What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download Now

Beyond the Next Generation:Putting Advanced Network Security to Work: Whitepaper

As the network has evolved, so has network security. Firewalls retain their role of first-line filtration based on policy, but have grown to embrace a wider range of capability. In this report, EMA highlights specific examples of the ways in which converged security systems put today’s more advanced capabilities to work in practical application.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

Detailed Mapping of Vormetric Data Security Platform Controls to NIST 800-53 Requirements: Whitepaper

Critical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform.


Effects of Unexpected Power Interruptions on Embedded Flash Media: Whitepaper

Use of NAND flash storage continues to proliferate throughout many industrial segments and applications due to declining costs per gigabyte, high performance, and low power requirements. However, one of the main challenges of current NAND flash technology is its susceptibility to data corruption during unexpected power loss. This white paper seeks to explain the specific effects of unexpected power failure on flash media, as well as highlight “best practices” for mitigating data corruption as a result of power loss.


All About Self-Encrypting Drives: Whitepaper

With data security risks on the rise, an influx of government mandates and regulations for securing data have been implemented and are becoming the norm. Eliminating exposure of private data is now simply viewed as a mandatory and sound business practice. To avoid the high costs associated with these types of data compromises, organizations must put in place a comprehensive security strategy. Read this whitepaper to learn how self-encryption is achieving this initiative.