Hardware Crypto Accelerators Reports

EMEA Emergency Services eBook Network Technologies Transforming Public Safety
sponsored by Cradlepoint
EBOOK: Emergency services depend on digital and connected technologies to help quickly provide life-saving assistance, deal with emergencies, and bring order to chaotic situations. In this e-book, learn how Cradlepoint helped 5 different emergency service departments stay connected.
Posted: 08 Feb 2021 | Published: 23 Apr 2020

Cradlepoint

9 essential elements of network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 08 Feb 2021 | Published: 08 May 2020

TechTarget ComputerWeekly.com

Next generation network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 08 Feb 2021 | Published: 21 Mar 2018

TechTarget ComputerWeekly.com

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Gunner Peterson's Security Gateway Buyer’s Guide
sponsored by Intel
WHITE PAPER: Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Intel

Security Gateway Buyer's Guide
sponsored by Intel
WHITE PAPER: If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Intel

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

All resources sponsored by Synopsys

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos