FIPS PUB 46-1 White Papers

(View All Report Types)
Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER: In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Posted: 16 Oct 2013 | Published: 31 Dec 2009

Lumension

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

How to Align your Security Needs with Business Objectives
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This whitepaper covers the emphasis on security that is growing in IT and offers a solution that can provide data protection that is in line with your business goals.
Posted: 12 Feb 2014 | Published: 10 Apr 2013

Hewlett-Packard Enterprise

Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett Packard Enterprise

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

Enhancing Cybersecurity In An Expanding Risk Landscape
sponsored by Logitech Inc.
WHITE PAPER: The risk of a cyber incident hitting your organization goes up every single year. Along with risks going up, the cost of a breach is also increasing just as fast. However, with so many attack vectors available, IT leaders need to be aware of all points of vulnerability in the business. This even includes wireless peripherals. Read on to learn more.
Posted: 09 Mar 2023 | Published: 09 Mar 2023

TOPICS:  .NET
Logitech Inc.

Boost Hybrid Cloud Security And Consistency
sponsored by Red Hat
PRODUCT OVERVIEW: Organizations leveraging hybrid clouds for flexibility and innovation face security and consistency issues. Discover how Red Hat on Google Cloud boosts hybrid cloud security and consistency in this white paper.
Posted: 03 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Red Hat

Cyber Security Trends 2017 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 08 Feb 2021 | Published: 17 Jul 2017

TechTarget ComputerWeekly.com

The Technology Landscape of Enterprise Solid-State Drives
sponsored by Toshiba
WHITE PAPER: Data is growing and the cloud needs to keep up. Find out about performance and error detection in the best SSD options.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

TOPICS:  IT Management
Toshiba

Hitachi Unified Compute Platform HC: Maximize Hyperconverged Performance with NVMe
sponsored by Hitachi Vantara
WHITE PAPER: Read this paper for an evaluation of Hitachi Unified Compute Platform HC (UCP HC) hyperconverged infrastructure solution with a focus on assessing the performance and value of NVMe-based flash for business-critical applications and databases in the virtualized data center.
Posted: 23 Aug 2021 | Published: 23 Aug 2021

TOPICS:  IT Management
Hitachi Vantara

Secure Cloud Adoption to Enable Business Growth
sponsored by ExaBeam & Google Cloud
ESG THOUGHT LEADERSHIP EBOOK: As cloud services enable organizations to scale to efficiently deliver applications and services, security teams need to ensure they can protect their business-critical application. This e-book explores how to modernize security for digital transformation using the rich capabilities of Google Cloud and its ecosystem of partners.
Posted: 16 Feb 2024 | Published: 16 Feb 2024

TOPICS:  .NET
ExaBeam & Google Cloud

HP Device Manager 4.5 User Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
Posted: 19 Jul 2013 | Published: 30 Nov 2012

Hewlett Packard Enterprise

Addressing common SaaS BI obstacles
sponsored by BeyeNETWORK
EBOOK: What is the future of business intelligence (BI)? According to industry expert Wayne Eckerson, it's cloud computing. Review this comprehensive e-book to gain expert insight into what cloud computing is, the top business benefits cloud-based BI, an in-depth analysis of the SaaS BI market, and much more.
Posted: 26 Jul 2012 | Published: 01 Jul 2012

BeyeNETWORK

CW ASEAN: Time to dial up defences
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Feb 2021 | Published: 08 Mar 2018

TechTarget ComputerWeekly.com

Retail Cybersecurity: The Journey to Zero Trust
sponsored by Cisco DUO
EBOOK: Modern retail organizations are moving data to the cloud while still accessing on-premises applications.
Posted: 02 Feb 2023 | Published: 03 Feb 2023

TOPICS:  .NET
Cisco DUO

ANZ Storage Magazine eZine October 2015
sponsored by TechTarget Storage
EZINE: The eZine features an article looking at how the adoption of private, public and hybrid cloud-storage solutions is pushing APAC businesses to completely overhaul the way they manage enterprise data.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Storage

ASEAN Storage Magazine eZine October 2015
sponsored by TechTarget Storage
EZINE: This article is about the increased storage challenges that ASEAN organizations face as they adopt big data strategies.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Storage

E-government benchmark 2016
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 08 Feb 2021 | Published: 03 Feb 2017

TechTarget ComputerWeekly.com

Cloud Computing: Risks and Backup/Recovery Requirements
sponsored by Spanning Cloud Apps
EGUIDE: In this exclusive e-guide, learn the importance of backing up and protecting your documents in Gmail and other Google applications. Also, learn more from Dave Russell and other experts about cloud-to-cloud backup and how it is becoming increasingly popular (and necessary) in today's IT market.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Spanning Cloud Apps

Cloud Storage Adoption Decisions: Weighing Capacity, Cost, and Top Platform Tips
sponsored by Nasuni
EGUIDE: This expert guide from the team at SearchStorage.com will grant you access to a hand-curated list of their top 10 cloud storage platform tips, with additional research content on how your peers are weighing cloud costs and capacity considerations. Access your copy here.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni

Software Supply Chain State of the Union 2024
sponsored by JFrog
RESEARCH CONTENT: To understand the state of the software supply chain landscape in 2024, tap into this 34-page research report.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  .NET
JFrog

Essential Guide to PCI DSS
sponsored by TechTarget Security
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 22 Oct 2009 | Published: 14 Sep 2009

TechTarget Security

5 Steps to Raising Ransomware Resistance
sponsored by TechTarget Security
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

TechTarget Security

Enterprise Network Management Faces Seismic Shift
sponsored by TechTarget Networking
EZINE: Visibility and network performance remain key issues for IT pros, especially as cloud, IoT, and virtualization services become more prevalent. In this special edition of Network Evolution, we explore how the latest network management tools help IT pros maximize uptime and gain insights into network behavior.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

TechTarget Networking

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by TechTarget ComputerWeekly.com
EZINE: This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 08 Feb 2021 | Published: 07 Dec 2018

TechTarget ComputerWeekly.com

CW Benelux August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 08 Feb 2021 | Published: 10 Aug 2017

TechTarget ComputerWeekly.com

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

FlashStack with Cisco UCS and Pure Storage Flash Array//m for 5000 VMware Horizon View 6.2 Users
sponsored by Pure Storage
WHITE PAPER: This document provides architecture reference and design guide for up to 5000 seat mixed workload onCisco UCS and Pure Storage FlashArray//m with VMware Horizon 6.2 RDS server-based sessions andLinked Clone Windows 7 virtual desktops on vSphere 6.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Pure Storage

Modern Infrastructure ASEAN December 2015
sponsored by TechTarget Data Management
EZINE: Read how Singapore Post transformed itself into an ecommerce supplier through the use of modern technology.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

TechTarget Data Management