Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Virus Protection Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection Appliances Reports
 
Secure Content Collaboration Across All Devices
sponsored by Citrix
RESOURCE: This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Citrix

Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

Why You Can't Afford Cheap Computers
sponsored by Xeon - Intel & hp
RESOURCE: Read this exclusive article from Robert Green that outlines the cost of using old PCs to run your compute-intensive software applications, and why you really can't afford cheap computers.
Posted: 01 Sep 2016 | Published: 31 Aug 2016

Xeon - Intel & hp

Staying Ahead of the Competition by Cutting Costs and Deploying SAP Systems Faster
sponsored by IBM
CASE STUDY: Uncover how IT-Informatik simplified and optimized its SAP application hosting and cloud services in this case study. Explore the set of technology they adopted to gain homogeneous, cross-platform administration, cut costs and enabled 75% faster SAP applications deployment.
Posted: 01 Sep 2016 | Published: 31 Oct 2015

IBM

Deliver Security Virtually Everywhere with SDN and NFV
sponsored by Juniper Networks, Inc.
WHITE PAPER: Security vendorsĀ are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.
Posted: 23 Aug 2016 | Published: 15 Jul 2016

Juniper Networks, Inc.

Cost, Speed, and Reliability Tradeoffs between N+1 UPS Configurations
sponsored by Schneider Electric
WHITE PAPER: This expert white paper discusses key tradeoffs between internal "modular" redundant UPS and parallel redundant UPSs as well as stresses the importance of fault tolerance within the UPS to ensure that availability, reliability and maintainability needs are met.
Posted: 26 Aug 2016 | Published: 01 Jul 2016

Schneider Electric
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement