Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Email Content Security Appliances

RSS Feed   
Email Content Security Appliances Reports
 
Case Study: Expanding a Network of Global Collaboration
sponsored by Egnyte
CASE STUDY: Download this case study to learn how partnering with Egnyte allowed Aerohive Networks to empower worldwide collaboration, while keeping content safe and secure with backups.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

Egnyte

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

How To Secure IaaS/PaaS Effectively: Customer Responsibilities in the Shared Security Model
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the impact of IaaS/PaaS on your security focus, your responsibilities under shared security models, and a security analysis of IaaS/PaaS vs. on-premise environments.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

MASERGY

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Global Internationalized Domain Name Homograph Report
sponsored by Farsight Security
RESEARCH CONTENT: Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, "Farsight Security Global Internationalized Domain Name Homograph Report," examine the prevalence and distribution of IDN homographs across the Internet.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

Farsight Security

Guide to Understanding SD-WAN: Security Options in Different Networking Architectures
sponsored by Apcela
WHITE PAPER: As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Apcela

5 SAP HANA Implementation Tips CIOs Should Know
sponsored by SNP America, Inc.
EGUIDE: In this e-guide, Jawad Akhtar – long-time SAP expert in everything from SCM to products like HANA and Hybris – explores how to make your SAP HANA implementation successful. Uncover 5 tips to light your way towards a smooth, seamless SAP HANA adoption.
Posted: 29 Aug 2017 | Published: 22 Aug 2017

SNP America, Inc.

Burnt by a SIEM
sponsored by Arctic Wolf
RESOURCE: Many good teams struggle mightily with SIEM implementation, which typically takes more than 12 months to start delivering value. Inside, learn about painful scenarios due to SIEM weighing you down, and find out how a SOC-as-a-service provider can deliver what SIEM alone can't.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Arctic Wolf

4 Tech Disruptors that Could Radically Change Security Operations
sponsored by SearchSecurity.com
EZINE: Many information security programs are not on track to handle the internet of things and other technology disruptors. We help you dust off your crystal ball and get prepared for the near future.
Posted: 01 Aug 2017 | Published: 01 Aug 2017

SearchSecurity.com

Hyper-convergence Strategy Guide
sponsored by Hewlett Packard Enterprise
EGUIDE: Access this e-guide to get a strategy in place to ease your transition to HCI and reduce your hardware needs, as well as time spent working on storage and hypervisors.
Posted: 18 Aug 2017 | Published: 16 Aug 2017

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement