e-Mail Content Security Appliances White Papers

(View All Report Types)
Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

Solihull Council Marks a Decade with Red Hat Open Source Technology , Saving over £1 Million
sponsored by Red Hat - HPE
WHITE PAPER: In this informative paper, learn why a government industry has relied on the same Linux solution for the past ten years, using an open source model to simplify software and hardware implementations, reduce costs, and more.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat - HPE

Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos

Imaging a Latitude 10 on Windows 8 with System Center Configuration Manager
sponsored by DellEMC and Intel®
WHITE PAPER: Check out this exclusive white paper for directions on how to create a Windows 8 image for the Latitude 10, as well as the information you need to image a Latitude 10 in your enterprise environment.
Posted: 07 Mar 2014 | Published: 31 Dec 2010

DellEMC and Intel®

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Reduce data center complexity when you 'go virtual'
sponsored by HPE and Intel®
WHITE PAPER: Access this exclusive, in-depth resource to find out how HP's latest solution for virtual environments can benefit your organization.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

HPE and Intel®

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox