Hardware  >   Security Hardware  >   Network Security Hardware  >  

e-Mail Content Security Hardware

RSS Feed   
e-Mail Content Security Hardware Reports
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Accelerate AI Data Pipeline Webinar
sponsored by Cisco and Pure Storage
WEBCAST: With FlashStack for AI from Cisco and PureStorage, organizations can simplify their ML and DL data pipeline from the data collection stage all the way through deployment. Access this webcast to learn about the components of FlashStack and to see how implementation could benefit your company.
Posted: 20 Dec 2019 | Premiered: Dec 20, 2019

Cisco and Pure Storage

Advanced Secure Access for Remote and Mobile Workers
sponsored by Barracuda Networks
PRODUCT OVERVIEW: Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Drive Security Intelligence With Splunk
sponsored by Splunk
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk

Global Internationalized Domain Name Homograph Report
sponsored by Farsight Security
RESEARCH CONTENT: Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

Farsight Security

Network Security and the Cloud: The Basics
sponsored by Barracuda
EGUIDE: Organizations turn to the public cloud for its massive, on-demand compute and storage capabilities. But none of those capabilities matter if there isn't proper networking and security policies to ensure applications run safely and smoothly. In this expert guide, learn methods to properly secure your network as you migrate to the cloud.
Posted: 10 Jul 2019 | Published: 19 Apr 2019

Barracuda

How the University of Arkansas Created an Award Winning VDI Deployment
sponsored by Dell
CASE STUDY: Download this case study to uncover the unique combination of technologies that allowed the IT department at the University of Arkansas to deploy virtual desktops for a variety of needs, scale in response to user demands and evolve to meet the requirements of different colleges and departments.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Dell

Definitive Guide to Next-Generation Network Packet Brokers
sponsored by Gigamon
WHITE PAPER: Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Gigamon

Networks Start to Get SASE in 2020
sponsored by Apcela
WHITE PAPER: Companies engaged in digital transformation efforts already understand that security and network services are converging. Now, that convergence has a new name: “secure access service edge,” or SASE. In this white paper, learn more about the SASE model and how it can help your organization by placing access control closer to the user.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Apcela

CyberConverged Storage Designed for the Creative Process
sponsored by RackTop Systems
DATA SHEET: Read this datasheet to catch a glimpse of a security-integrated storage solution—CyberConverged Storage—designed to unify data protection during every phase of the creative process—from capture to post-production.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

RackTop Systems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info