Commerce Department Reports

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
sponsored by ISACA
WHITE PAPER: This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives.
Posted: 10 Feb 2010 | Published: 01 Dec 2009

ISACA

DNSSEC - Secure DNS For Government
sponsored by BlueCat
WHITE PAPER: This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.
Posted: 01 Sep 2010 | Published: 31 Aug 2010

BlueCat

The Need for Cloud Computing Security Standards
sponsored by TechTarget Security
EGUIDE: While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

Setting standards in IT Industries
sponsored by DLT Solutions
EGUIDE: Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.
Posted: 19 Mar 2012 | Published: 16 Mar 2012

DLT Solutions

High Performance, High Capacity 2048/4096-bit SSL Offload
sponsored by A10 Networks
WHITE PAPER: This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
Posted: 24 Sep 2013 | Published: 28 Feb 2013

A10 Networks

The Modern Security Threat and Regulatory Compliance
sponsored by Bytware, Inc.
WEBCAST: SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
Posted: 29 Sep 2008 | Premiered: Sep 29, 2008

Bytware, Inc.

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Optimizing the PC Segment of California's IT Infrastructure
sponsored by Intel Corporation
CASE STUDY: Researchers found that by creating a dynamic IT environment- standardized, centralized, automated, and mobile-California can achieve a greener, more secure computing complex that improves productivity, delivering greater efficiency at a lower cost to taxpayers and the environment.
Posted: 27 May 2009 | Published: 27 May 2009

Intel Corporation

Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
sponsored by IBM Software Group
WHITE PAPER: When you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
Posted: 13 Mar 2008 | Published: 01 Jan 2007

IBM Software Group

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM