Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

e-Mail Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Security Appliances Multimedia (View All Report Types)
 
Driving Data Center Function to the Edge with IoT
sponsored by Red Hat
VIDEO: Intelligence from IoT data is driving new business models and apps, and IoT is changing not only app architectures but the data centers themselves. To find out more about the effects of IoT on everything from apps to data centers, watch this video that explores how to build secure, inter-operable, data-centric IoT platforms.
Posted: 12 Aug 2016 | Premiered: 23 Feb 2016

Red Hat

Multi-User GPU: Make IT More Dependable and Easier to Manage
sponsored by AMD
VIDEO: Discover a multi-user GPU that delivers workstation-class graphics from the data center, providing the freedom to run any application on virtually any device, anywhere on the network. Watch now to learn more about the world's first hardware virtualized GPU that provides superior performance, enhanced security, and scalability.
Posted: 19 Jul 2016 | Premiered: 19 Jul 2016

AMD

Simplify IT Management, Simplify Your Life
sponsored by Dell, Inc. and Intel®
VIDEO: Watch this light-hearted video to find out what happens when a new IT guy joins an office that uses the combination of Dell, Citrix, and Intel technology to power its organizations desktops and see how this technology landscape impacts the IT department.
Posted: 21 Jan 2016 | Premiered: 21 Jan 2016

Dell, Inc. and Intel®

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

Forrester Webinar: Taming the Performance Beast
sponsored by Embarcadero Technologies, Inc.
WEBCAST: Smart strategies and tools for database optimization is critical to reduce costs in complex infrastructures and can help organizations defer hardware upgrades, get more out of existing systems, and improve developer and DBA productivity.
Posted: 26 Apr 2010 | Premiered: Apr 26, 2010

Embarcadero Technologies, Inc.

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

McAfee Deep Defender: Hidden Malware Protection
sponsored by Intel
WEBCAST: This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

Take Back Control: OEM Maintenance and Life Cycle Myths Exposed
sponsored by Curvature
VIDEO: Watch this video to learn about upgrade myths and how your organization can take advantage of support and equipment alternatives.
Posted: 28 Apr 2015 | Premiered: 04 Dec 2014

Curvature

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement