Hardware  >   Security Hardware  >   Network Security Hardware  >  

Email Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Email Security Hardware White Papers (View All Report Types)
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Unleashing IT: Big Data Special Edition
sponsored by Cisco Systems, Inc.
WHITE PAPER: To truly take advantage of all big data has to offer, you need to invest in the right tools, processes, and people. In this special edition of Unleashing IT from Cisco, explore the ins and outs of big data and how it pertains to your business' software, hardware, and process changes.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Cisco Systems, Inc.

Improving Database Performace With Dell Fluid Cache For SAN
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this white paper to learn how just three Dell PowerEdge servers running Dell Fluid Cache cuts I/O request delivery by 91.6%. Sure, what you have is fast, but faster is better for your organization and it comes without major remodeling.
Posted: 05 Nov 2014 | Published: 15 Sep 2014

Dell, Inc. and Intel®

Understanding the Benefits of SPSS Statistics Server
sponsored by IBM
WHITE PAPER: Access this white paper to learn about a statistics server that supports analytics from one department to hundreds of users. Read on to learn how this server can speed up analytical procedures so you can get your business intelligence faster.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

IBM

Update Your Windows: HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations
sponsored by Hewlett-Packard Company
WHITE PAPER: Explore this white paper to learn why choosing a partner with vast expertise like HP enables you to start planning, analyzing, and transitioning to Windows Server 2012 without hitting bumps along the road. Start your migration away from Windows Server 2003 now before it's too late and learn how choosing HP helps your business grow.
Posted: 18 Nov 2014 | Published: 23 Jul 2014

Hewlett-Packard Company

Select a safe and smart surveillance drive built for your needs
sponsored by Seagate Technology
WHITE PAPER: Check out this informative, concise paper for a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use.
Posted: 14 Mar 2014 | Published: 28 Feb 2014

Seagate Technology

How to Choose the Right Mobile ERP System
sponsored by Epicor Software Corporation
WHITE PAPER: Access this expert e-guide to answer your mobile ERP questions and gain expert tips on how to choose the right mobile ERP and Bi hardware for your organization.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Epicor Software Corporation

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell Software
WHITE PAPER: Sophisticated exploits that utilize advanced evasion techniques are all too common. Anti-evasion data-normalizing techniques are critical to an effective IPS, since evasions that aren't decoded and detected effectively render the IPS useless.
Posted: 12 May 2014 | Published: 12 May 2014

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement