FIPS PUB 46-1 White Papers

(View All Report Types)
Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

How to Align your Security Needs with Business Objectives
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This whitepaper covers the emphasis on security that is growing in IT and offers a solution that can provide data protection that is in line with your business goals.
Posted: 12 Feb 2014 | Published: 10 Apr 2013

Hewlett-Packard Enterprise

Closing the Back Door on Network Application Vulnerabilities
sponsored by Sophos
WHITE PAPER: This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Sophos

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

Enhancing Cybersecurity In An Expanding Risk Landscape
sponsored by Logitech Inc.
WHITE PAPER: The risk of a cyber incident hitting your organization goes up every single year. Along with risks going up, the cost of a breach is also increasing just as fast. However, with so many attack vectors available, IT leaders need to be aware of all points of vulnerability in the business. This even includes wireless peripherals. Read on to learn more.
Posted: 09 Mar 2023 | Published: 09 Mar 2023

TOPICS:  .NET
Logitech Inc.

Boost Hybrid Cloud Security And Consistency
sponsored by Red Hat
PRODUCT OVERVIEW: Organizations leveraging hybrid clouds for flexibility and innovation face security and consistency issues. Discover how Red Hat on Google Cloud boosts hybrid cloud security and consistency in this white paper.
Posted: 03 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Red Hat

Cyber Security Trends 2017 ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: For a few years now, the Association of Southeast Asian Nations (ASEAN) have called for closer collaboration among countries in the region on cyber security, given the transactional nature of cyber threats. Read more about these issues and how threat intelligence can help detect clandestine cyber activity before they turn into full-blown attacks.
Posted: 08 Feb 2021 | Published: 17 Jul 2017

TechTarget ComputerWeekly.com

The Technology Landscape of Enterprise Solid-State Drives
sponsored by Toshiba
WHITE PAPER: Data is growing and the cloud needs to keep up. Find out about performance and error detection in the best SSD options.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

TOPICS:  IT Management
Toshiba

Hitachi Unified Compute Platform HC: Maximize Hyperconverged Performance with NVMe
sponsored by Hitachi Vantara
WHITE PAPER: Read this paper for an evaluation of Hitachi Unified Compute Platform HC (UCP HC) hyperconverged infrastructure solution with a focus on assessing the performance and value of NVMe-based flash for business-critical applications and databases in the virtualized data center.
Posted: 23 Aug 2021 | Published: 23 Aug 2021

TOPICS:  IT Management
Hitachi Vantara

Secure Cloud Adoption to Enable Business Growth
sponsored by Google
ESG RESEARCH REPORT: 86% of organizations run production workloads in public cloud infrastructure/platforms, according to research by Enterprise Strategy Group (ESG). View your complimentary copy of the ESG report today to learn how to secure cloud adoption and enable business growth.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Google

Secure Cloud Adoption to Enable Business Growth
sponsored by ExaBeam & Google Cloud
ESG THOUGHT LEADERSHIP EBOOK: As cloud services enable organizations to scale to efficiently deliver applications and services, security teams need to ensure they can protect their business-critical application. This e-book explores how to modernize security for digital transformation using the rich capabilities of Google Cloud and its ecosystem of partners.
Posted: 16 Feb 2024 | Published: 16 Feb 2024

TOPICS:  .NET
ExaBeam & Google Cloud

HP Device Manager 4.5 User Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
Posted: 19 Jul 2013 | Published: 30 Nov 2012

Hewlett Packard Enterprise

Addressing common SaaS BI obstacles
sponsored by BeyeNETWORK
EBOOK: What is the future of business intelligence (BI)? According to industry expert Wayne Eckerson, it's cloud computing. Review this comprehensive e-book to gain expert insight into what cloud computing is, the top business benefits cloud-based BI, an in-depth analysis of the SaaS BI market, and much more.
Posted: 26 Jul 2012 | Published: 01 Jul 2012

BeyeNETWORK

CW ASEAN: Time to dial up defences
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a closer look at ASEAN's patchy cyber security landscape, including varying levels of cyber resilience across the region, cyber security strategies adopted by different countries, as well as efforts to improve cyber capabilities and foster greater collaboration in the common fight against cyber threats.
Posted: 08 Feb 2021 | Published: 08 Mar 2018

TechTarget ComputerWeekly.com

Google Cloud Security Ecosystem Egnyte
sponsored by Google
ESG TECHNICAL VALIDATION REPORT: Recent findings show that 86% of organizations run production workloads on public cloud infrastructure/platforms, and organizations are increasingly adopting a cloud-first policy for new applications. This Technical Validation from TechTarget’s Enterprise Strategy Group (ESG) evaluates the Google Cloud Security Ecosystem. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Google

Retail Cybersecurity: The Journey to Zero Trust
sponsored by Cisco DUO
EBOOK: Modern retail organizations are moving data to the cloud while still accessing on-premises applications.
Posted: 02 Feb 2023 | Published: 03 Feb 2023

TOPICS:  .NET
Cisco DUO

ANZ Storage Magazine eZine October 2015
sponsored by TechTarget Storage
EZINE: The eZine features an article looking at how the adoption of private, public and hybrid cloud-storage solutions is pushing APAC businesses to completely overhaul the way they manage enterprise data.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Storage

ASEAN Storage Magazine eZine October 2015
sponsored by TechTarget Storage
EZINE: This article is about the increased storage challenges that ASEAN organizations face as they adopt big data strategies.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Storage

E-government benchmark 2016
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: The results of the latest e-government benchmark show a cautious acceleration of e-government implementation in Europe.
Posted: 08 Feb 2021 | Published: 03 Feb 2017

TechTarget ComputerWeekly.com

Cloud Computing: Risks and Backup/Recovery Requirements
sponsored by Spanning Cloud Apps
EGUIDE: In this exclusive e-guide, learn the importance of backing up and protecting your documents in Gmail and other Google applications. Also, learn more from Dave Russell and other experts about cloud-to-cloud backup and how it is becoming increasingly popular (and necessary) in today's IT market.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Spanning Cloud Apps

Cloud Storage Adoption Decisions: Weighing Capacity, Cost, and Top Platform Tips
sponsored by Nasuni
EGUIDE: This expert guide from the team at SearchStorage.com will grant you access to a hand-curated list of their top 10 cloud storage platform tips, with additional research content on how your peers are weighing cloud costs and capacity considerations. Access your copy here.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni

Essential Guide to PCI DSS
sponsored by TechTarget Security
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 22 Oct 2009 | Published: 14 Sep 2009

TechTarget Security

5 Steps to Raising Ransomware Resistance
sponsored by TechTarget Security
EBOOK: This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

TechTarget Security

Enterprise Network Management Faces Seismic Shift
sponsored by TechTarget Networking
EZINE: Visibility and network performance remain key issues for IT pros, especially as cloud, IoT, and virtualization services become more prevalent. In this special edition of Network Evolution, we explore how the latest network management tools help IT pros maximize uptime and gain insights into network behavior.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

TechTarget Networking

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by TechTarget ComputerWeekly.com
EZINE: This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 08 Feb 2021 | Published: 07 Dec 2018

TechTarget ComputerWeekly.com

CW Benelux August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 08 Feb 2021 | Published: 10 Aug 2017

TechTarget ComputerWeekly.com

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
sponsored by TechTarget ComputerWeekly.com
EZINE: Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Nov 2018

TechTarget ComputerWeekly.com

FlashStack with Cisco UCS and Pure Storage Flash Array//m for 5000 VMware Horizon View 6.2 Users
sponsored by Pure Storage
WHITE PAPER: This document provides architecture reference and design guide for up to 5000 seat mixed workload onCisco UCS and Pure Storage FlashArray//m with VMware Horizon 6.2 RDS server-based sessions andLinked Clone Windows 7 virtual desktops on vSphere 6.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Pure Storage