Standards  >   Security Standards  >   Encryption Standards  >  

Symmetric Block Cipher

RSS Feed   
Symmetric Block Cipher Reports
 
Protecting IIoT Devices from Ransomware and Botnet Infections at Scale
sponsored by Barracuda Networks
PRODUCT OVERVIEW: To achieve multi-tiered secure access and cloud scalable security for IIoT devices, read this sheet. It provides you an overview of a secure access controller built for dispersed devices and environments.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Digital Resilience in the Multi-Cloud Era
sponsored by Trustwave
EBOOK: Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Trustwave

Magic Quadrant for Identity Governance and Administration
sponsored by SailPoint Technologies
WHITE PAPER: Like most security tools, identity governance and administration (IGA) is under pressure to provide cloud-based services to meet customer need. In this Magic Quadrant report, Gartner evaluates key IGA offerings in today’s market to help you determine the right vendor for your needs. Read on to unlock the full report.
Posted: 19 Mar 2020 | Published: 09 Oct 2019

SailPoint Technologies

5 Ways to Boost Agility by Transforming Workforce Identity
sponsored by Ping Identity Corporation
RESOURCE: Workforce identity management enables security teams to monitor and control which users and devices have access to specific areas of data. In this article, discover how this approach to data management can help organizations boost agility and enhance security.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Ping Identity Corporation

Alero Intro
sponsored by CyberArk Software, Inc
VIDEO: In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.
Posted: 25 Mar 2020 | Premiered: 25 Mar 2020

CyberArk Software, Inc

Secure Managed File Transfer: Ultimate Buyer's Guide
sponsored by Help/Systems
WHITE PAPER: Every day, organizations may exchange a considerable amount of files. Because of the sensitive information often contained in files, data transfers should be protected. In this white paper, learn how secure managed file transfer can help your organization protect the data your sharing.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Help/Systems

Magic Quadrant for Secure Web Gateways
sponsored by Menlo Security
RESOURCE: Secure web gateways (SWGs) are becoming a staple at most organizations, allowing them to secure endpoints and devices existing outside the perimeter. In this Magic Quadrant report, Gartner evaluates key SWG offerings in today’s market to help you determine the right vendor for your needs. Read on to unlock the full report.
Posted: 18 Mar 2020 | Published: 11 Nov 2019

Menlo Security

The Hard Truth About Winning Against Cyber Threats
sponsored by Dell SecureWorks
WHITE PAPER: When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Dell SecureWorks

The Third Annual Study on the State of Endpoint Security Risk
sponsored by Morphisec, Inc.
WHITE PAPER: In this year’s annual study into the state of endpoint security risks take a closer look at the perception endpoint security, current trends, tactics and statistics. One noteworthy finding from the study is that 68% of respondents reported one or more attacks in 2019 that resulted in a compromised endpoint. Read on to unlock the full report.
Posted: 17 Mar 2020 | Published: 31 Jan 2020

Morphisec, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info