Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Virus Detection Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Virus Detection Appliances Reports
 
Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Building your Cisco Product Lifecycle Strategy: What you Need to Know
sponsored by Curvature
PRODUCT NEWS: Knowing which stage your Cisco equipment is in can be critical to minimizing the risk of downtime and maximizing your cost of savings. Explore an extensive "End of Life" calendar to best manage your product's lifecycle and details a new tool that allows assets to be utilized without adhering to forced upgrades.
Posted: 22 Jul 2016 | Published: 01 Jun 2016

Curvature

Making the Case for Virtual Workstations
sponsored by Dell, Inc., Intel and VMware
RESOURCE: Find out how virtual workstations are meeting and exceeding the demands of hardcore engineering environments as well as their IT departments. You'll explore four ways virtual workstations save time and money, virtual workstations: myths vs. realities, and more.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

Dell, Inc., Intel and VMware

Leveraging Third-Party Maintenance Providers for Data Center Maintenance Cost Optimization
sponsored by Curvature
ANALYST REPORT: Very few third-party maintenance (TPM) providers have true global scale at this time—can you ensure you're working with the right provider? In this document, discover four key characteristics your TPM provider must boast in order to fulfill the greatest potential for success.
Posted: 31 May 2016 | Published: 31 Mar 2016

Curvature

Cybersecurity Predictions for 2016
sponsored by Global Knowledge
WHITE PAPER: Discover 10 cybersecurity predictions for 2016. Read on to prepare your enterprise for: digital extortion becoming fully automated, the inevitability of digital payment systems becoming compromised, wearables leading to data leaks, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

Global Knowledge

Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement