Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Protection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection HardwareWhite Papers (View All Report Types)
 
Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Protecting DNS Infrastructure - Inside and Out
sponsored by Infoblox
WHITE PAPER: This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu

Best Practices for Selling Best-of-Breed Solutions
sponsored by Webroot
WHITE PAPER: This white paper describes the many advantages to the best-of-breed approach to selecting technologies from multiple providers, and also offers a number of helpful suggestions for VARs to capitalize on this approach.
Posted: 11 Jul 2014 | Published: 31 May 2014

Webroot

Five Easy Steps to Smarter Systems Imaging
sponsored by Dell and Microsoft
WHITE PAPER: This whitepaper takes you through 5 steps for developing a smarter approach to systems imaging that layers a unique set of drivers, updates, applications, configurations and user personality on top of the core configuration images.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Dell and Microsoft

DDoS Mitigation: Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores one company's set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations.
Posted: 28 Feb 2014 | Published: 31 Dec 2012

Verisign, Inc.

Automated Solution's for SANS Critical Controls for Effective Cyber Defense
sponsored by Promisec
WHITE PAPER: This informative guide explores the top 5 critical controls for effective cybersecurity and how they will help ensure security for your organization.
Posted: 22 May 2014 | Published: 22 May 2014

Promisec

HP's latest management solution will help conquer data center challenges
sponsored by HP and Intel
WHITE PAPER: Take a look at this exclusive resource to find out how HP's new approach to infrastructure management can help you save time and money when confronting data center challenges.
Posted: 05 Feb 2014 | Published: 31 Oct 2013

HP and Intel

System z, x86, UNIX: Which is more secure?
sponsored by IBM
WHITE PAPER: Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement