e-Mail Content Security Hardware White Papers

(View All Report Types)
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software

Desktop virtualization architecture designed for on-demand growth
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: Access this exclusive, informative resource to find out how one data center solution can provide you with the support you need for desktop virtualization.
Posted: 14 Mar 2014 | Published: 31 Dec 2013

Cisco Systems, Inc and Citrix

Improve Data Center Efficiency with Enterprise Linux Servers
sponsored by SUSE
WHITE PAPER: IT budgets are not expected to recover anytime soon, so companies need to adjust to the reality of using fewer resources to deliver business services. This white paper explains how you can accomplish this seemingly impossible objective by running your critical workloads on Linux.
Posted: 19 Jun 2012 | Published: 01 Mar 2012

SUSE

Oracle Enterprise Manager 12C
sponsored by Oracle Corporation
WHITE PAPER: Companies must adapt their management practices to provide proper control over resources in the cloud. This white paper showcases a management tool designed with these types of environments in mind and discusses its key features and benefits.
Posted: 05 Jul 2012 | Published: 01 Sep 2011

Oracle Corporation

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

Top 3 Reasons for IT to Adopt Desktop Virtualization
sponsored by VMware
WHITE PAPER: This whitepaper explains the three major reasons organizations should absolutely consider VDI for the business.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

VMware

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Why Linux Virtualization is Ready for Prime Time
sponsored by Red Hat - HPE
WHITE PAPER: Access this white paper to discover the benefits of virtualizing Linux workloads. This resource examines the historical concerns about Linux virtualization and outlines how enterprises can safely make this transition.
Posted: 20 Sep 2012 | Published: 20 Sep 2012

Red Hat - HPE

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM