Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Virus Protection Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection Appliances White Papers (View All Report Types)
 
Enterprise Mobility Evolution: The New Age of BYOD
sponsored by StarMobile
WHITE PAPER: The consumer mobility market has exploded, experiencing massive growth. This white paper outlines a strategy for enterprise mobility management (EMM), as companies prepare to develop and support thousands of new apps. Read on to access the new approaches to app development.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

StarMobile

Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

UC&C Is Revolutionizing IT: How Can You Be a Part of It?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains how to implement UC&C upgrades, maximize productivity and leverage real-time applications. Read on to learn how to transform your enterprise with BYOD and UC&C.
Posted: 19 Aug 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Side By Side Comparison: SSD Architectures
sponsored by Solidfire
WHITE PAPER: Many companies are looking to upgrade to flash storage. However, there are a vast amount of flash storage arrays on the market. How can you choose the one that's right for you?Access this white paper for a side by side comparison of two all-flash arrays to help you decide on an array that's right for your business.
Posted: 07 Apr 2015 | Published: 30 Jun 2014

Solidfire

Solving Data, Tech, and App Challenges with Hardware-Optimized Storage
sponsored by NetApp
WHITE PAPER: This white paper will guide you through how to store, manage, and analyze massive data sets with this hybrid infrastructure combination, while resulting in increased performance in your company. Read on here to find out how you can refresh hardware improvements to meet the demands of business-critical applications.
Posted: 19 Jun 2015 | Published: 19 Jun 2015

NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement