Standards  >   Security Standards  >   Encryption Standards  >  

Symmetric Block Cipher

RSS Feed   
Symmetric Block Cipher Reports
 
Protecting IIoT Devices from Ransomware and Botnet Infections at Scale
sponsored by Barracuda Networks
PRODUCT OVERVIEW: To achieve multi-tiered secure access and cloud scalable security for IIoT devices, read this sheet. It provides you an overview of a secure access controller built for dispersed devices and environments.
Posted: 20 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Enterprise Edge and Cloud Security: A Buyer’s Guide
sponsored by Forcepoint
EGUIDE: Determining which cloud security vendor is right for your organization can be challenging. As more people work remotely and there are more ways to connect to the cloud, providing reliable security has never been more important. Read this cloud security buyer’s guide for exclusive evaluating criteria to help you choose with confidence.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Forcepoint

AT&T Business: Customer Stories – NHS Management, LLC
sponsored by AT&T Cybersecurity
CASE STUDY: In this case study, see how NHS Management, a healthcare provider that supports 50 nursing homes, was able to address the growing security needs of their patients and establish a threat detection and incident response program that allowed them to protect and prevent unwanted access to patient data – read on for the full story.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

Harnessing The Cloud And Data Analytics For Safer, More Secure Elections
sponsored by Carahsoft
WHITE PAPER: The integrity of US elections is pivotal in protecting American democracy. Through digital transformation and technology modernization, state and local governments can bolster their election management and security capabilities. Read this brief for a closer look at how cloud and data analytics can enable safer, more secure elections.
Posted: 25 Jan 2021 | Published: 25 Jan 2021


IT and Cyber Risk Management: The Accelerated Approach
sponsored by MetricStream
EBOOK: While business leaders agree on the seriousness of cyber risks, there is often disagreement on where to allocate budge – leading to fractured security efforts that are rarely effective. Read this e-book to unlock a 5-step approach that CISOs can use to address these disagreements and direct a unified approach to security and risk management.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

MetricStream

JumpStart Guide to Application Security in AWS
sponsored by Fortinet, Inc.
VIDEO: Deploying and securing critical business applications in cloud environments is becoming a standard practice for today’s IT and security driven organizations. In this webinar, join security experts from SANS, Fortinet and AWS as they discuss how to deploy and security applications in AWS environments – watch now for exclusive insight.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

The Future of CIAM: 4 Trends Shaping Identity and Access Management
sponsored by Okta
WHITE PAPER: As cyberthreats evolve, so too do the tools and tactics required to safeguard user access. The following white paper highlights 4 trends shaping the identity and access management (IAM) market – read on to unlock this exclusive insight.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Okta

The Security Implications of Running Software in Containers
sponsored by Red Hat
VIDEO: It’s no surprise that most software development teams prefer the speed, scalability and flexibility of containers. However, it’s critical to consider the security implications of running software in containers. Watch this webinar for a closer look at the security considerations your organization needs to make when it comes to containers.
Posted: 26 Jan 2021 | Premiered: 26 Jan 2021

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info