Standards  >   Security Standards  >   Encryption Standards  >  

FIPS PUB 197

RSS Feed   
FIPS PUB 197 Reports
 
Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010

Intel

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

The Challenge of Building the Right Security Automation Architecture
sponsored by Juniper Networks
RESEARCH CONTENT: This Ponemon research report examines how the use of a security automation architecture is changing the game for cybersecurity. Find out how organizations have already started using automation to improve their security postures.
Posted: 17 Jul 2018 | Published: 30 Jun 2018

Juniper Networks

Help for CISOs Overwhelmed by Cybersecurity Threats
sponsored by MASERGY
WHITE PAPER: Find out how to build your security strategy on a foundation of executive and senior IT-level collaboration, supported by managed detection and response services.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

MASERGY

Defending against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: In a world dominated by SSL/TLS encrypted traffic, find out how to overcome various challenges with inbound and outbound traffic inspection so that you can effectively neutralize malware attacks, intelligently route traffic, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

SSL: A Double-Edged Sword
sponsored by NSS Labs
WHITE PAPER: Discover the risks of existing SSL technologies, the opportunities new SSL approaches bring to organizations of all sizes, and the factors to consider when evaluating your SSL ecosystem.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

NSS Labs

5 Categories of Questions for Evaluating AI-Driven Security Tools
sponsored by Cylance
WHITE PAPER: With countless numbers of security tools boasting "AI and machine learning capabilities," AI has become something of a buzzword in the security world. But sometimes, there's some truth to the hype. Get tips on how to effectively evaluate AI-based security tools by learning about 5 useful categories of questions to ask.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cylance

GDPR is Here: Are You Ready?
sponsored by Oracle Cloud
VIDEO: In this webcast, hear from Allesandro Vallega, Security & GDPR business development director at Oracle EMEA about survey results, maturity categories across industries, and cloud services that can help achieve GDPR compliance.
Posted: 26 Jul 2018 | Premiered: 24 Jul 2018

Oracle Cloud

The Financial and Security Impact of Imperva SecureSphere
sponsored by Imperva
RESEARCH CONTENT: In this Total Economic Impact report, discover Forrester Research's findings about the Impeva SecureSphere, a unified security platform designed to protect apps and data from potential hackers.
Posted: 09 Aug 2018 | Published: 31 Jan 2018

Imperva

10 Reasons Enterprises are Moving Security to the Cloud
sponsored by Zscaler
WHITE PAPER: Organizations have already recognized the value in moving apps to the cloud – now they're looking to migrate their security as well. Learn about the Zscaler Security Cloud and discover 10 reasons enterprises have started moving security to the cloud.
Posted: 01 Aug 2018 | Published: 31 Dec 2017

Zscaler
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement