Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Virus Protection Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection AppliancesWhite Papers (View All Report Types)
 
Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

IDC: Enterprise Workloads on The IBM X6 Portfolio: Driving Business Advantages
sponsored by IBM
WHITE PAPER: Check out this exclusive white paper to find out how IBM's new systems meet business critical demands with virtualization, business analytics and ERP applications.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Protecting DNS Infrastructure - Inside and Out
sponsored by Infoblox
WHITE PAPER: This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

Bringing Order to IT Chaos in Remote Offices
sponsored by Dell India
WHITE PAPER: Take a look at this exclusive resource to find out how this converged infrastructure hardware can help you enable business success.
Posted: 18 Feb 2014 | Published: 30 Jun 2013

Dell India

Now is the Time to Refresh PCs
sponsored by Dell, Inc.
WHITE PAPER: This resource examines the major reasons you should think about refreshing your PC hardware today, and gives you an idea of the devices available that can help support different types of workers, tasks and usage models.
Posted: 13 Mar 2014 | Published: 12 Mar 2014

Dell, Inc.

SC Magazine Security Brief: Server Side Risk
sponsored by Lumension
WHITE PAPER: This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Lumension

SQL Server HA and DR: A Simple Strategy for Realizing Dramatic Cost Savings
sponsored by SIOS Technology Corp
WHITE PAPER: Read this exclusive white paper to find out how you can tackle SQL Server downtime without busting your disaster recovery protection and high availability budget.
Posted: 21 Apr 2014 | Published: 31 Jan 2014

SIOS Technology Corp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement