Virus Detection Hardware White Papers

(View All Report Types)
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Plan for Success when Migrating from GroupWise to Office 365
sponsored by Dell Software
WHITE PAPER: Take a look at this exclusive white paper to find out how you can utilize key factors of migration from GroupWise to Office 365, to propel yourself through a successful transition process.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Dell Software

Real-time Compression Results In Storage Efficiency
sponsored by IBM
WHITE PAPER: Access this white paper to learn about a storage system that uses real-time compression and SSD technology to boost storage performance. Read on to learn more about how the benefits of this storage system provide a strong ROI, and how your organization could cut costs.
Posted: 01 Apr 2015 | Published: 30 Apr 2014

IBM

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

The State of the i
sponsored by Connectria
WHITE PAPER: Access this white paper to learn about the developments of IBM i on Power Systems. Discover how to achieve valuable benefits like reliability, simplified installation and administration, continuing hardware innovations and much more.
Posted: 18 May 2012 | Published: 18 May 2012

Connectria

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award
sponsored by Sourcefire
WHITE PAPER: In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.
Posted: 22 May 2013 | Published: 22 May 2013

Sourcefire

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Top 3 Reasons for IT to Adopt Desktop Virtualization
sponsored by VMware
WHITE PAPER: This whitepaper explains the three major reasons organizations should absolutely consider VDI for the business.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

VMware