Hardware  >   Security Hardware  >   Network Security Hardware  >  

Virus Protection Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Virus Protection Hardware Reports
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Middle East IT Priorities Report 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Computer Weekly’s in-depth study of IT spending priorities in the Middle East will help you benchmark your business spending in areas such as networking, datacentres and security.
Posted: 19 May 2016 | Published: 19 May 2016

ComputerWeekly.com

Upgrade Your Business by Upgrading to Smaller, Faster Desktops
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Aging desktops lack the latest hardware and software technology, but it can be difficult to tell if it's the right time to invest in new technology. This white paper describes how upgrading your desktops can empower you to manage desktops remotely and save time, consume less power and cut costs, and improve employee productivity.
Posted: 07 Apr 2016 | Published: 31 Mar 2015

Dell, Inc. and Intel®

Authenticating taxicab services
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at an authentication scheme for taxicabs to ensure passengers travel in safety.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Mac OS X persistent evidences for forensic purposes
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series provides a technical explanation of how Mac OS X persistence evidences can be extracted for forensic investigation.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

Norton Cyber Security Insights Report – UK Insights
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: More than 12 million British people have experienced cybercrime in the past year, this UK summary of the Norton Cyber Security Insights Report reveals.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

ComputerWeekly.com

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement