Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Web Content Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Web Content Security Appliances Reports
 
Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

Entrust Entelligenceā„¢ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Maximizing Security and Performance for Web Browsing
sponsored by Sophos, Inc.
WHITE PAPER: Read this white paper and discover how to protect your company from the growing risks of web browsing with a security strategy that combines powerful URL filtering and scanning capabilities with low-impact, effective administration.
Posted: 07 Nov 2006 | Published: 01 Oct 2006

Sophos, Inc.

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

What E-Mail Hackers Know That You Don't
sponsored by CipherTrust, Inc.
WHITE PAPER: E-mail hackers are constantly developing new methods of breaking into your network. Download this whitepaper to learn what they're doing, how they're doing it, and how you can stop them.
Posted: 28 Oct 2005 | Published: 31 Dec 2005

CipherTrust, Inc.

How to Apply the Data and Network Maturity Model to Four Technology Pillars
sponsored by Carousel Industries
WHITE PAPER: This expert white paper shows how you can evaluate your approach to network and security against a proven maturity model, which will help you determine if you're adopting new technologies in the most efficient way. Read on to learn how you can apply this model to a variety of technologies
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Carousel Industries

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

Proactive Incident Response: Prepare Now or Pay Later
sponsored by Blue Coat Systems
WHITE PAPER: This infographic features a proactive approach to incident response. Discover how to gain visibility and reduce response time by recording and analyzing all network traffic, earning you up to 55% in savings by reducing costs associated with data breaches.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

Blue Coat Systems

This is what we die for
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This investigation by Amnesty International examines human rights abuses in the extraction of cobolt and the extent to which manufacturers have conducted due diligence in sourcing cobolt for mobile phone production.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Requirements for Selecting a Universal Enterprise App Store
sponsored by Flexera Software
WHITE PAPER: This white paper discusses the challenges in today's application delivery and how you can overcome them with an enterprise app store. Read on to explore key criteria that an enterprise app store must meet in order to resolve today's app delivery challenges.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

Flexera Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement