Tokens White Papers

(View All Report Types)
Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Virtualization Overview
sponsored by Global Knowledge
WHITE PAPER: This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Dell PowerVault MD3000 1000 Mailbox Local Continuous Replication Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 1000 mailbox Exchange Server 2007 environment with Local Continuous Replication (LCR) feature.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Support PCI Security Compliance with Enhanced Solutions from IBM
sponsored by IBM
WHITE PAPER: This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

The Cost and Benefits of On-Demand Vs. On-Premise Procurement Software
sponsored by Coupa
WHITE PAPER: While there are dozens of procurement software solutions available, there are really only two types offered: "on-premise" procurement software and newer "ondemand" procurement software. This paper outlines an approach to compute and compare them.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Coupa