Hardware  >   Security Hardware  >   Network Security Hardware  >  

e-Mail Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Security Hardware Reports
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hybrid Security Solutions: A New Approach to Meeting the Secure Content Management Challenge
sponsored by St. Bernard Software
WHITE PAPER: Learn new content management best practices and how to combat increasing threats and meet complex regulations. This white paper details how neither appliances nor managed services alone are enough to secure vital company content and communications.
Posted: 20 Nov 2007 | Published: 01 Nov 2007

St. Bernard Software

Requirements for Selecting a Universal Enterprise App Store
sponsored by Flexera Software
WHITE PAPER: This white paper discusses the challenges in today's application delivery and how you can overcome them with an enterprise app store. Read on to explore key criteria that an enterprise app store must meet in order to resolve today's app delivery challenges.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

Flexera Software

Join Brian Madden as he explores the Dell vWorkspace Clients & User Experience
sponsored by Dell, Inc.
WEBCAST: Access this video to listen to Brian Madden and Gabe Knuth, experts on all things virtualization, talk with Dell representative Kelly Craig about what can be done with vWorkspace in regards to client devices and client configuration. Find out how you can set up vWorkspace on different client devices.
Posted: 03 Jun 2015 | Premiered: Jun 3, 2015

Dell, Inc.

Securing Your Network and Application Infrastructure: 24 Experts Share Their Secrets
sponsored by Fortinet, Inc.
WHITE PAPER: This collection of 24 essays, written by experts, covers five major security topics that are more relevant than ever, including: protecting the core of your network, staying ahead of hackers, and 3 more.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

This is what we die for
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This investigation by Amnesty International examines human rights abuses in the extraction of cobolt and the extent to which manufacturers have conducted due diligence in sourcing cobolt for mobile phone production.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Improving Enterprise Graphics Virtualization
sponsored by NVIDIA/VMware
PRODUCT OVERVIEW: Access this white paper to find out how this partnership harnesses the power of true GPU virtualization to enable access to incredible graphics across devices and location, more affordably than ever. Also, discover the benefits of this approach for both IT and users.
Posted: 05 Jun 2015 | Published: 27 Feb 2015


5 Steps to Building a Private Cloud Environment in Your Enterprise
sponsored by Dell and Microsoft
EGUIDE: Building a private cloud isn't a quick process. In this expert e-guide, discover the first 5 steps you need to take to conceive, build, and maintain a private cloud within your enterprise. Read now to get started, and access these key first steps for your organization.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Dell and Microsoft

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement