Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Virus Protection Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection AppliancesWhite Papers (View All Report Types)
 
What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

The Value of Upgrading ERP: Maintaining Modern Technology
sponsored by Sage Software
WHITE PAPER: Find out why so many organizations are choosing to upgrade their ERP systems, and get insights into the enhanced capabilities and benefits they gain from implementation.
Posted: 29 May 2014 | Published: 28 Feb 2014

Sage Software

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Authentication Devices - User-friendly authenticators for every use case
sponsored by HID
WHITE PAPER: In this white paper, access over 10 different authentication devices from a reliable provider to achieve the strength and security you strive for.
Posted: 09 Jul 2014 | Published: 09 Jul 2012

HID

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this exclusive paper to learn about how context-aware and adaptive next-generation firewalls can help keep your IT environment secure as more mobile devices and technology makes its way into your corporate network.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Cisco Systems, Inc.

Testing Report Enterprise Firewalls
sponsored by Cisco
WHITE PAPER: This white paper features a top appliance that includes firewall, VPN, and IPS security services, and doesn't hinder overall performance.
Posted: 03 Apr 2014 | Published: 31 Jul 2012

Cisco

Imaging a Latitude 10 on Windows 8 with System Center Configuration Manager
sponsored by Dell, Inc.
WHITE PAPER: Check out this exclusive white paper for directions on how to create a Windows 8 image for the Latitude 10, as well as the information you need to image a Latitude 10 in your enterprise environment.
Posted: 07 Mar 2014 | Published: 31 Dec 2010

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement