ComputerWeekly.com Research Library

Powered by Bitpipe.com

Department of Commerce Research

  • The Need for Cloud Computing Security Standards

    Sponsored by: TechTarget Security

    While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.

  • Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives

    Sponsored by: ISACA

    This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives.

  • DNSSEC - Secure DNS For Government

    Sponsored by: BlueCat

    This document examines the standards and guidelines as outlined by NIST, and demonstrates the ways in which BlueCat Network’s DNS solution address these guidelines.

  • High Performance, High Capacity 2048/4096-bit SSL Offload

    Sponsored by: A10 Networks

    This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.

  • Setting standards in IT Industries

    Sponsored by: DLT Solutions

    Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces.

  • The Modern Security Threat and Regulatory Compliance

    Sponsored by: Bytware, Inc.

    SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.