FIPS PUB 44-2 White Papers

(View All Report Types)
In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Delivering applications anywhere, anytime with maximum security and control over data
sponsored by Citrix
WHITE PAPER: Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Citrix

Your Guide for Migrating from 1024-bit to Stronger SSL Certificate Key Lengths
sponsored by Symantec Website Security Solutions
WHITE PAPER: As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Symantec Website Security Solutions

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
sponsored by RainStor Inc.
WHITE PAPER: Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
Posted: 05 May 2014 | Published: 05 May 2014

RainStor Inc.

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
Posted: 28 Sep 2012 | Published: 30 Dec 2011

Tripwire, Inc.

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

Compare Windows 8 and Windows® XP Security Problems
sponsored by Lenovo and Microsoft
WHITE PAPER: This white paper explains the most critical security-related differences between Windows® XP and Windows 8, including each operating system’s ability to provision security patches, integrate with MDM and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Lenovo and Microsoft

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

2024 Buyer’s Guide to Load Balancing Solutions
sponsored by Progress Software Corporation
WHITE PAPER: For organizations looking to optimize their application experience (AX) networking, load balancing is a key piece of the necessary IT infrastructure. This buyer’s guide is designed to give you the information you need to navigate the load balancing market, so that you can choose a solution, and deliver AX. Download now to unlock the roadmap.
Posted: 24 May 2024 | Published: 24 May 2024

TOPICS:  .NET
Progress Software Corporation

Migrate From Centos Linux To a Cloud-Ready Operating System
sponsored by Red Hat
WHITE PAPER: This white paper details the benefits of migrating from CentOS Linux to Red Hat Enterprise Linux. According to IDC, compared to unpaid alternatives like CentOS Linux, Red Hat Enterprise Linux enables:32% more efficient IT infrastructure teams72% less unplanned downtime Learn more in this white paper.
Posted: 09 May 2024 | Published: 09 May 2024

TOPICS:  .NET
Red Hat

EMEA Emergency Services eBook: Fire & Rescue
sponsored by Cradlepoint
EBOOK: Strong connectivity can be key to emergency services teams carrying out their jobs. In this e-book, access 5 teams’ stories of networking success and learn about the technologies that support it.
Posted: 30 Jan 2024 | Published: 30 Jan 2024

TOPICS:  .NET
Cradlepoint

DBA Skills Must Evolve, Morph to Cope With Big Data Technologies
sponsored by Rackspace Technology
EGUIDE: This e-guide will explore top trends in data processing that DBA's should be aware of. Download now to learn what skills DBA's should be learning to keep pace with this changing landscape.
Posted: 25 Feb 2016 | Published: 22 Feb 2016

Rackspace Technology

Exposing the Real Cost of Data Discovery
sponsored by Veritas
WHITE PAPER: Unlocking the true value of data is a costly challenge. Reduce data discovery costs with information governance.
Posted: 29 Mar 2017 | Published: 29 Mar 2017

TOPICS:  IT Management
Veritas

Foundry for AI by Rackspace (FAIR)
sponsored by Rackspace Technology
PRODUCT OVERVIEW: Among many other benefits, the key to AI’s potential is its versatility and ability to affect change across myriad use cases. Download this product overview to learn about Foundry for AI by Rackspace (FAIR), a versatile AI solution that can be applied across a number of key use cases.
Posted: 31 Aug 2023 | Published: 31 Aug 2023

TOPICS:  .NET
Rackspace Technology

Choosing the Right Model for Enterprise Backup & Recovery
sponsored by Druva
WHITE PAPER: Considering a cloud solution? Ask yourself these questions and learn the pros and cons of four deployment options.
Posted: 28 Feb 2017 | Published: 01 Mar 2017

TOPICS:  IT Management
Druva

DR-to-the-Cloud Best Practices
sponsored by Rackspace Technology
WHITE PAPER: This exclusive white paper will provide you with a set of best practices for disaster recovery in the cloud.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Rackspace Technology

In Cloud Storage, Options Abound
sponsored by TechTarget Cloud Computing
EBOOK: Examine cloud-based storage in terms of cost, manageability, security and latency/availability.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

TechTarget Cloud Computing

Enhance Data Security and Resiliency with Veritas and Microsoft
sponsored by Veritas
WHITE PAPER: The interconnected nature of digital business has brought rapid growth organizational unity but has also left data uniquely exposed. This white paper focuses on the importance of integrating your Veritas and Microsoft solutions, while adopting a multi-layered cybersecurity strategy. Read on to learn more.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET
Veritas

Enhance Data Security and Resiliency with Veritas and AWS
sponsored by Veritas
WHITE PAPER: Last year, more than 15 ransomware attacks occurred every second, exceeding 493 million attacks globally. Prevention itself is no longer enough. Download this white paper to learn how you can implement a data recovery strategy with Veritas and AWS, ensuring that the data you need is safe even in case of disaster.
Posted: 25 Oct 2023 | Published: 25 Oct 2023

TOPICS:  .NET
Veritas

Buyer's Guide to Antimalware
sponsored by TechTarget Security
EGUIDE: Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

TechTarget Security

Computer Weekly – 11 December 2018: Manchester's evolution from rag trade to digital hub
sponsored by TechTarget ComputerWeekly.com
EZINE: This issue of Computer Weekly explores innovation in the digital era – from the role of software-defined networking in the datacentre, to quantum computing, and much more.
Posted: 08 Feb 2021 | Published: 07 Dec 2018

TechTarget ComputerWeekly.com

E-Guide: IT Decision Checklist: SIMs and Log Management
sponsored by Tripwire, Inc.
EGUIDE: Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

Tripwire, Inc.

IT Decision Checklist: SIMs and Log Management
sponsored by LogLogic, Inc.
EGUIDE: In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.
Posted: 05 Jan 2010 | Published: 05 Jan 2010

LogLogic, Inc.

Buyer’s Guide to Antimalware
sponsored by Panda Security
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 30 Oct 2009 | Published: 27 Oct 2009

Panda Security

Technical Guide on Government Security
sponsored by TechTarget Security
EGUIDE: Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Posted: 26 May 2011 | Published: 23 May 2011

TechTarget Security

Buyer’s Guide to Antimalware
sponsored by AVG Technologies USA, Inc.
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

AVG Technologies USA, Inc.

Essential Guide to PCI DSS
sponsored by TechTarget Security
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 22 Oct 2009 | Published: 14 Sep 2009

TechTarget Security

IT Decision Checklist: Remote Access
sponsored by VirtualArmor
EGUIDE: The pace of today’s mobile workforce makes selecting the right remote access solution essential. This document helps you decide which best fits your company’s needs and enables your remote workers and partners to securely access the files, systems, and networks they need. Read on to learn more.
Posted: 19 Mar 2010 | Published: 19 Mar 2010

VirtualArmor

Information Security - IT Decision Checklist: Application Security
sponsored by Ounce Labs, an IBM Company
EGUIDE: Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.
Posted: 31 Dec 2009 | Published: 31 Dec 2009

Ounce Labs, an IBM Company

ANZ Storage Magazine eZine October 2015
sponsored by TechTarget Storage
EZINE: The eZine features an article looking at how the adoption of private, public and hybrid cloud-storage solutions is pushing APAC businesses to completely overhaul the way they manage enterprise data.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Storage

IT Decision Checklist: Virtual Desktop Infrastructure Security
sponsored by Astaro
EGUIDE: VDI presents enterprises with dynamic opportunities to improve security. Check out this e-guide to learn what those are and receive guidance on evaluating VDI security products.
Posted: 15 Feb 2011 | Published: 15 Feb 2011

Astaro

IT Decision Checklist: Virtual Desktop Infrastructure Security
sponsored by Trend Micro
EGUIDE: Traditional approaches to endpoint security have been challenged to keep up with malware and data loss. VDI presents enterprises with dynamic opportunities to improve security. Read this white paper to learn what those are and receive guidance on evaluating VDI security products.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Trend Micro