Symmetric Block Cipher White Papers

(View All Report Types)
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos

Airport Insecurity: The Case of Lost Laptops
sponsored by Dell India
WHITE PAPER: This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers.
Posted: 15 Jan 2010 | Published: 30 Jun 2008

Dell India

Access Certification: Addressing and Building on a Critical Security Control
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
Posted: 21 Mar 2011 | Published: 01 Jan 2010

Oracle Corporation

Cloud-Stored Offsite Database Backups
sponsored by Oracle Corporation
WHITE PAPER: Cloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.
Posted: 06 Oct 2010 | Published: 17 May 2010

Oracle Corporation

Rethinking Information Security to Improve Business Agility
sponsored by Intel
WHITE PAPER: To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more.
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Intel

Reducing PCI DSS Scope with the First Data® TransArmor® Solution
sponsored by First Data Corporation
WHITE PAPER: Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER: In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013

Absolute

 Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 12 Oct 2010 | Published: 06 Oct 2010

Sophos

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by TechTarget Security
EZINE: How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
Posted: 02 May 2016 | Published: 02 May 2016

TechTarget Security

Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016

TechTarget ComputerWeekly.com

Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018

TechTarget ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

The Growing Need for Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: More data storage applications require encrypted solutions. Find out about easily integrated, low-cost data protection.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

TOPICS:  IT Management
Micron Technology

E-Guide: Matching WAN application acceleration options to network needs: Expert roadmap
sponsored by BlueCoat
EGUIDE: This expert e-guide discusses basic WAN acceleration techniques as well as best practices to boost application performance. Uncover how to match WAN optimization with acceleration options in order to meet your network’s needs.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

BlueCoat

How to Securely Erase SSD to Keep Your Data Safe
sponsored by Micron Technology
WHITE PAPER: Proper erasing methods are key to data security. Discover options beyond overwriting data to the full disk pack.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

TOPICS:  IT Management
Micron Technology

Embarcadero Change Manager 5.0
sponsored by Embarcadero Technologies, Inc.
TRIAL SOFTWARE: With Embarcadero Change Manager 5.0 you can simplify and automate database change management, streamline development cycles, and ensure availability, performance, and compliance. Download this demo and experience it for yourself.
Posted: 22 Oct 2008 | Premiered: 17 Oct 2008

Embarcadero Technologies, Inc.

Pulse E-Zine: Managing BYOD and Security
sponsored by TechTarget Health IT
EZINE: The quarterly Pulse e-zine delves into a range of issues affecting hospitals, doctors, payers, policymakers and other industry stakeholders. Explore the hottest topics that impact IT decision makers today and gain knowledge from peers through snapshots of trends, SearchHealthIT industry research and our on-location conference coverage.
Posted: 15 May 2013 | Published: 15 May 2013

TechTarget Health IT

Expert ways to maximize security in Exchange
sponsored by TechTarget Data Center
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Data Center

Presentation Transcript - Maximizing Enterprise Backup and Dedupe Performance for Greater ROI
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: Let’s take a look at disk and how it is fundamentally changing data protection. This presentation transcript explains how to leverage the advantages of disk for best possible backup performance and maximum ROI.
Posted: 26 Jan 2010 | Published: 26 Jan 2010

FalconStor Software

The Best Email Security Comes Through Strategy and Tactics
sponsored by TechTarget Security
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

TechTarget Security

Start with Entry-level HSMs for Robust Security in Every Application
sponsored by Utimaco
PRODUCT OVERVIEW: Security is often constrained by limited resources, but with entry level hardware security modules (HSMs), tailored to function seamlessly within these limitations, security doesn’t have to come at the expense of efficiency. Unlock Utimaco’s catalogue of offerings and find the HSM that’s right for your organization.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET
Utimaco

The Transformation of Wireless Network Security
sponsored by TechTarget Security
EBOOK: This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

TechTarget Security

How to Buy The Best ADC, and The Changes to App Load Balancing
sponsored by A10 Networks
EGUIDE: This expert e-guide outlines what you need to know in order to buy the best application delivery controller (ADC) for your company. As a bonus, learn about the new wave of application load balancing.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

E-book: Windows Servers and Storage - Choosing Your Server
sponsored by Dell EMC and Microsoft
EBOOK: This eBook provides comprehensive information about servers and server implementation to help IT managers choose the best option for their storage needs.
Posted: 28 Dec 2009 | Published: 01 Jun 2009

Dell EMC and Microsoft

E-book: Choosing Your Server-- What Every IT Manager Must Know About Selecting, Installing and Implementing the Proper Server Architecture
sponsored by Dell, Inc. and Intel®
EBOOK: This eBook provides comprehensive information about servers and server implementation to help IT managers choose the best option for their storage needs.
Posted: 15 Jun 2009 | Published: 01 Jun 2009

Dell, Inc. and Intel®

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security
sponsored by TechTarget Security
EZINE: In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

TechTarget Security

Presentation Transcript: Best Practices around How to Economically Boost System and Application Performance with NAND Flash
sponsored by Sun Microsystems, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript and learn how to optimize your storage infrastructure using the latest NAND technologies, HDD and DRAM.
Posted: 09 Nov 2009 | Published: 09 Nov 2009

Sun Microsystems, Inc.

Presentation Transcript: How to Economically Boost System and Application Performance with NAND Flash
sponsored by Sun Microsystems, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript and learn how to optimize your storage infrastructure using the latest NAND technologies, HDD and DRAM.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Sun Microsystems, Inc.

HDFS Options for Your Big Data Environment
sponsored by TechTarget Storage
EBOOK: As data grows, it brings challenges. Big data problems include the ability to manage it. Real-time analytics, object storage and Hadoop can help, but here's what you need to know.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

TechTarget Storage

Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Nov 2018

TechTarget ComputerWeekly.com

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com