FIPS PUB 46-1 White Papers

(View All Report Types)
Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Recommended Best Security Practices for Unified Communications
sponsored by Polycom, Inc.
WHITE PAPER: Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Posted: 07 Sep 2012 | Published: 30 Mar 2012

Polycom, Inc.

Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett Packard Enterprise

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

HITRUST CSF® Certification FREQUENTLY ASKED QUESTIONS
sponsored by Coalfire
WHITE PAPER: The HITRUST Common Security Framework (CSF) was developed by IT and healthcare professionals to provide a framework for managing the security requirements inherent in the Health Insurance Portability and Accountability Act (HIPAA). Find more about some of the answers to the most common questions in this document.
Posted: 18 May 2022 | Published: 18 May 2022

TOPICS:  .NET
Coalfire

Enhancing Cybersecurity In An Expanding Risk Landscape
sponsored by Logitech Inc.
WHITE PAPER: The risk of a cyber incident hitting your organization goes up every single year. Along with risks going up, the cost of a breach is also increasing just as fast. However, with so many attack vectors available, IT leaders need to be aware of all points of vulnerability in the business. This even includes wireless peripherals. Read on to learn more.
Posted: 09 Mar 2023 | Published: 09 Mar 2023

TOPICS:  .NET
Logitech Inc.

Cyber Security Trends 2017 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

TechTarget ComputerWeekly.com

Database Management Insights: Open Source Outpaces Proprietary Solutions
sponsored by Percona
RESEARCH CONTENT: Percona recently performed a survey of database professionals to gain an understanding of what is driving their decisions in 2023. Read on to learn why most organizations anticipate making few changes to their database management strategies in the near term.
Posted: 11 Oct 2023 | Published: 11 Oct 2023

TOPICS:  .NET
Percona

The Technology Landscape of Enterprise Solid-State Drives
sponsored by Toshiba
WHITE PAPER: Data is growing and the cloud needs to keep up. Find out about performance and error detection in the best SSD options.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

TOPICS:  IT Management
Toshiba

Building The Analytics Lakehouse On Google Cloud
sponsored by Google
WHITE PAPER: This paper outlines the technical processes of implementing an analytics lakehouse, leveraging Google Cloud’s open, unified, and intelligent data platform. The paper covers each architectural layer and highlights how many stakeholders interact with the platform along with the benefits of the analytics lakehouse along the way.
Posted: 06 Sep 2023 | Published: 06 Sep 2023

TOPICS:  .NET
Google

Achieve Cloud Transformation Success
sponsored by Amazon Web Services
EBOOK: As financial services firms navigate a new digital landscape, they’re no longer evaluating if they should move to the cloud. Instead, they’re seeking solutions and partners to accelerate and scale their cloud adoption. Discover the benefits and use cases of a partnership with AWS in this e-book.
Posted: 03 Oct 2023 | Published: 02 Oct 2023

TOPICS:  .NET
Amazon Web Services

Hitachi Unified Compute Platform HC: Maximize Hyperconverged Performance with NVMe
sponsored by Hitachi Vantara
WHITE PAPER: Read this paper for an evaluation of Hitachi Unified Compute Platform HC (UCP HC) hyperconverged infrastructure solution with a focus on assessing the performance and value of NVMe-based flash for business-critical applications and databases in the virtualized data center.
Posted: 23 Aug 2021 | Published: 23 Aug 2021

TOPICS:  IT Management
Hitachi Vantara

A Secure SAP Platform How To Secure Your SAP Platform
sponsored by SUSE
EBOOK: Through SAP businesses have been able to combine the functions of software which were priorly specialized to single functions. While this has greatly increased the effectiveness of SAP, it has also drawn the attention of hackers. This Gorilla Guide is designed to help you understand the risks to SAP production environments. Read on to learn more.
Posted: 15 Jun 2023 | Published: 15 Jun 2023

TOPICS:  .NET
SUSE

Windows 11 Security Book: Powerful security from chip to cloud
sponsored by Connection
EBOOK: Organizations worldwide are adopting a zero-trust security model based on the premise that no person or device anywhere can have access until safety and integrity is proven. In this e-book, discover how Windows 11 embraces these principles and offers additional security features and benefits designed for hybrid work environments.
Posted: 31 Oct 2023 | Published: 31 Oct 2023

TOPICS:  .NET
Connection

Deploying NGINX As An API Gateway
sponsored by NGINX
EBOOK: Whether it’s an innovative startup or large enterprise, application development and delivery have become mission critical processes for organizations of all sizes. To address AppDev challenges, IT teams use load balancers and CDNs to fix issues, but there is a better way. Read on to find out more about it.
Posted: 16 Sep 2023 | Published: 16 Sep 2023

TOPICS:  .NET
NGINX

HP Device Manager 4.5 User Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
Posted: 19 Jul 2013 | Published: 30 Nov 2012

Hewlett Packard Enterprise

CW ASEAN: Time to dial up defences
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

TechTarget ComputerWeekly.com

Addressing common SaaS BI obstacles
sponsored by BeyeNETWORK
EBOOK: What is the future of business intelligence (BI)? According to industry expert Wayne Eckerson, it's cloud computing. Review this comprehensive e-book to gain expert insight into what cloud computing is, the top business benefits cloud-based BI, an in-depth analysis of the SaaS BI market, and much more.
Posted: 26 Jul 2012 | Published: 01 Jul 2012

BeyeNETWORK

ASEAN Storage Magazine eZine October 2015
sponsored by TechTarget Storage
EZINE: This article is about the increased storage challenges that ASEAN organizations face as they adopt big data strategies.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Storage

ANZ Storage Magazine eZine October 2015
sponsored by TechTarget Storage
EZINE: The eZine features an article looking at how the adoption of private, public and hybrid cloud-storage solutions is pushing APAC businesses to completely overhaul the way they manage enterprise data.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Storage

Apt Activity Report T3 2022 Sandworm Deploying Its Enhanced Wiper Arsenal
sponsored by ESET
RESEARCH CONTENT: Malicious activities by advanced persistent threat (APT) groups have been documented and analyzed in this APT Activity Report. Download your copy now to access high-quality strategic, actionable, and tactical cybersecurity threat intelligence.
Posted: 07 Oct 2023 | Published: 07 Oct 2023

TOPICS:  .NET
ESET

E-government benchmark 2016
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 03 Feb 2017 | Published: 03 Feb 2017

TechTarget ComputerWeekly.com

Cloud Computing: Risks and Backup/Recovery Requirements
sponsored by Spanning Cloud Apps
EGUIDE: In this exclusive e-guide, learn the importance of backing up and protecting your documents in Gmail and other Google applications. Also, learn more from Dave Russell and other experts about cloud-to-cloud backup and how it is becoming increasingly popular (and necessary) in today's IT market.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Spanning Cloud Apps

Cloud Storage Adoption Decisions: Weighing Capacity, Cost, and Top Platform Tips
sponsored by Nasuni
EGUIDE: This expert guide from the team at SearchStorage.com will grant you access to a hand-curated list of their top 10 cloud storage platform tips, with additional research content on how your peers are weighing cloud costs and capacity considerations. Access your copy here.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni

Essential Guide to PCI DSS
sponsored by TechTarget Security
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 22 Oct 2009 | Published: 14 Sep 2009

TechTarget Security

5 Steps to Raising Ransomware Resistance
sponsored by TechTarget Security
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

TechTarget Security

Enterprise Network Management Faces Seismic Shift
sponsored by TechTarget Networking
EZINE: Visibility and network performance remain key issues for IT pros, especially as cloud, IoT, and virtualization services become more prevalent. In this special edition of Network Evolution, we explore how the latest network management tools help IT pros maximize uptime and gain insights into network behavior.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

TechTarget Networking

CW Benelux August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 02 Aug 2017 | Published: 10 Aug 2017

TechTarget ComputerWeekly.com