Virus Protection Hardware White Papers

(View All Report Types)
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

What's New with Dell PowerEdge 12th Generation Servers?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Take a look at this in-depth resource to find out what you need to know about the next generation servers and how you can successfully transition to this latest technology.
Posted: 19 Feb 2014 | Published: 31 May 2012

Dell, Inc. and Intel®

Oracle Enterprise Manager 12C
sponsored by Oracle Corporation
WHITE PAPER: Companies must adapt their management practices to provide proper control over resources in the cloud. This white paper showcases a management tool designed with these types of environments in mind and discusses its key features and benefits.
Posted: 05 Jul 2012 | Published: 01 Sep 2011

Oracle Corporation

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by OpenText Security Solutions
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

OpenText Security Solutions

ESG: Economics of Flash Compared to Hard Disk
sponsored by IBM
WHITE PAPER: Access this white paper to learn about the economic value of flash compared to hard disks and decide for yourself if flash is worth the investment.
Posted: 17 Mar 2015 | Published: 28 Feb 2015

IBM

Dynamic Infrastructures for VMware vCloud
sponsored by Fujitsu
WHITE PAPER: Check out this exclusive white paper to discover how a VMware-based infrastructure solution can accelerate cloud infrastructure implementation, while reducing maintenance costs and effort.
Posted: 05 Mar 2014 | Published: 31 Dec 2012

Fujitsu