AES Reports

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022


Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012


Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011


IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011


The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011


Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022


Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011


Polymorphic Phishing Attacks: 5 Insights to Help Stop Them
sponsored by Cofense
WHITE PAPER: Polymorphic phishing attacks use rapidly changing automated messaging in order to engineer passages through email filtering systems. Read this white paper, in which Cofense has compiled a list of 5 insights into thwarting polymorphic phishing and take the first step toward securing your organization’s data.
Posted: 29 Jun 2022 | Published: 29 Jun 2022

All resources sponsored by Cofense

Planning Guide: BlackBerry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Posted: 18 Oct 2010 | Published: 15 Oct 2010


Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

BlackBerry Smart Card Reader Security
sponsored by BlackBerry
WHITE PAPER: Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.
Posted: 15 Sep 2006 | Published: 01 Jan 2005


Why Use Cisco Network Storage Systems for Your Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Surviving? Barely! 3 Current Barriers to XDR Success and How to Fix Them
sponsored by TechTarget
INFOGRAPHIC: In this TechTarget infographic, take a look at the 3 leading challenges impacting SDR performance, and how organizations can turn their situation around.
Posted: 09 Mar 2023 | Published: 09 Mar 2023


NIST How The Nozomi Networks Solution Supports The NIST Cybersecurity Framework
sponsored by Nozomi Networks
WHITE PAPER: The NIST Cybersecurity Framework (NIST CSF) helps organizations document and implement controls for their IT systems that support critical operations and assets. But NIST CSF compliance can be complicated and costly to achieve. Read this compliance mapping guide to learn how to simplify NIST CSF compliance with Nozomi Networks.
Posted: 06 May 2022 | Published: 06 May 2022

Nozomi Networks

Gain Advanced Security Protection with the Combined Capabilities of Windows Server 2022 and Next-Generation Dell EMC™ PowerEdge™ Servers
sponsored by Dell and Microsoft
WHITE PAPER: Take a look through this white paper to learn how the combination of next-generation Dell EMC PowerEdge servers and Windows Server 2022 simplifies the task of aligning hardware, firmware and OS in order to secure business-critical workloads.
Posted: 09 Nov 2022 | Published: 09 Nov 2022

Dell and Microsoft

The Frightening Realities of Your SDR Program ... and What to Do About Them
sponsored by TechTarget
EBOOK: To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.
Posted: 03 Dec 2021 | Published: 03 Dec 2021


The Reality of Ransomware: What You Need to Know in 2022
sponsored by Integrity360
WHITE PAPER: Ransomware threats are so common that they account for 10% of all security breaches. This white paper gives a brief overview of ransomware, analyzing its growing danger. Integrity360 advocates for educating employees in order to prevent cybercriminals from using social engineering as an entry point for ransomware attacks. Read on to learn more.
Posted: 22 Sep 2022 | Published: 22 Sep 2022


Winning Customer Trust In A Hostile Digital Environment
sponsored by 8x8, Inc.
WHITE PAPER: How are cybercriminals getting your customer data? And how can you stop them? Access this white paper to learn how you can leverage an automated scanning and monitoring system that identifies, highlights, and weeds out threats before they infiltrate systems to power better customer experiences.
Posted: 11 Mar 2023 | Published: 11 Mar 2023

8x8, Inc.

A Short, Complete Guide to Intent Data for Sales and Marketing
sponsored by TechTarget
WHITE PAPER: Dive into this TechTarget white paper to learn how you can accelerate your own journey with intent data – whatever stage you’re at.
Posted: 25 Mar 2023 | Published: 25 Mar 2023


CIO Checklist: Is the Cloud Right for HIPAA Compliance?
sponsored by Intel
PRESENTATION TRANSCRIPT: This resource examines how the cloud will play an integral part in the future of medical imaging. Discover how secure, high performance, could-based solutions can help solve your medical image management problems.
Posted: 03 Oct 2012 | Published: 03 Oct 2012


Combatting Ransomware with Primary Storage
sponsored by NetApp
WHITE PAPER: Read through this white paper to learn how positioning the production storage environment as a core component of your ransomware resiliency strategy can help IT operations better prevent and recover from ransomware attacks.
Posted: 15 Jul 2022 | Published: 15 Jul 2022


Policy-Driven Solutions for Secure Data Exchange
sponsored by PKWare
WHITE PAPER: Protecting essential data exchanges is an increasingly important business imperative. Read this white paper to learn about the importance of encryption, common challenges, how to apply policy-driven security to data exchanges, and more.
Posted: 26 Jan 2022 | Published: 19 Apr 2021

TOPICS:  Cybersecurity

Today’s Market Realities Require New Demand Gen Strategies
sponsored by TechTarget
EBOOK: In this e-book, we discuss the shortcomings of the classical lead gen model and provide a framework you can use to improve productivity and effectively identify, pursue and manage real opportunities.
Posted: 08 Feb 2021 | Published: 03 Nov 2020


Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

Smart Paper, Issue 2: Navigating the Path to Virtualisation
sponsored by CA Technologies
EZINE: This issue from Smart Paper explores virtualisation as an optimal solution for CIOs interested in increasing agility and efficiency in their business. Following a simple path, CIOs can migrate from a testing and development environment to a pure virtual or a hybrid production environment, thereby realizing the benefits of virtualisation.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

CA Technologies

The Entropy Problem
sponsored by PKWare
WHITE PAPER: The unpredictability of data is what gives encryption it’s strength – so approaches that stifle the “randomness” of the process also present weakness. Read this white paper to learn more about modern encryption and the entropy problem.
Posted: 26 Jan 2022 | Published: 20 Apr 2021

TOPICS:  Cybersecurity

Logitech Sync Security & Privacy Whitepaper
sponsored by Logitech Inc.
WHITE PAPER: For today’s hybrid work environment, video collaboration and virtual meetings are necessary. However, just like all other devices on your network, your meeting rooms need to be secure, and your system needs to be able to scale with your business. To learn more about a cloud-based solution that offers both, read on to see more.
Posted: 05 Aug 2022 | Published: 05 Aug 2022

Logitech Inc.

A Checklist for Graph Database Security
sponsored by ArangoDB
WHITE PAPER: Graph databases are ideal for complex use cases that demand security for success and compliance. But not all are created equal. Access this white paper for a checklist for evaluating a graph database’s security and to learn about real-world examples of how organizations that demand best-in-class security use graph databases.
Posted: 09 Mar 2023 | Published: 09 Mar 2023