Hardware  >   Security Hardware  >   Network Security Hardware  >  

Email Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Email Security HardwareWhite Papers (View All Report Types)
 
Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Essential enterprise mobile device security controls
sponsored by SearchSecurity.com
WHITE PAPER: This expert paper discusses the key challenges for improving your mobile security and what tools you can leverage in order to overcome them. Access this resource now and find out which security control solutions are critical to secure your mobile environment.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SearchSecurity.com

7 Measures of Scalability for your Next-Generation Firewall
sponsored by Dell Software
WHITE PAPER: Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.
Posted: 24 Mar 2014 | Published: 23 Aug 2013

Dell Software

4 Leading DDoS Protection Strategies
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores various ways you can prevent DDoS attacks from harming your system and helps you decide which is best for your system.
Posted: 27 Feb 2014 | Published: 31 Dec 2013

Verisign, Inc.

Roadmap to an Omni-Channel-Aware POS Update
sponsored by Toshiba
WHITE PAPER: Today's multi-channel retail environment demands tools that will help support customer interactions across a variety of platforms. This comprehensive e-book provides an in-depth look at the three essential components of converting to an omni-channel aware POS.
Posted: 12 May 2014 | Published: 12 May 2014

Toshiba

Unleashing IT: Big Data Special Edition
sponsored by Cisco Systems, Inc.
WHITE PAPER: To truly take advantage of all big data has to offer, you need to invest in the right tools, processes, and people. In this special edition of Unleashing IT from Cisco, explore the ins and outs of big data and how it pertains to your business' software, hardware, and process changes.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Cisco Systems, Inc.

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this exclusive paper to learn about how context-aware and adaptive next-generation firewalls can help keep your IT environment secure as more mobile devices and technology makes its way into your corporate network.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Cisco Systems, Inc.

Securely Accelerate Your Mobile Business
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper discusses how you can take an application- and data-centric approach to mobile security so you can balance business enablement with protection, all the while maintaining user privacy.
Posted: 11 Dec 2013 | Published: 11 Dec 2013

CA Technologies.

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement