Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Detection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Detection Hardware Reports
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Upgrade Your Business by Upgrading to Smaller, Faster Desktops
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Aging desktops lack the latest hardware and software technology, but it can be difficult to tell if it's the right time to invest in new technology. This white paper describes how upgrading your desktops can empower you to manage desktops remotely and save time, consume less power and cut costs, and improve employee productivity.
Posted: 07 Apr 2016 | Published: 31 Mar 2015

Dell, Inc. and Intel®

Symbolic adversary modelling in smart transport ticketing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at possible extensions of a process algebra language used to support modelling of smart transport ticketing systems.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Mac OS X persistent evidences for forensic purposes
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

CW@50: What was making the news in April?
sponsored by ComputerWeekly.com
EBOOK: The National Museum of Computing has uncovered several gems in the Computer Weekly archives, based on what was happening in the month of April over the last few decades.
Posted: 19 Apr 2016 | Published: 19 Apr 2016

ComputerWeekly.com

2016 Cyberthreat Defense Report
sponsored by Citrix
ANALYST REPORT: This detailed 2016 cyberthreat defense examines the current and planned deployment of countermeasures across the globe to give you a better understanding of how your security perceptions, concerns, and defenses stack up against your peers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Citrix

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Computer Weekly – 20 October 2015: IT Giants Dell and EMC Unite
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Dell's proposed $67bn acquisition of EMC would be the biggest in the history of IT – we assess the implications. £175bn of IT outsourcing contracts come up for renewal in the next three years- what are your options? And we hear from IT leaders about security and the internet of things. Read the issue now.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

ComputerWeekly.com

Modern Infrastructure ASEAN April 2015
sponsored by SearchDataCenter.com
EZINE: Consumerisation of IT in the ASEAN regionMobile devices are being used by staff in their work environment. So much so that businesses can no longer ignore it.
Posted: 06 Apr 2015 | Published: 24 Mar 2015

SearchDataCenter.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement