Hardware  >   Security Hardware  >   Network Security Hardware  >  

Spam Prevention Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Spam Prevention Hardware White Papers (View All Report Types)
 
Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Protect Your Data Center from Today's Evolving DDoS Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Fortinet, Inc.

Confidence in your Data Center
sponsored by Dell, Inc. and SanDisk®
WHITE PAPER: In this white paper, discover a software and hardware solutions that balance reliability, availability, and data protection of storage in the data center to suit end-users unique needs. Find out how these solutions work efficiently and seamlessly with your existing infrastructure to help maximize you IT investments.
Posted: 21 Jan 2015 | Published: 31 Dec 2013

Dell, Inc. and SanDisk®

Outperform Competitors With a Strong ADC
sponsored by Citrix
WHITE PAPER: This white paper highlights 9 key data center and cloud architecture challenges that NetScaler can help you solve efficiently.
Posted: 31 Dec 2014 | Published: 01 Aug 2014

Citrix

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Plan for Success when Migrating from GroupWise to Office 365
sponsored by Dell Software
WHITE PAPER: Take a look at this exclusive white paper to find out how you can utilize key factors of migration from GroupWise to Office 365, to propel yourself through a successful transition process.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Dell Software

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement