeekly.com

Connectivity and Integration E-Book
sponsored by IBM
EBOOK: In today’s unpredictable economy, it is more vital than ever to know your business processes and understand how you can gain a competitive edge. Read this e-book and see how IBM’s suite of solutions can simplify work processes and provide you with unrivaled connectivity and seamless integration.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

IBM

Cloud Computing: Risks and Backup/Recovery Requirements
sponsored by Spanning Cloud Apps
EGUIDE: In this exclusive e-guide, learn the importance of backing up and protecting your documents in Gmail and other Google applications. Also, learn more from Dave Russell and other experts about cloud-to-cloud backup and how it is becoming increasingly popular (and necessary) in today's IT market.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Spanning Cloud Apps

Cloud Storage Adoption Decisions: Weighing Capacity, Cost, and Top Platform Tips
sponsored by Nasuni
EGUIDE: This expert guide from the team at SearchStorage.com will grant you access to a hand-curated list of their top 10 cloud storage platform tips, with additional research content on how your peers are weighing cloud costs and capacity considerations. Access your copy here.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni

Reference Architecture-Based Design for 5000 Seat Virtual Desktop Infrastructure
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This informative resource evaluates the scalability of one of the market's top desktop virtualization solutions, providing recommendations for large-scale deployments so you can determine how it would fit into your desktop environment.
Posted: 10 May 2013 | Published: 10 May 2013

Cisco Systems, Inc and Citrix

Red Hat Cloud Foundations Reference Architecture: Private IaaS Clouds
sponsored by Red Hat and JBoss
WHITE PAPER: Red Hat's suite of open source software provides a rich infrastructure for cloud providers to build public/private cloud offerings. This Volume 1 guide for deploying the Red Hat infrastructure for a private cloud describes the foundation for building a Red Hat Private cloud.
Posted: 15 Feb 2011 | Published: 10 Feb 2011

Red Hat and JBoss

E-government benchmark 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences