Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Protection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection Hardware Reports
 
Secure Content Collaboration Across All Devices
sponsored by Citrix
RESOURCE: This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Citrix

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Combine Hardware and Software Analytics to Put Big Data to Work
sponsored by NEC Corporation of America
WHITE PAPER: In this white paper learn how you can combine both hardware and software BI analytics solutions to cut big data analysis time when processing the same amount of data, contain datacenter sprawl, easily combine and compare separate data sets to suit your business' needs and more.
Posted: 21 Sep 2016 | Published: 30 Apr 2016

NEC Corporation of America

Sicoob Avoids Infrastructure Costs by Moving To Mainframe
sponsored by IBM
CASE STUDY: Sicoob, the largest credit union system in Brazil, found that their accumulation of diverse servers created a sprawling infrastructure that was unreliable, costly, inflexible, and difficult to expand. Find out how they virtualized their distributed servers to a mainframe platform.
Posted: 20 Jun 2016 | Published: 31 May 2013

IBM

Your Network: A Look Behind the Firewall
sponsored by Fortinet, Inc.
RESOURCE: Discover ways to diagnose and determine how social media, audio, and video traffic may compromise security in your network. Learn how to run a cyber-threat assessment to ensure your valuable data is kept under lock.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Unlocking Ransomware, the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT: Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organizations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Palo Alto Networks

The Insider Threats: Be Protected with Advanced DNS Security
sponsored by EfficientIP
WHITE PAPER: See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement