Hardware  >   Security Hardware  >   Network Security Hardware  >  

e-Mail Content Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Content Security HardwareReports
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Have Control Over Remote Access—It's Time to Deploy New Laptops
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals several helpful tips surrounding the secure deployment of new laptops.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc. and Windows 8 Pro

Data Deduplication: Types and Benefits
sponsored by Dell Software
EGUIDE: In this e-guide, learn from expert Rachel Dines, an analyst with Forrester Research, the differences between software and hardware backup deduplication, post process vs. inline deduplication as well as fixed and variable-block length dedupe.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Dell Software

Why Back Up Network Hardware?
sponsored by EMC Corporation
EGUIDE: In this e-guide, from the experts at SearchDataBackup.com examine backing up network hardware and why data backup administrators should no longer overlook this practice as well as some best practices when executing a network hardware backup.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

EMC Corporation

Dell Speeds Up Servers with the PowerEdge R630 for Your Business
sponsored by Dell, Inc.
WHITE PAPER: Start and end your search with the Dell PowerEdge R630 Server. This dense 1U machine, when upgraded with SATA solid-state drives (SSDs) performs up to 10.5 times faster than the standard hard disk drives.
Posted: 22 Oct 2014 | Published: 31 Aug 2014

Dell, Inc.

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

When 'Secure enough' isn't enough
sponsored by Imation Corp.
WHITE PAPER: This white paper explains the reason why compliance alone may not be enough to provide the security you need to prevent data breaches from occurring.
Posted: 24 Sep 2014 | Published: 01 Feb 2013

Imation Corp.

Authentication Devices - User-friendly authenticators for every use case
sponsored by HID
BROCHURE: In this brochure, access over 10 different authentication devices from a reliable provider to achieve the strength and security you strive for.
Posted: 09 Jul 2014 | Published: 09 Jul 2012

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement