Standards  >   Security Standards  >   Encryption Standards  >  


RSS Feed   
FIPS PUB 197 Reports
Red Hat and Intel: Driving a New Era for the Data Center
sponsored by Intel
PRODUCT OVERVIEW: Read this solution brief to learn more about the collaboration of Red Hat Enterprise Linux and Intel Xeon processors and discover how powerful that combination is with the ability to increase workloads and add capabilities on demand, have plenty of headroom in reserve for usage peaks, have budget-friendly, low operating costs, and more.
Posted: 10 May 2010 | Published: 04 May 2010


Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Encryption Buyer's Guide: 5 Vendor Reviews
sponsored by TechTarget
RESOURCE: Discover data protection measures your organization can take to lessen the risks of being attacked by ransomware by utilizing your data protection guide: Two Quick Data Protection Steps for Ransomware. Take our survey to gain access to this guide as well as Encryption Buyers Guide: 5 Vendor Reviews.
Posted: 02 Oct 2017 | Published: 02 Oct 2017


European Perceptions, Preparedness and Strategies for IoT Security
sponsored by
ESSENTIAL GUIDE: Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.
Posted: 12 Jul 2017 | Published: 12 Jul 2017

The Race to Readiness
sponsored by Citrix
WHITE PAPER: According to a study conducted by Verizon, 63% of security breaches involve weak or stolen credentials. This white paper offers 4 steps and explanations to getting a head start on GDPR data security to help your enterprise protect against breaches.
Posted: 24 Oct 2017 | Published: 24 Oct 2017


The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018


Achieve Effective PCI Compliance by Automating Required Controls and Processes
sponsored by Skybox Security
WHITE PAPER: Find out how to improve PCI DSS compliance by incorporating a platform into your network and information security workflows that provides a holistic understanding of your attack surface.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Skybox Security

The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

The Role of Automation in Optimizing Network Performance and Security
sponsored by FireMon
WHITE PAPER: As networks become more complex, network visibility reduces making it harder to identify and contain threats. Access this resource to learn how to overcome the challenges with this network security complexity gap.
Posted: 11 Aug 2017 | Published: 11 Aug 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement