Cryptography White Papers

(View All Report Types)
Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

Elevate the Employee Experience with ESG
sponsored by ServiceNow
WHITE PAPER: Environmental, social, and governance (ESG) mandates are top of mind for organizations everywhere. Explore this guide to 2023's top ESG opportunities, beginning with three ESG trends.
Posted: 16 May 2023 | Published: 16 May 2023

TOPICS:  IT Management
ServiceNow

Managing Your Data Assets
sponsored by Pitney Bowes Business Insight
WHITE PAPER: Information management is integral to successfully maintaining a competitive advantage. The value of all your data can increase or decrease over time depending on how you manage it. Read on to learn how to gain the insights into information management you need to succeed and gain that competitive edge that is now more important than ever.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Pitney Bowes Business Insight

Cisco IT GRC Security Assessment Service
sponsored by Cisco Systems, Inc.
WHITE PAPER: Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.
Posted: 15 Jun 2009 | Published: 12 Jun 2009

Cisco Systems, Inc.

Strengthening Enterprise Security through Notebook Encryption
sponsored by Intel Corporation
WHITE PAPER: Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.
Posted: 02 Apr 2009 | Published: 01 Dec 2008

Intel Corporation

Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines
sponsored by DellEMC and IntelĀ®
WHITE PAPER: This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

DellEMC and IntelĀ®

Enabling Sustainable Compliance Management
sponsored by IBM
WHITE PAPER: Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
Posted: 22 Dec 2008 | Published: 19 Dec 2008

IBM

Laws, regulations and compliance: Top tips for keeping your data under your Control
sponsored by Sophos UK
WHITE PAPER: The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Posted: 20 Mar 2009 | Published: 01 Dec 2008

Sophos UK

Web Services Security: What's Required to Secure a Service-Oriented Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
Posted: 16 Mar 2009 | Published: 01 Jan 2008

Oracle Corporation