Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Detection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Detection Hardware White Papers (View All Report Types)
 
Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Conquer malware: Cloud-based protection, multi-lane Defense, and more
sponsored by Symantec
WHITE PAPER: Learn how to deploy cloud-based malware protection with multiple lines of defense giving your organization the ability to leverage analytics to combat the malware threat.
Posted: 09 Jun 2017 | Published: 09 Jun 2017

Symantec

ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: This ESG Lab Validation examines the need to addresses advanced email-based threats with Advanced Email Security. ESG Lab evaluated how Proofpoint's unified, multilayered solution offers clear visibility into all of an organization's email and any threats it may contain, along with the ability to respond to and stop those threats.
Posted: 01 May 2017 | Published: 31 Jan 2017

Proofpoint, Inc.

On the Radar: Bayshore Networks Protects the Industrial Internet of Things
sponsored by Bayshore Networks
WHITE PAPER: This Ovum report details how to get the network security you need to combat the dangers the Industrial Internet of Things presents.
Posted: 24 May 2017 | Published: 22 Feb 2016

Bayshore Networks

The $38 Billion Security Vulnerability Your Enterprise Can't Afford to Ignore: Phone and Video Hacking
sponsored by Vyopta
WHITE PAPER: An architecture firm was surprised by a $166,000 phone bill they accrued in 1 weekend, and found that hackers had placed premium-rate phone calls through their network. Telecom fraud is a multi-billion dollar threat you can't afford. Learn about the impact of this threat, as well as immediate tactics to prevent telecommunications hacking.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Vyopta

Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Application Security Program Checklist
sponsored by Veracode, Inc.
WHITE PAPER: Discover a step-by-step rundown of what you need to know to implement an advanced application security program successfully.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.

Implementing Effective Incident Response
sponsored by Rsam
WHITE PAPER: Uncover how to more efficiently and more effectively respond to incidents with an incident response platform.
Posted: 26 May 2017 | Published: 26 May 2017

Rsam

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Discover a detailed showcase of the 3 steps on the path to building up your organization's application security maturity.
Posted: 09 May 2017 | Published: 09 May 2017

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement