Standards  >   Security Standards  >   Encryption Standards  >  

Block Cipher

RSS Feed   
Block Cipher Reports
 
Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010

Intel

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Forcepoint Cloud Access Security Broker (CASB) Assessment
sponsored by Forcepoint
RESEARCH CONTENT: This ESG report examines the Forcepoint Cloud Access Security Broker (CASB) to assess its ability to secure the use of any cloud apps across an organization's users and endpoints. Explore ESG's findings and discover how Forcepoint's CASB performs in terms of visibility, risk management, and protection.
Posted: 06 Sep 2018 | Published: 31 Mar 2018

Forcepoint

5 Key Steps for GDPR Compliance
sponsored by Plixer
RESOURCE: Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.
Posted: 11 Jul 2018 | Published: 02 Jul 2018


Executive Summary: A Guide to Protecting Microsoft Office 365 from Security Threats
sponsored by Symantec
RESOURCE: Find out how to transform your security to safely deploy Office 365 and other SaaS apps by learning about how to spot potential vulnerabilities and defend against cloud-based threats.
Posted: 14 Nov 2018 | Published: 31 Aug 2018

Symantec

SOC-as-a-Service for Financial Institutions
sponsored by Arctic Wolf
WHITE PAPER: Find out how mid-sized financial organizations can overcome the leading compliance and security challenges with managed detection and response services.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Arctic Wolf

Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

Selecting a Security Orchestration Vendor
sponsored by Siemplify
WHITE PAPER: This white paper gives an overview of security orchestration, automation, and response technologies, providing you with the tools you need to evaluate vendors. As you select your system, discover which 6 features to look for.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Siemplify

Worldwide Vendor Comparison: Access Management
sponsored by IBM
RESOURCE: In this Gartner Magic Quadrant report, get a breakdown of the leading access management vendors and find out which tools are best suited to help you secure web, mobile, and cloud apps.
Posted: 30 Jul 2018 | Published: 07 Jun 2017

IBM

Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement