Email Security Hardware White Papers

(View All Report Types)
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Oracle Enterprise Manager 12C
sponsored by Oracle Corporation
WHITE PAPER: Companies must adapt their management practices to provide proper control over resources in the cloud. This white paper showcases a management tool designed with these types of environments in mind and discusses its key features and benefits.
Posted: 05 Jul 2012 | Published: 01 Sep 2011

Oracle Corporation

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

What's New with Dell PowerEdge 12th Generation Servers?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Take a look at this in-depth resource to find out what you need to know about the next generation servers and how you can successfully transition to this latest technology.
Posted: 19 Feb 2014 | Published: 31 May 2012

Dell, Inc. and Intel®

Why Linux Virtualization is Ready for Prime Time
sponsored by Red Hat - HPE
WHITE PAPER: Access this white paper to discover the benefits of virtualizing Linux workloads. This resource examines the historical concerns about Linux virtualization and outlines how enterprises can safely make this transition.
Posted: 20 Sep 2012 | Published: 20 Sep 2012

Red Hat - HPE

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation