Hardware Tokens White Papers

(View All Report Types)
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Five ways SASE and SD-WAN can help improve compliance
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Security and compliance are top priorities for networking and security teams. With Zero Trust and SASE architectures, the network can become a security solution—improving connectivity experiences and compliance at the same time. Read this paper to learn how.
Posted: 01 May 2024 | Published: 01 May 2024

Hewlett Packard Enterprise

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Virtualization Overview
sponsored by Global Knowledge
WHITE PAPER: This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

PACs for Industrial Control, the Future of Control
sponsored by National Instruments
WHITE PAPER: This white paper explores the origins of the Programmable Automation Controllers (PAC), how PACs differ from Programmable Logic Controllers (PLC) and PCs, and the future direction of industrial control with PACs.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

National Instruments

High Availability for SQL Server 2005 Using array-based Replication and Host-based Mirroring Technologies
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This paper provides the data needed to understand the options and the limitations for implementing remote replication solutions on a clustered HP server and storage area network (SAN)-based storage infrastructure.
Posted: 12 Mar 2008 | Published: 01 Jan 2008

Hewlett Packard Enterprise

Unlocking the Full Power of Massive Parallelism: Solving the Network Bottleneck in MPP Databases
sponsored by Aster Data Systems
WHITE PAPER: This paper describes the technical limitations inherent in the architecture of traditional databases and other MPP (massive parallel processing) alternatives.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

Aster Data Systems

Managed Office Protection: Switching from AV to SaaS
sponsored by Panda Security
WHITE PAPER: Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
Posted: 24 Jun 2009 | Published: 01 Mar 2008

Panda Security

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER: Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008

HCL Software