AES Reports

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

Infographic: Who needs to be on your digital transformation team?
sponsored by ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

ComputerWeekly.com

Cloud Security: Built from the Ground Up
sponsored by Intel
VIDEO: Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
Posted: 07 Apr 2011 | Premiered: 22 Feb 2011

Intel

Polymorphic Phishing Attacks: 5 Insights to Help Stop Them
sponsored by Cofense
WHITE PAPER: Polymorphic phishing attacks use rapidly changing automated messaging in order to engineer passages through email filtering systems. Read this white paper, in which Cofense has compiled a list of 5 insights into thwarting polymorphic phishing and take the first step toward securing your organization’s data.
Posted: 29 Jun 2022 | Published: 29 Jun 2022

TOPICS:  .NET
All resources sponsored by Cofense

Planning Guide: BlackBerry Enterprise Server
sponsored by BlackBerry
WHITE PAPER: The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Posted: 18 Oct 2010 | Published: 15 Oct 2010

BlackBerry

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

BlackBerry Smart Card Reader Security
sponsored by BlackBerry
WHITE PAPER: Through an Elliptic Curve Diffie-Hellman (ECDH) key exchange, the BlackBerry Smart Card Reader is designed to enable wireless digital signing and encryption of wireless email messages.
Posted: 15 Sep 2006 | Published: 01 Jan 2005

BlackBerry

Why Use Cisco Network Storage Systems for Your Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Teridion Connect Data Sheet
sponsored by Teridion
DATA SHEET: Access this data sheet to learn about Teridion Connect, a secure WAN-as-a-Service platform, & discover how its features for automation and self-service can support your enterprise's site connectivity and cloud workloads.
Posted: 10 Mar 2022 | Published: 10 Mar 2022

TOPICS:  .NET
Teridion

The people and digital technology transforming the Middle East
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we feature an interview with a British Academic who is helping the UAE establish the world's first university focused on artificial intelligence. Also, find out in this eguide how Abu Dhabi oil giant ADNOC is adapting its business in the digital age, and how Bahrain is preparing itself as a fintech hub.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

NIST How The Nozomi Networks Solution Supports The NIST Cybersecurity Framework
sponsored by Nozomi Networks
WHITE PAPER: The NIST Cybersecurity Framework (NIST CSF) helps organizations document and implement controls for their IT systems that support critical operations and assets. But NIST CSF compliance can be complicated and costly to achieve. Read this compliance mapping guide to learn how to simplify NIST CSF compliance with Nozomi Networks.
Posted: 06 May 2022 | Published: 06 May 2022

TOPICS:  .NET
Nozomi Networks

Security Guide Zoom Video Communications, Inc.
sponsored by Zoom Video Communications
WHITE PAPER: Zoom places security as the highest priority in the operations of its suite of products and services. They strive to continually provide a robust set of security features and practices to meet the requirements of businesses for safe and secure collaboration. In this white paper, learn about the security features that are available with Zoom.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Zoom Video Communications

The Frightening Realities of Your SDR Program ... and What to Do About Them
sponsored by TechTarget
EBOOK: To compete for pipeline in their markets, companies have had to add more and more SDRs to their prospecting program. This e-book, The Frightening Realities of Your SDR Program ... and What to Do About Them, explores recent research that highlights key failures and how to go about solving them. Download your copy to get started.
Posted: 03 Dec 2021 | Published: 03 Dec 2021

TOPICS:  .NET
TechTarget

Securing Healthcare Against Ransomware Post-COVID-19
sponsored by Lookout
WHITE PAPER: Due to the sensitive nature of healthcare data, whether it be patient medical records or intellectual property on new drug development, healthcare organizations are prime targets for ransomware attacks. Download this report to learn how attack strategies are adapting in a cloud-first world and how healthcare can defend against ransomware.
Posted: 25 Feb 2022 | Published: 26 Feb 2022

TOPICS:  .NET
Lookout

The Reality of Ransomware: What You Need to Know in 2022
sponsored by Integrity360
WHITE PAPER: Ransomware threats are so common that they account for 10% of all security breaches. This white paper gives a brief overview of ransomware, analyzing its growing danger. Integrity360 advocates for educating employees in order to prevent cybercriminals from using social engineering as an entry point for ransomware attacks. Read on to learn more.
Posted: 22 Sep 2022 | Published: 22 Sep 2022

TOPICS:  .NET
Integrity360

Mobile security moving to a unified approach
sponsored by ComputerWeekly.com
EGUIDE: This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.
Posted: 28 Feb 2018 | Published: 28 Feb 2018

ComputerWeekly.com

Cloud Document Management Security Checklist
sponsored by Ricoh
RESOURCE: Tired of playing catch-up with your tech stack? Cloud document management—where the provider hosts your system, files, etc.— can help you ensure the most up-to-date security, remote access, and interoperability. Access this tip sheet to learn about 7 must-have features to make sure the solution you choose keeps your data secure.
Posted: 02 Jun 2022 | Published: 03 Jun 2022

TOPICS:  .NET
Ricoh

Spotlight on the Middle East: Emerging IT economy
sponsored by ComputerWeekly.com
EGUIDE: We focus on how countries in the Middle East region are trying to diversify their economies away from oil revenues. We look at how Saudi Arabia is trying to create their own version of Silicon Valley, how Dubai is trying to incorporate bitcoin into the property sector and how the UAE is trying to harness the power of artificial intelligence.
Posted: 29 May 2018 | Published: 29 May 2018

ComputerWeekly.com

CIO Checklist: Is the Cloud Right for HIPAA Compliance?
sponsored by Intel
PRESENTATION TRANSCRIPT: This resource examines how the cloud will play an integral part in the future of medical imaging. Discover how secure, high performance, could-based solutions can help solve your medical image management problems.
Posted: 03 Oct 2012 | Published: 03 Oct 2012

Intel

How (and why) Carbonite Server Ensures data Immutability for Users
sponsored by Webroot
WHITE PAPER: The evidence of a rise in ransomware attacks is all around us. But with aid from Carbonite Servers, you'll be able to discover the key steps for configuring server backup to ensure your data is safe and sound. Scan through this white paper and see how to better secure your data through Carbonite’s key practice.
Posted: 25 Apr 2022 | Published: 25 Apr 2022

TOPICS:  .NET
Webroot

Policy-Driven Solutions for Secure Data Exchange
sponsored by PKWare
WHITE PAPER: Protecting essential data exchanges is an increasingly important business imperative. Read this white paper to learn about the importance of encryption, common challenges, how to apply policy-driven security to data exchanges, and more.
Posted: 26 Jan 2022 | Published: 19 Apr 2021

TOPICS:  Cybersecurity
PKWare

Combatting Ransomware with Primary Storage
sponsored by NetApp
WHITE PAPER: Read through this white paper to learn how positioning the production storage environment as a core component of your ransomware resiliency strategy can help IT operations better prevent and recover from ransomware attacks.
Posted: 15 Jul 2022 | Published: 15 Jul 2022

TOPICS:  .NET
NetApp

Essential Guide to Security
sponsored by Splunk
WHITE PAPER: Check out The Essential Guide to Security for 2020 to discover new security use cases as well as how to implement Splunk's security product suite for advanced security analytics, SOAR, SIEM, MITRE ATT&CK, machine learning and more, all in one place to power your SOC.
Posted: 08 Feb 2021 | Published: 10 Mar 2020

Splunk