Standards  >   Security Standards  >   Encryption Standards  >  

FIPS PUB 197

RSS Feed   
FIPS PUB 197 Reports
 
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

THE CYBERARK PRIVILEGED ACCESS SECURITY SOLUTION FOR U.S. FEDERAL GOVERNMENT AGENCIES
sponsored by Merlin International
WHITE PAPER: US federal government agencies are tasked with the difficult challenge of protecting sensitive data against both internal and external threats. This white paper explores the benefits of establishing a comprehensive Privileged Access Management (PAM) program to protect federal systems & data – read on to get started.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Merlin International

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
EGUIDE: It’s hard to overstate the value of data protection given its ability to safeguard critical assets, maintain brand image and avoid legal issues. However, choosing the right data protection partner can be tough. This data protection buyer’s guide offers key search criteria, questions to ask potential partners and more – read on to get started.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Forcepoint

2020 CROWDSTRIKE GLOBAL SECURITY ATTITUDE SURVEY
sponsored by CrowdStrike
ANALYST REPORT: Supporting a remote workforce has made life even harder for IT security teams in organizations around the world. Cybercriminals have been capitalizing on the chaos, and this has been changing not only mindsets but processes in security. Access CrowdStrike’s 2020 Global Security Attitude Survey to see what’s necessitating security transformation.
Posted: 03 Feb 2021 | Published: 30 Sep 2020

CrowdStrike

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
PRESENTATION: Today’s cyberthreats are becoming increasingly troublesome, and traditional security efforts often lack the unified vision and visibility required to tackle these challenges. Read this presentation for a closer look at today’s advanced threats and discover how Endpoint detection and response (EDR) tools are uniquely positioned to address them.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Bitdefender

The Radicati Group, Inc. Endpoint Security - Market Quadrant 2020
sponsored by Bitdefender
RESEARCH CONTENT: Endpoint security has become a top priority in 2020 – but threats are always evolving, so it’s critical to ensure endpoints are protected with the best-in-class defenses. Read this research report from The Radicati Group for an overview of the key trends, risks and top offerings as they relate to the endpoint security market.
Posted: 16 Feb 2021 | Published: 30 Nov 2020

Bitdefender

Your complete guide for preventing Data Leaks
sponsored by Zivver
EGUIDE: Organizations tend to spend their efforts on protecting their data against hackers while overlooking the impacts of data leaks caused by human error. This e-guide provides comprehensive insight into the causes and risks of data leaks, as well as preventative measures and compliance best practices – read on to get started.
Posted: 28 Jan 2021 | Published: 28 Jan 2021

Zivver

2020 Remote Workforce Security Report
sponsored by Okta
RESEARCH CONTENT: Enabling and securing a remote work posed significant challenges to the IT teams responsible. This research report highlights those specific challenges – from internal operational hurdles to external threats – as well as impacts that went beyond security. Read on to unlock the full report.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Okta

Keynote Tackling Security in the World of Containers and Hybrid Cloud
sponsored by Red Hat
WEBCAST: Placing security at the center of your organization’s processes, technology and culture is critical for addressing modern cyberthreats. This webinar features the Chief Security Architect, who offers best practices and strategic insight into successfully adopting a security culture – watch now to get started.
Posted: 22 Jan 2021 | Premiered: Jan 22, 2021

Red Hat

How To Protect Your Business By Limiting Attack Dwell Time
sponsored by Viavi
WHITE PAPER: For security teams, it may be more realistic to assume that successful attacks against your IT resources can and will occur, rather than trying to prevent them altogether. For such an approach to work, you must minimize the dwell time of attacks. Examine this white paper to see how VIAVI’s Observer platform could help you do so.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Viavi
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences