FIPS PUB 197 White Papers

(View All Report Types)
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

How to Extend your Identity Management Systems to use OAuth
sponsored by Forum Systems
WHITE PAPER: Read this resource to learn how to extend your authentication and authorization model to outsourced services. Click through for details on the deployment process, including the benefits of using an API gateway to help with integration.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Forum Systems

KineticD Security
sponsored by KineticD
WHITE PAPER: The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

KineticD

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

Study on Cybercrime's Cost to Business
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive whitepaper covers the results of a survey that analyzed the cost of cyber-crime.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Hewlett Packard Enterprise

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Threat Control and Containment: A Proactive Approach Can Lead to More Network Security Plus Peace of Mind
sponsored by CDW Corporation
WHITE PAPER: Taking a proactive approach to mobile security can help you stay ahead of the curve and protect the organization. Read this paper to learn best practices for mobile security.
Posted: 08 Sep 2009 | Published: 16 Mar 2009

CDW Corporation

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

In Cloud Storage, Options Abound
sponsored by TechTarget Cloud Computing
EBOOK: Examine cloud-based storage in terms of cost, manageability, security and latency/availability.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

TechTarget Cloud Computing

Cloud ERP – a sleeping giant awakes?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: For a long time now, ERP has been an important but sleepy aspect of enterprise IT. But is the time for cloud ERP now?
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com

CW Benelux - August-October 2021: Netherlands sees increase in the number of women opting for an ICT career
sponsored by TechTarget ComputerWeekly.com
EZINE: The IT skills gap in the Netherlands could be about to narrow as more women take up jobs in the sector. Figures from last year revealed that the number of female ICT professionals grew by 6.5%, while the number of male ICT professionals increased by only 1.7%. Read more about it in this issue.
Posted: 29 Jul 2021 | Published: 12 Aug 2021

TechTarget ComputerWeekly.com

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by TechTarget ComputerWeekly.com
EZINE: This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 08 Feb 2021 | Published: 07 Dec 2018

TechTarget ComputerWeekly.com

Computer Weekly – 20 June 2017: Why did British Airways' datacentre crash?
sponsored by TechTarget ComputerWeekly.com
EZINE: After the recent hastily held general election, the former Cabinet Office minster Ben Gummer lost his Ipswich seat to one of Theresa May's close allies, leaving many wondering if a digital future is still a top priority in the new government. Find the answer to this question, as well as information on the cause of the British Airways IT failure.
Posted: 08 Feb 2021 | Published: 19 Jun 2017

TechTarget ComputerWeekly.com

Essential Guide to PCI DSS
sponsored by TechTarget Security
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 22 Oct 2009 | Published: 14 Sep 2009

TechTarget Security

Software Supply Chain State of the Union 2024
sponsored by JFrog
RESEARCH CONTENT: To understand the state of the software supply chain landscape in 2024, tap into this 34-page research report.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  .NET
JFrog

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

Information Security Magazine

Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
sponsored by Information Security Magazine
EBOOK: Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 08 Apr 2009 | Published: 01 Feb 2009

Information Security Magazine

Computer Weekly – 26 May 2015: Microservices and DevOps are changing software development
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Hailo about its software development approach, which sees the taxi app use microservices and DevOps techniques. We hear from users of OpenStack, the open source cloud software, about how they are building digital businesses. And our buyer's guide looks at customer experience management. Read the issue now.
Posted: 22 May 2015 | Published: 22 May 2015

TechTarget ComputerWeekly.com

Essential Guide to Threat Management
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 19 Mar 2009 | Published: 19 Mar 2009

Information Security Magazine

FlashStack with Cisco UCS and Pure Storage Flash Array//m for 5000 VMware Horizon View 6.2 Users
sponsored by Pure Storage
WHITE PAPER: This document provides architecture reference and design guide for up to 5000 seat mixed workload onCisco UCS and Pure Storage FlashArray//m with VMware Horizon 6.2 RDS server-based sessions andLinked Clone Windows 7 virtual desktops on vSphere 6.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Pure Storage

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’
sponsored by Information Security Magazine
EZINE: This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.
Posted: 09 Mar 2010 | Published: 09 Mar 2010

Information Security Magazine

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by TechTarget Mobile Computing
EBOOK: Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

TechTarget Mobile Computing

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine

Access Management
sponsored by One Identity
ANALYST REPORT: Download this 7-chapter KuppingerCole report to gain a comprehensive understanding of the current access management market, including a compass to help you navigate vendor claims and choose the solution most suitable for your company.
Posted: 29 May 2024 | Published: 29 May 2024

TOPICS:  .NET
One Identity

Computer Weekly 6 September 2011: Download the latest issue of the UK’s leading technology publication, featuring the news, analysis and opinion that matters to IT decision-makers
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we take an in-depth look at HP's strategic shake-up, and ask what it means for the supplier's customers and the UK IT industry as a whole. We also discuss a major research study into why IT projects go wrong, and start our latest Buyer's Guide, about business intelligence. Download the new issue now.
Posted: 02 Sep 2011 | Published: 06 Sep 2011

TechTarget ComputerWeekly.com

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security

Information Security Magazine: March 2009 - Sky-High Risk?
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
Posted: 20 Apr 2009 | Published: 20 Mar 2009

Information Security Magazine

Big Data nutzbringend einsetzen: Die IBM-Big-Data-Plattform
sponsored by IBM (German)
WHITE PAPER: Big Data ist in aller Munde – Zeit, sich schlau zu machen. Hier erfahren Sie alles über IBMs umfassende Big-Data-Plattform für Unternehmen.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

TOPICS:  IT Management
IBM (German)