Software  >   Systems Software  >  

Security Tools

RSS Feed    Add to Google    Add to My Yahoo!
Security Tools White Papers (View All Report Types)
 
Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: This white paper discusses a cloud-based email security service that protects users with highly accurate spam detection, robust virus defense, and built-in email continuity. Read on to see how this service can improve the reliability of your email security and reduce your management overhead.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

The Current and Future State of IT Security
sponsored by Dell, Inc. and Intel®
WHITE PAPER: To know what needs improvement, decision-makers need only look to their peers. Learn the priorities, challenges and strengths in IT security from 1,440 interviews conducted by market research analysts Vanson Bourne.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Dell, Inc. and Intel®

Protect Against Zero-Day Attacks at the Every Level
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: It's time to take threat defense to the next level and protect your organization. In this white paper, you'll uncover ways to combine OS-level sandboxing with threat prevention capabilities for integrated prevention and security management.
Posted: 24 Mar 2016 | Published: 24 Mar 2016

Check Point Software Technologies Ltd.

Test Report: Breach Detection System
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this report to learn how one threat prevention solution fared when it comes to effectiveness, reliability, costs, and more.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Check Point Software Technologies Ltd.

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER: This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett Packard Enterprise

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
sponsored by Webroot
WHITE PAPER: This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
Posted: 30 May 2013 | Published: 17 Jan 2013

Webroot

How Citrix ShareFile Enables Secure Data Sharing in the Enterprise
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement