Hardware  >   Security Hardware  >   Network Security Hardware  >  

e-Mail Content Security Hardware

RSS Feed   
e-Mail Content Security Hardware Reports
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

TOPICS: 
IBM

Stopping Cyberattacks before they occur: Farsight Security DNS Threat Intelligence - The Red Canary Case Study
sponsored by Farsight Security
CASE STUDY: In this case study learn how Red Canary, a cybersecurity firm, improved Its passive DNS threat intelligence, confirmed and enriched investigative findings, installed a primary and secondary, high fidelity threat indicator, and more.
Posted: 04 Apr 2017 | Published: 31 Dec 2016

TOPICS: 
Farsight Security

5 SAP HANA Implementation Tips CIOs Should Know
sponsored by SNP America, Inc.
EGUIDE: In this e-guide, Jawad Akhtar – long-time SAP expert in everything from SCM to products like HANA and Hybris – explores how to make your SAP HANA implementation successful. Uncover 5 tips to light your way towards a smooth, seamless SAP HANA adoption.
Posted: 29 Aug 2017 | Published: 22 Aug 2017

TOPICS: 
SNP America, Inc.

SD-WAN: Fortifying Security across the WAN
sponsored by Silver Peak
WHITE PAPER: SD-WAN may be becoming the network design of choice for geographically distributed enterprises, but it comes with its own set of security challenges. Find out how you can achieve the flexibility and agility of SD-WAN while still maintaining a strong network security posture.
Posted: 04 May 2018 | Published: 31 Jan 2018

TOPICS: 
Silver Peak

How 1 Hospital Transformed Network Security
sponsored by Micro Focus
CASE STUDY: When network performance fell at a major North American hospital, it was a sign that years of IT security neglect had led to serious problems. The hospital had developed a reputation as a soft target and experienced daily network attacks. Read this case study to learn how this hospital began addressing threats before they become a problem.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

TOPICS: 
Micro Focus

The Importance of a Common Distributed Data Services Layer
sponsored by Gigamon
RESEARCH CONTENT: Read this research report to learn about distributed data services layers, and the critical role they play in enabling a secure distributed network environment, regardless of whether they are physical or virtual.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Gigamon

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

TOPICS: 
ComputerWeekly.com

Next generation network security
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 21 Mar 2018 | Published: 21 Mar 2018

TOPICS: 
ComputerWeekly.com

Universities, Network Security, and Bro: A Roundtable Discussion
sponsored by CoreLight
WEBCAST: Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

TOPICS: 
CoreLight

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

TOPICS: 
Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement