Virus Protection Appliances White Papers

(View All Report Types)
Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Remote Office Infrastructure – A Microsoft Hyper-V Server 2012 Reference Architecture on Dell PowerEdge VRTX
sponsored by Dell India
WHITE PAPER: Access this in-depth resource to find out how this converged hardware solution can help you design your branch office IT environment.
Posted: 18 Feb 2014 | Published: 30 Jun 2013

Dell India

PowerEdge M1000e Blade Chassis
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Check out this concise white paper to find out the key features of this blade chassis that will help you construct your IT infrastructure, as well as a complete list of its technical specifications.
Posted: 19 Feb 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Why Linux Virtualization is Ready for Prime Time
sponsored by Red Hat - HPE
WHITE PAPER: Access this white paper to discover the benefits of virtualizing Linux workloads. This resource examines the historical concerns about Linux virtualization and outlines how enterprises can safely make this transition.
Posted: 20 Sep 2012 | Published: 20 Sep 2012

Red Hat - HPE

HP CarePack Services Defined
sponsored by Insight and HP
WHITE PAPER: HP Care Pack Services are support packages that expand and extend standard warranties for HP hardware and software. HP Care Pack Services provide hardware and software support, installation services, education services and premium support options to meet the needs of business-critical IT environments. View this data sheet to learn more.
Posted: 03 Mar 2014 | Published: 31 Dec 2012

Insight and HP

Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Performance, Reliability and Flexibility of Windows 7 in a Thin Client
sponsored by Dell
WHITE PAPER: Take a look at desktop virtualization hardware solutions with dual- and quad-core options to suit your unique needs.
Posted: 14 Nov 2014 | Published: 11 Nov 2014

Dell