Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Detection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Detection HardwareWhite Papers (View All Report Types)
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

DDoS Mitigation: Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores one company's set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations.
Posted: 28 Feb 2014 | Published: 31 Dec 2012

Verisign, Inc.

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms
sponsored by Red Hat
WHITE PAPER: This whitepaper describes scale-out storage reference architecture to demonstrate a "content cloud storage" deployment.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

Red Hat

Have Control Over Remote Access—It's Time to Deploy New Laptops
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals several helpful tips surrounding the secure deployment of new laptops.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc. and Windows 8 Pro

The giant’s advantage: Why cloud computing levels the playing field for small businesses
sponsored by GFI Cloud
WHITE PAPER: In this white paper, you will find effective cloud computing solutions that will help your business grow—not only for technical purposes, but also with the relationship between your team.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

GFI Cloud

Imaging a Latitude 10 on Windows 8 with System Center Configuration Manager
sponsored by Dell, Inc.
WHITE PAPER: Check out this exclusive white paper for directions on how to create a Windows 8 image for the Latitude 10, as well as the information you need to image a Latitude 10 in your enterprise environment.
Posted: 07 Mar 2014 | Published: 31 Dec 2010

Dell, Inc.

3D printing: bringing better products to market faster
sponsored by Stratasys Singapore Pte Ltd
WHITE PAPER: Discover how 3D printing can help your organization bring better products to market faster.
Posted: 28 Apr 2014 | Published: 28 Feb 2014

Stratasys Singapore Pte Ltd
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement