Hardware  >   Security Hardware  >   Network Security Hardware  >  

Email Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Email Security Hardware Reports
 
Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Dell Appliance for Wyse - Citrix® Reference Architecture
sponsored by Dell, Microsoft and Citrix
WHITE PAPER: Explore the architecture design, configuration, and implementation considerations for the key components required to deliver virtual desktops or shared session desktops using the Dell Appliance for Wyse. Also, take a look at the solution architecture overview, hardware components, software components, and more.
Posted: 07 Jul 2016 | Published: 29 Apr 2016

Dell, Microsoft and Citrix

Peruse The VDI Client Showroom To Find Your Style
sponsored by Dell, Microsoft and Citrix
EGUIDE: Finding the right VDI client is crucial to delivering virtual desktops users will enjoy working with. This e-guide highlights how HTML5 browsers, thin clients, zero clients, and repurposed PCs are all viable options.
Posted: 06 Oct 2016 | Published: 04 Oct 2016

Dell, Microsoft and Citrix

Protecting Web Services for Grand Slam Roland-Garros
sponsored by EfficientIP
CASE STUDY: Learn how the French Tennis Federation (FFT) chose to tackle the task of ensuring seamless coverage for the French Open by unifying network management, protecting against DNS attacks, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

EfficientIP

Office 365: Enabling More Secure Collaboration
sponsored by VMware
WHITE PAPER: How can you enable secure collaboration with Office 365? Learn 3 steps to make this possible, as well as 3 stages of adoption for security add-ons for Office 365.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

VMware

Give Your Creative Professionals the Power To Do More
sponsored by Dell, Inc. & Intel®
RESOURCE: This short resource lays out the details of a laptop series which is designed to empower mobile employees performing functions with strenuous hardware requirements.Access now to learn the critical stats behind a leading creative workstation.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Dell, Inc. & Intel®

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016


Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

First edition of Computer Weekly 1966
sponsored by ComputerWeekly.com
EBOOK: To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement