Standards  >   Security Standards  >   Encryption Standards  >  

Rijndael

RSS Feed   
Rijndael Reports
 
Protecting IIoT Devices from Ransomware and Botnet Infections at Scale
sponsored by Barracuda Networks
PRODUCT OVERVIEW: To achieve multi-tiered secure access and cloud scalable security for IIoT devices, read this sheet. It provides you an overview of a secure access controller built for dispersed devices and environments.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Microsoft Cloud Accelerator Workshop
sponsored by Insight
VIDEO: In order to realize the full benefits of Microsoft 365, Microsoft offers a number of workshops designed to be a deep dive into a specific functionality or capability. Watch this short video for an overview of what’s covered in the cloud, remote work, compliance and security workshops.
Posted: 08 Jan 2021 | Premiered: 08 Jan 2021

Insight

Safeguarding Democracy: A Guide To Strengthening Election Security
sponsored by Carahsoft
EGUIDE: Elections are a cornerstone of our democracy – therefore the security and integrity of elections is of the utmost importance. Read this e-guide for comprehensive insight into the current state of election systems and infrastructures, threats targeting our systems and best practices for better election security.
Posted: 22 Jan 2021 | Published: 22 Jan 2021


Virtualization-Based Security - External Key Management
sponsored by Thales
WHITE PAPER: Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Their mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field. Scan this white paper to get a closer look at TCT and their enterprise cryptographic key manager.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Thales

DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
sponsored by Red Hat
VIDEO: IT, cloud and DevOps-related risks are on the rise and addressing these challenges alone can be resource-intensive. In this webinar, join experts at Red Hat and Sysdig as they discuss how to extend security, compliance and monitoring capabilities with a secure-by-design platform – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

JumpStart Guide to Application Security in AWS
sponsored by Fortinet, Inc.
VIDEO: Deploying and securing critical business applications in cloud environments is becoming a standard practice for today’s IT and security driven organizations. In this webinar, join security experts from SANS, Fortinet and AWS as they discuss how to deploy and security applications in AWS environments – watch now for exclusive insight.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Secure Your Email by Moving it to O365 with Microsoft & Barracuda
sponsored by Barracuda
VIDEO: Email-based cyberattacks are growing increasingly frequent and harder to detect. This webinar provides a closer look at 13 email threat types, the role of automation in incident response and how to improve email security by using Microsoft Office 365 and Barracuda.
Posted: 07 Jan 2021 | Premiered: 07 Jan 2021

Barracuda

SecureDoc Enterprise Endpoint Encryption | Device Control
sponsored by WinMagic
DATA SHEET: As passwords become less reliable, organizations turn to defense strategies based around endpoint encryption to protect their users, manage devices, prevent breaches and ensure regulatory compliance. Read this data sheet to learn more about SecureDoc Enterprise – designed to offer each of these capabilities under one unified console.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

WinMagic

Keeping Remote Workers Safe and Your Work Secure
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info