AES

AES Reports
The New Future of Professional Services
sponsored by Unit4
RESEARCH CONTENT: What can professional services organizations (PSO) do to thrive in a post-COVID-19 world? This Constellation Research report aims to answer that, and examines how PSOs can evolve to become more innovative and profitable in 2021 and beyond. Download your copy to learn more.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Unit4

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

Infographic: Who needs to be on your digital transformation team?
sponsored by ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

ComputerWeekly.com

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

Planning Guide: BlackBerry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Posted: 18 Oct 2010 | Published: 15 Oct 2010

BlackBerry

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

BlackBerry Smart Card Reader Security
sponsored by BlackBerry
WHITE PAPER: Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.
Posted: 15 Sep 2006 | Published: 01 Jan 2005

BlackBerry

Why Use Cisco Network Storage Systems for Your Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Teridion Connect Data Sheet
sponsored by Teridion
DATA SHEET: Access this data sheet to learn about Teridion Connect, a secure WAN-as-a-Service platform, & discover how its features for automation and self-service can support your enterprise's site connectivity and cloud workloads.
Posted: 10 Mar 2022 | Published: 10 Mar 2022

TOPICS:  .NET
Teridion

Common Myths About Packet Capture
sponsored by Endace
WHITE PAPER: Maintaining a secure, reliable networking is becoming an increasingly complex challenge – new technologies, requirements and cloud environments have resulted in dynamic network environments. Read this white paper to break down 6 common myths about packet capture.
Posted: 29 Apr 2022 | Published: 30 Apr 2022

TOPICS:  .NET
Endace

The people and digital technology transforming the Middle East
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we feature an interview with a British Academic who is helping the UAE establish the world's first university focused on artificial intelligence. Also, find out in this eguide how Abu Dhabi oil giant ADNOC is adapting its business in the digital age, and how Bahrain is preparing itself as a fintech hub.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

Universal Network Encryptor Up To 100 Gbps Centurion
sponsored by Securosys
PRODUCT OVERVIEW: How can you easily and cost-effectively secure broadband multisite communications?Tap into this fact sheet for Centurion’s encryptor technical specifications and features.
Posted: 06 May 2022 | Published: 07 May 2022

TOPICS:  .NET
Securosys

SECURITY: The Quintessential Element of Digital Signature Solutions
sponsored by Certinal
WHITE PAPER: More than ever, organizations are focused on optimizing their business processes with digital transformation at the core, and e-signatures are the perfect example. Explore this white paper to learn about 3 must-know pillars of digital signature security, why a qualified electronic signature solution might be right for your needs, and much more.
Posted: 26 Apr 2022 | Published: 26 Apr 2022

TOPICS:  .NET
Certinal

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

NIST How The Nozomi Networks Solution Supports The NIST Cybersecurity Framework
sponsored by Nozomi Networks
WHITE PAPER: The NIST Cybersecurity Framework (NIST CSF) helps organizations document and implement controls for their IT systems that support critical operations and assets. But NIST CSF compliance can be complicated and costly to achieve. Read this compliance mapping guide to learn how to simplify NIST CSF compliance with Nozomi Networks.
Posted: 06 May 2022 | Published: 06 May 2022

TOPICS:  .NET
Nozomi Networks

The Frightening Realities of Your SDR Program ... and What to Do About Them
sponsored by TechTarget
EBOOK: To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.
Posted: 03 Dec 2021 | Published: 03 Dec 2021

TOPICS:  .NET
TechTarget

Security Guide Zoom Video Communications, Inc.
sponsored by Zoom Video Communications
WHITE PAPER: Zoom places security as the highest priority in the operations of its suite of products and services. They strive to continually provide a robust set of security features and practices to meet the requirements of businesses for safe and secure collaboration. In this white paper, learn about the security features that are available with Zoom.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Zoom Video Communications

Mobile security moving to a unified approach
sponsored by ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

ComputerWeekly.com

CIO Checklist: Is the Cloud Right for HIPAA Compliance?
sponsored by Intel
PRESENTATION TRANSCRIPT: This resource examines how the cloud will play an integral part in the future of medical imaging. Discover how secure, high performance, could-based solutions can help solve your medical image management problems.
Posted: 03 Oct 2012 | Published: 03 Oct 2012

Intel

Spotlight on the Middle East: Emerging IT economy
sponsored by ComputerWeekly.com
EGUIDE: We focus on how countries in the Middle East region are trying to diversify their economies away from oil revenues. We look at how Saudi Arabia is trying to create their own version of Silicon Valley, how Dubai is trying to incorporate bitcoin into the property sector and how the UAE is trying to harness the power of artificial intelligence.
Posted: 29 May 2018 | Published: 29 May 2018

ComputerWeekly.com

Infinibox® Data Defense: Whatever The Threat—Ransomware, Natural Disaster, Systems Failure, Human Error—Infinibox Has Your Back.
sponsored by Infinidat
DATA SHEET: Using Infinidat InfiniBox’s defensive capabilities, your business can protect data using immutable snapshots and detect threats faster with storage pool capacity threshold alerts. To learn how InfiniBox’s Data Defense fairs against ransomware, natural disasters, human error, and systems failures, view this datasheet.
Posted: 25 Feb 2022 | Published: 26 Feb 2022

TOPICS:  .NET
Infinidat

Email Encryption For Financial Services
sponsored by Trustifi
WHITE PAPER: Open this guide now to unlock some of the key features that you should look for in an email encryption solution, so that you can be confident that you’re implementing the most effective protection possible.
Posted: 16 Feb 2022 | Published: 17 Feb 2022

TOPICS:  .NET
All resources sponsored by Trustifi

ActiveStor Ultra: Encryption of Data at Rest
sponsored by Panasas, Inc.
WHITE PAPER: Panasas® ActiveStor® Ultra ASU-100S storage appliances offer data-at-rest encryption and instant, secure drive erasure through self-encrypting drive (SED) technologies. Explore this white paper to learn more about this SED functionality including 6 benefits it offers.
Posted: 09 Sep 2021 | Published: 09 Sep 2021

Panasas, Inc.

Comparing Top Shelf Email Encryption Software Products
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this expert e-guide to learn how the top of the line email encryption software measures up to one another. Find out what to look for when it comes to strength of cryptography, file security, mobile device support, and more.
Posted: 04 May 2017 | Published: 28 Apr 2017

Hewlett Packard Enterprise

How (and why) Carbonite Server Ensures data Immutability for Users
sponsored by Webroot
WHITE PAPER: The evidence of a rise in ransomware attacks is all around us. But with aid from Carbonite Servers, you'll be able to discover the key steps for configuring server backup to ensure your data is safe and sound. Scan through this white paper and see how to better secure your data through Carbonite’s key practice.
Posted: 25 Apr 2022 | Published: 25 Apr 2022

TOPICS:  .NET
Webroot