Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Protection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection Hardware White Papers (View All Report Types)
 
Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

The ROI of Modern Endpoint Security
sponsored by Cylance
WHITE PAPER: In this Forrester report discover a framework to evaluate the potential financial impact and ROI of advanced endpoint security solutions.
Posted: 08 May 2017 | Published: 08 May 2017

Cylance

Advancing Industrial Internet Security: Convergence of IT With OT
sponsored by Bayshore Networks
WHITE PAPER: Discover the state of IoT security in industrial and operational technology environments and how OT security needs differ from those in IT environments.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

Five Steps To Building A Composable Infrastructure
sponsored by Hewlett Packard Enterprise
WHITE PAPER: You need an infrastructure that enables you turn ideas into products and services and get them to market as quickly as possible. This white paper explores how composable infrastructure enhances your IT and explains the five steps to building your own.
Posted: 12 Oct 2017 | Published: 31 Jul 2017

Hewlett Packard Enterprise

Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

Power System S822LC for Big Data – Two-Socket Linux Server
sponsored by EOH IBM
WHITE PAPER: This data sheet discusses the Power System S822LC for big data, a scale-out Linux server that delivers a storage rich, high-data- throughput design built on open standards to meet the big data workloads of today and grow with your needs for tomorrow.
Posted: 30 Aug 2017 | Published: 30 Sep 2016

EOH IBM

For CTO’s: The No-Nonsense Way to Accelerate Your Business with Containers
sponsored by Canonical
WHITE PAPER: Containers are improving data center efficiency and performance without having to make additional investments in hardware or infrastructure. This white paper explains the background and timeline to the development of containers, and the technology that has led to the proliferation of containers on the Linux platform.
Posted: 19 Oct 2017 | Published: 28 Feb 2017

Canonical

The State of Endpoint Security: Approaches, Opportunities and Conclusions
sponsored by TrendMicro
WHITE PAPER: Discover an overview and breakdown of approaches, opportunities and conclusions regarding of the current state of endpoint security.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

TrendMicro

See an Endpoint Security Vendor Put Through Their Paces
sponsored by Carbon Black
WHITE PAPER: In this report excerpt, discover how IDC research evaluated the capabilities of an endpoint security vendor and who the major players and leaders are in the endpoint security space.
Posted: 10 May 2017 | Published: 10 May 2017

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement