Symmetric Block Cipher White Papers

(View All Report Types)
Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

Reducing PCI DSS Scope with the First Data® TransArmor® Solution
sponsored by First Data Corporation
WHITE PAPER: Organizations who handle payment card data are obligated to comply with the Payment Card Industry Data Security Standard (PCI DSS). This whitepaper discusses how the TransArmor® solution can enable scope reduction, minimizing costs and effort of PCI compliance.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

First Data Corporation

KineticD Security
sponsored by KineticD
WHITE PAPER: The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

KineticD

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel
WHITE PAPER: This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
Posted: 04 Apr 2011 | Published: 31 Mar 2011

Intel

Protecting User from Firesheep and Sidejacking Attacks with SSL
sponsored by VeriSign EMEA
WHITE PAPER: This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  
Posted: 29 Jul 2011 | Published: 29 Jul 2011

VeriSign EMEA

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

Healthcare Information at Risk: Encryption is not a Panacea
sponsored by Intel
WHITE PAPER: This resource demonstrates how encryption technology can play a key role in safeguarding sensitive patient information. But encryption isn’t a cure-all – there are still some downfalls associated with exclusive reliance on upon it. Read now to learn about the benefits and shortcomings of encryption, as well as other ways to protect electronic data.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Intel

Is Your Network Too Flat? Prevent Data Breaches with Segmentation
sponsored by TechTarget Security
EZINE: How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
Posted: 02 May 2016 | Published: 02 May 2016

TechTarget Security

Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016

TechTarget ComputerWeekly.com

Jargon Buster Guide to Post Quantum Cryptography
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This Jargon Buster will help you to understand the key concepts of quantum computing and why businesses should be acting now to ensure they are able to encrypt sensitive data in a secure way in a post-quantum era.
Posted: 08 Feb 2021 | Published: 02 Oct 2018

TechTarget ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

The Growing Need for Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: More data storage applications require encrypted solutions. Find out about easily integrated, low-cost data protection.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

TOPICS:  IT Management
Micron Technology

E-Guide: Matching WAN application acceleration options to network needs: Expert roadmap
sponsored by BlueCoat
EGUIDE: This expert e-guide discusses basic WAN acceleration techniques as well as best practices to boost application performance. Uncover how to match WAN optimization with acceleration options in order to meet your network’s needs.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

BlueCoat

How to Securely Erase SSD to Keep Your Data Safe
sponsored by Micron Technology
WHITE PAPER: Proper erasing methods are key to data security. Discover options beyond overwriting data to the full disk pack.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

TOPICS:  IT Management
Micron Technology

Embarcadero Change Manager 5.0
sponsored by Embarcadero Technologies, Inc.
TRIAL SOFTWARE: With Embarcadero Change Manager 5.0 you can simplify and automate database change management, streamline development cycles, and ensure availability, performance, and compliance. Download this demo and experience it for yourself.
Posted: 22 Oct 2008 | Premiered: 17 Oct 2008

Embarcadero Technologies, Inc.

Pulse E-Zine: Managing BYOD and Security
sponsored by TechTarget Health IT
EZINE: The quarterly Pulse e-zine delves into a range of issues affecting hospitals, doctors, payers, policymakers and other industry stakeholders. Explore the hottest topics that impact IT decision makers today and gain knowledge from peers through snapshots of trends, SearchHealthIT industry research and our on-location conference coverage.
Posted: 15 May 2013 | Published: 15 May 2013

TechTarget Health IT

Expert ways to maximize security in Exchange
sponsored by TechTarget Data Center
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Data Center

Presentation Transcript - Maximizing Enterprise Backup and Dedupe Performance for Greater ROI
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: Let’s take a look at disk and how it is fundamentally changing data protection. This presentation transcript explains how to leverage the advantages of disk for best possible backup performance and maximum ROI.
Posted: 26 Jan 2010 | Published: 26 Jan 2010

FalconStor Software

The Best Email Security Comes Through Strategy and Tactics
sponsored by TechTarget Security
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

TechTarget Security

Start with Entry-level HSMs for Robust Security in Every Application
sponsored by Utimaco
PRODUCT OVERVIEW: Security is often constrained by limited resources, but with entry level hardware security modules (HSMs), tailored to function seamlessly within these limitations, security doesn’t have to come at the expense of efficiency. Unlock Utimaco’s catalogue of offerings and find the HSM that’s right for your organization.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET
Utimaco

The Transformation of Wireless Network Security
sponsored by TechTarget Security
EBOOK: This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

TechTarget Security

How to Buy The Best ADC, and The Changes to App Load Balancing
sponsored by A10 Networks
EGUIDE: This expert e-guide outlines what you need to know in order to buy the best application delivery controller (ADC) for your company. As a bonus, learn about the new wave of application load balancing.
Posted: 05 Jun 2017 | Published: 30 May 2017

A10 Networks

E-book: Windows Servers and Storage - Choosing Your Server
sponsored by Dell EMC and Microsoft
EBOOK: This eBook provides comprehensive information about servers and server implementation to help IT managers choose the best option for their storage needs.
Posted: 28 Dec 2009 | Published: 01 Jun 2009

Dell EMC and Microsoft

E-book: Choosing Your Server-- What Every IT Manager Must Know About Selecting, Installing and Implementing the Proper Server Architecture
sponsored by Dell, Inc. and Intel®
EBOOK: This eBook provides comprehensive information about servers and server implementation to help IT managers choose the best option for their storage needs.
Posted: 15 Jun 2009 | Published: 01 Jun 2009

Dell, Inc. and Intel®

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

Exchange Insider E-Zine vol. 11: Office 365, mobile devices, Exchange security
sponsored by TechTarget Security
EZINE: In this edition of the Exchange Insider E-Zine, explore how to migrate to Office 365, support mobile devices and protect your Exchange Server environment from the latest threats.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

TechTarget Security

Presentation Transcript: Best Practices around How to Economically Boost System and Application Performance with NAND Flash
sponsored by Sun Microsystems, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript and learn how to optimize your storage infrastructure using the latest NAND technologies, HDD and DRAM.
Posted: 09 Nov 2009 | Published: 09 Nov 2009

Sun Microsystems, Inc.

Presentation Transcript: How to Economically Boost System and Application Performance with NAND Flash
sponsored by Sun Microsystems, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript and learn how to optimize your storage infrastructure using the latest NAND technologies, HDD and DRAM.
Posted: 04 Mar 2009 | Published: 04 Mar 2009

Sun Microsystems, Inc.

HDFS Options for Your Big Data Environment
sponsored by TechTarget Storage
EBOOK: As data grows, it brings challenges. Big data problems include the ability to manage it. Real-time analytics, object storage and Hadoop can help, but here's what you need to know.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

TechTarget Storage

Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Nov 2018

TechTarget ComputerWeekly.com

Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017

TechTarget ComputerWeekly.com