Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Virus Protection Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection Appliances Reports
 
Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

Mobile Data Security: Finding the Balance for Secure Productivity
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

CW@50: What was making the news in April?
sponsored by ComputerWeekly.com
EBOOK: The National Museum of Computing has uncovered several gems in the Computer Weekly archives, based on what was happening in the month of April over the last few decades.
Posted: 19 Apr 2016 | Published: 19 Apr 2016

ComputerWeekly.com

Market Guide for Network Packet Brokers
sponsored by Big Switch Networks
RESOURCE: The network packet brokers market has grown and diversified as architectures based on software-defined networking provide insertion opportunities to new entrants. Access this Garnter report to learn what they found in their research and how your business should invest.
Posted: 04 Apr 2016 | Published: 19 Jan 2016

Big Switch Networks

Best Practices For Upgrading Your Data Center Design
sponsored by Cisco Systems, Inc.
EGUIDE: An aging data center may no longer be able to meet the power, cooling, and structural demands of advancing technologies. This exclusive e-guide details five data center upgrade strategies to modernize your facility and Robert McFarlane, with over 35 years experience in data center design, power, and cooling, offers data center design advice.
Posted: 05 Feb 2016 | Published: 03 Feb 2016

Cisco Systems, Inc.

Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement