Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

e-Mail Content Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Content Security AppliancesWhite Papers (View All Report Types)
 
Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

The Value of Upgrading ERP: Maintaining Modern Technology
sponsored by Sage Software
WHITE PAPER: Find out why so many organizations are choosing to upgrade their ERP systems, and get insights into the enhanced capabilities and benefits they gain from implementation.
Posted: 29 May 2014 | Published: 28 Feb 2014

Sage Software

9 Steps to Migrating to a Modern Store POS Infrastructure
sponsored by Toshiba
WHITE PAPER: Legacy point of sale (POS) systems were designed to handleone type of customer interaction at a time -- they're not built for today's world of cross-channel communication. As you adapt to mobile, social, and online transactions, it's time for you to upgrade your POS system as well.
Posted: 12 May 2014 | Published: 12 May 2014

Toshiba

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: In this white paper, Thomas Davenport separates fact from fiction when it comes to big data.
Posted: 10 Jul 2014 | Published: 03 Mar 2014

SAS

Automated Solution's for SANS Critical Controls for Effective Cyber Defense
sponsored by Promisec
WHITE PAPER: This informative guide explores the top 5 critical controls for effective cybersecurity and how they will help ensure security for your organization.
Posted: 22 May 2014 | Published: 22 May 2014

Promisec

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement