Hardware  >   Security Hardware  >   Network Security Hardware  >  

e-Mail Content Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Content Security Hardware Reports
Secure Content Collaboration Across All Devices
sponsored by Citrix
RESOURCE: This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.
Posted: 02 Sep 2016 | Published: 02 Sep 2016


Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Competitive Landscape: Carrier-Class Network Firewalls
sponsored by Juniper Networks, Inc.
WHITE PAPER: As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.
Posted: 23 Aug 2016 | Published: 25 Nov 2015

Juniper Networks, Inc.

Employ a Smart, Secure, and Efficient Database and Application Machine
sponsored by Oracle Corporation UK Ltd
WEBCAST: In this webcast learn how Oracle's MiniCluster allows you to run all tiers of your application in one consolidated system. Learn how you can implement a DB system that uses all-flash storage, is built to allow for both private and public cloud integration, includes a virtual assistant, and more.
Posted: 24 Oct 2016 | Premiered: Jul 11, 2016

Oracle Corporation UK Ltd

BadUSB 2.0: Exploring USB man-in-the-middle attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
Posted: 30 Aug 2016 | Published: 30 Aug 2016


Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

DCIG Buyer's Guide for Midmarket Enterprise Storage Arrays
sponsored by Tegile
WHITE PAPER: The DCIG 2016-17 Midmarket Enterprise Storage Array Buyer's Guide serves the needs of the midmarket technology buyer, collecting data on 17 of the top products in the industry and presenting that data in easy-to-consume one-page summaries. The analyst firm focused its evaluation on storage arrays with a maximum raw storage capacity of 500TB.
Posted: 16 Aug 2016 | Published: 16 Aug 2016


Infographic – IRM Underground Data Center
sponsored by Iron Mountain
WHITE PAPER: Discover one of the most secure data centers in the universe, built 220 feet underground, wrapped in 220,000 square feet of vault. It houses some of the world's greatest treasures; learn how it can protect your precious assets.
Posted: 25 Jul 2016 | Published: 31 Dec 2015

Iron Mountain

First edition of Computer Weekly 1966
sponsored by ComputerWeekly.com
EBOOK: To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement