Email Content Security Hardware White Papers

(View All Report Types)
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Incident Response Tools Can Help Automate Your Security
sponsored by ModoModo
WHITE PAPER: A major security incident happening isn't a matter of "if", it's simply a matter of "when" for the modern business. This expert e-guide will lead you through the pillars of a solid incident response plan, how to automate your policy with incident response tools, and more.
Posted: 05 Apr 2017 | Published: 30 Mar 2017

ModoModo

Customers Achieve Extreme Performance at Lowest Cost with Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: This white paper contains a sampling of real business results that organizations in a variety of industries worldwide have achieved by implementing Oracle Exadata. Read now to learn more.
Posted: 26 Mar 2012 | Published: 31 Dec 2011

Oracle Corporation

Remote Office Infrastructure – A Microsoft Hyper-V Server 2012 Reference Architecture on Dell PowerEdge VRTX
sponsored by Dell India
WHITE PAPER: Access this in-depth resource to find out how this converged hardware solution can help you design your branch office IT environment.
Posted: 18 Feb 2014 | Published: 30 Jun 2013

Dell India

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Best Practices for Implementing a Data Warehouse on Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: By using the Oracle Exadata Database Machine as a data warehouse platform you have a balanced, high performance hardware configuration. This paper focuses on the other two corner stones, data modeling and data loading, providing a set of best practices and examples for deploying a data warehouse on the Oracle Exadata Database Machine.
Posted: 12 Mar 2012 | Published: 30 Sep 2010

Oracle Corporation

Performance, Reliability and Flexibility of Windows 7 in a Thin Client
sponsored by Dell
WHITE PAPER: Take a look at desktop virtualization hardware solutions with dual- and quad-core options to suit your unique needs.
Posted: 14 Nov 2014 | Published: 11 Nov 2014

Dell

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Why Linux Virtualization is Ready for Prime Time
sponsored by Red Hat - HPE
WHITE PAPER: Access this white paper to discover the benefits of virtualizing Linux workloads. This resource examines the historical concerns about Linux virtualization and outlines how enterprises can safely make this transition.
Posted: 20 Sep 2012 | Published: 20 Sep 2012

Red Hat - HPE