Email Content Security Hardware White Papers

(View All Report Types)
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Imaging a Latitude 10 on Windows 8 with System Center Configuration Manager
sponsored by DellEMC and Intel®
WHITE PAPER: Check out this exclusive white paper for directions on how to create a Windows 8 image for the Latitude 10, as well as the information you need to image a Latitude 10 in your enterprise environment.
Posted: 07 Mar 2014 | Published: 31 Dec 2010

DellEMC and Intel®

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER: Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014

Palo Alto Networks

Dell PowerEdge C8000 Series: Flexible, Powerful, and Efficient
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Check out this brief resource to learn about the Dell PowerEdge C8000 – the only shared infrastructure which enables organizations to easily reconfigure, refresh and scale out as needed.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Dell, Inc. and Intel®

Gartner Report: Dell's Data Center Strategy: From Chassis to Fabric-Based System
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This resource details a fabric-based infrastructure solution that optimizes data center efficiency and agility. Uncover the impacts and recommendations when considering a converged infrastructure strategy for your IT environment.
Posted: 09 Oct 2012 | Published: 30 Jun 2012

Dell, Inc. and Intel®

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Running SAP NetWeaver on the Oracle Exalogic Elastic Cloud: An Architectural Overview
sponsored by Oracle Corporation
WHITE PAPER: This white paper underscores the importance of a cohesive SAP infrastructure. Explore a recommended architecture and the process involved in implementing it.
Posted: 02 Aug 2012 | Published: 01 Sep 2011

Oracle Corporation

Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by OpenText Security Solutions
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

OpenText Security Solutions