Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Detection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Detection Hardware White Papers (View All Report Types)
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Performance, Reliability and Flexibility of Windows 7 in a Thin Client
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper takes a look at a series of desktop virtualization hardware solutions with dual and quad core options to suit your unique budget, application, and performance needs
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Dell, Inc. and Intel®

Troubleshooting Fibre Channel Boot from SAN on the Cisco UCS B Series Chassis
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses one component of Cisco's Unified Computing Solution: Stateless computing, which allows all the hardware settings of a server to be saved on a location outside the server itself, and is implemented through an XML-based software feature called a service profile.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Global Knowledge

Secure the Network On-Premise, Site-to-Site, and in the Cloud
sponsored by Unisys
WHITE PAPER: Whether on-promise or remote, devices that find their way into your organization's communication paths should be cautiously welcomed at best. Explore micro-segmentation and endpoint protection strategies for cloud-based businesses.
Posted: 05 Jun 2016 | Published: 05 Jun 2016

Unisys

3D printing: bringing better products to market faster
sponsored by Stratasys, Ltd
WHITE PAPER: Discover how 3D printing can help your organization bring better products to market faster.
Posted: 28 Apr 2014 | Published: 28 Feb 2014

Stratasys, Ltd

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

Dell, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Getting the Most out of your NextGen Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement