Hardware  >   Security Hardware  >   Network Security Hardware  >  

e-Mail Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Security HardwareReports
 
Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Miercom Report: How to Enable Firewall Security without Hurting Performance
sponsored by Sophos, Inc.
WHITE PAPER: This Miercom report focuses on tests that measure firewall performance in the most common day-to-day scenarios. Read on to learn how 5 different appliances match up regarding firewall throughput, application control throughput, and more.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

Sophos, Inc.

Designing a Secure DNS Architecture
sponsored by Infoblox
WHITE PAPER: This exclusive paper discusses how your organization can design a scalable and secure DNS architecture, examining what tools to use and what security threats you should be preparing for.
Posted: 29 May 2014 | Published: 29 May 2014

Infoblox

A Closer Look at Network Hardware Backup and Serverless Backups
sponsored by EMC Corporation
EGUIDE: In this e-guide, from the experts at SearchDataBackup.com examine backing up network hardware and why data backup administrators should no longer overlook this practice as well as some best practices when executing a network hardware backup.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

EMC Corporation

Boosting your security against advanced persistent threats
sponsored by IBM
EGUIDE: This expert e-guide explains the necessary steps to take when developing a defense strategy for your network.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

IBM

Getting the Most out of your NextGen Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Eliminating Scaling Challenges with SIaaS
sponsored by Nasuni Corporation
WHITE PAPER: Read this white paper to find out how your IT team can effectively support growth and the ultimate success of your company by implementing SIaaS.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

Nasuni Corporation

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement